WO2021223665A1 - Method and device for reducing invalid warnings - Google Patents

Method and device for reducing invalid warnings Download PDF

Info

Publication number
WO2021223665A1
WO2021223665A1 PCT/CN2021/091209 CN2021091209W WO2021223665A1 WO 2021223665 A1 WO2021223665 A1 WO 2021223665A1 CN 2021091209 W CN2021091209 W CN 2021091209W WO 2021223665 A1 WO2021223665 A1 WO 2021223665A1
Authority
WO
WIPO (PCT)
Prior art keywords
alarm
target
information
invalid
characteristic information
Prior art date
Application number
PCT/CN2021/091209
Other languages
French (fr)
Chinese (zh)
Inventor
陶冶
汪红星
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2021223665A1 publication Critical patent/WO2021223665A1/en

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19602Image analysis to detect motion of the intruder, e.g. by frame subtraction
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • H04N7/181Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a plurality of remote sources

Definitions

  • This application relates to the field of image processing, and in particular to a method and device for reducing invalid alarms.
  • the current anomaly intrusion detection is generally based on image processing technology.
  • the abnormal intrusion detection technology based on image processing technology
  • at least one camera is first deployed around the security area, the camera can shoot in real time, and then the image captured by the at least one camera is recognized.
  • the behavior of the target is a preset behavior that triggers an alarm
  • an alarm is triggered, and the alarm information of the target is reported to the staff for processing.
  • the preset behavior that triggers an alarm is human wandering behavior, and because of the diversity of the environment in the security area, the plants around the security area will also shake back and forth under the blow of the wind, which may be misidentified Wandering as a person, triggering an alarm. But in fact, the plant does not belong to the security target of the security area, so the staff will receive invalid warning information. At the same time, plants generally stay in the picture taken by the camera for a long time, which may trigger multiple alarms, and correspondingly, the staff will receive multiple invalid alarm messages. It can be seen that in the current abnormal intrusion detection technology, the probability of generating invalid alarms is high, resulting in low accuracy of alarms.
  • the embodiments of the present application provide a method and device for reducing invalid alarms, which can reduce the probability of generating invalid alarms, improve the accuracy of alarms, and improve user experience.
  • the embodiments of the present application provide a method for reducing invalid alarms.
  • the method can be implemented by a camera, or a chip or a chip system in the camera, or a server, or a chip or a chip system in the server. Including: first obtain the first characteristic information of the first target, and then match the first characteristic information with the characteristic information in the invalid alarm database, when the degree of matching between the first characteristic information and the characteristic information in the invalid alarm database is less than At the first threshold, no alarm information is output.
  • the alarm database includes characteristic information of at least one target, and the behavior of each target in the at least one target is a behavior that triggers an invalid alarm.
  • the above-mentioned behavior of the first target is the behavior of triggering an alarm.
  • the behavior of the first target is a behavior that triggers an alarm of the camera.
  • the behavior of the first target may be a behavior that triggers a camera alarm, or a behavior that triggers a server alarm.
  • the camera or the server detects that the behavior of the first target is a behavior that triggers a warning (such as crossing the line, area intrusion, or wandering, etc.)
  • the first characteristic information of the first target is acquired, and then the first characteristic The information is matched with the characteristic information in the invalid alarm database. Since the invalid alarm database stores the characteristic information of the target that previously triggered the invalid alarm, and/or the characteristic information of the target that easily triggers the invalid alarm, when the first characteristic information matches the characteristic information in the invalid alarm database
  • the level is high (such as greater than or equal to the first threshold) it indicates that the alarm triggered by the first target is an invalid alarm.
  • the alarm information triggered by the first target can be automatically filtered, that is, no alarm information is output, thereby saving manual detection. Link, reduce the probability of generating invalid alarms, improve the accuracy of alarms, thereby improving user experience.
  • the device (such as the alarm server or cloud service platform) that implements the method of this solution will receive frequent alarms from the camera, but after further confirmation by the alarm platform, if the matching degree between the feature information and the feature information in the invalid alarm database is better High, which means that the alarm is an error alarm (false alarm) that does not need attention. Therefore, the alarm platform will terminate the alarm and will not actually output the alarm information to the user, reducing the interference of the user from the false alarm.
  • the device such as the alarm server or cloud service platform
  • the first information from the input interface is received, and the first information is used To indicate whether the alarm triggered by the first target is an invalid alarm; when the first information is used to indicate that the alarm triggered by the first target is an invalid alarm, no alarm information is output, and the first characteristic information is added to the invalid alarm database, Otherwise, output alarm information.
  • the server may include the first image of the first target Display so that the staff can judge whether the alarm triggered by the first target is an invalid alarm according to the first image, and input the judgment result (recorded as the first information) (such as mouse input, keyboard input or voice input) into the input Interface.
  • the judgment result such as mouse input, keyboard input or voice input
  • the server When the first information is used to indicate that the alarm triggered by the first target is a valid alarm, the server outputs alarm information; when the first information is used to indicate that the alarm triggered by the first target is an invalid alarm, the server filters the alarm information triggered by the first target , That is, no alarm information is output, and the first characteristic information is added to the invalid alarm database.
  • the matching degree between the feature information in the current invalid alarm database and the first feature information is low, but the staff determines that the alarm triggered by the first target is an invalid alarm, and the server adds the first feature information to the invalid alarm database.
  • the diversity of samples in the invalid alarm database can be increased.
  • the alarm information triggered by the first target can be automatically filtered, without the need for staff to check again, which reduces the overhead of manual maintenance and improves user experience.
  • adding the first feature information to the invalid alarm database includes: acquiring a first image, the first image includes a first target; determining that the first target is in the first image Then, the area is reduced and/or enlarged according to different sizes to obtain at least one sub-image; the feature information of the first target is extracted from each sub-image in the at least one sub-image to obtain at least one second Characteristic information, the at least one second characteristic information includes the first characteristic information; then the at least one second characteristic information is added to the invalid alarm database.
  • the area including the first target may be reduced according to different reduced sizes, enlarged according to different enlarged sizes, or according to Different reduction sizes and different enlargement sizes are respectively reduced and enlarged to obtain at least one sub-image, and then the feature information obtained based on each sub-image in the at least one sub-image is added to the invalid alarm database, which can enrich the first target
  • the accuracy of automatic judgment of invalid alarms can be improved.
  • acquiring the first feature information of the first target includes: receiving multimedia information from the camera; when it is detected that there is a moving first target in the shooting area of the camera, and the first target The behavior of is to obtain the first image from the multimedia information when an alarm is triggered, and perform feature extraction on the first target in the first image to obtain the first feature information.
  • the server receives multimedia information from the camera.
  • the multimedia information may be video data or multiple images.
  • the server detects the multimedia information, and when it detects that there is a moving first target in the area captured by the camera, and the behavior of the first target is a behavior that triggers an alarm (such as area intrusion, cross-border or wandering, etc.), it will not include the
  • the first feature information of the first target is extracted from the first image of the first target. That is, the behavior that triggers the alarm is recognized by the server without the need for the camera to recognize, which can reduce the load of the camera.
  • acquiring the first characteristic information of the first target includes: receiving the first characteristic information from the camera.
  • the server receives the first feature information from the camera.
  • the first feature information is the first target that the camera detects that there is motion in its shooting area
  • the behavior of the first target is a behavior that triggers an alarm. It is sent after extracting the first characteristic information of the first target from the first image including the first target. That is, the behavior that triggers the alarm is recognized by the camera without sending multimedia information to the server in real time to identify the behavior that triggers the alarm, which can reduce the load on the server and save network resources.
  • matching the first characteristic information with the characteristic information in the invalid alarm database includes: according to the first alarm Type, determine the third characteristic information in the invalid alarm database, the invalid alarm triggered by the target corresponding to the third characteristic information is an invalid alarm of the first alarm type; the first characteristic information is matched with the third characteristic information.
  • the difference between the characteristic information corresponding to different alarm types is also large. Therefore, when determining whether to filter the alarm information of the first target, there is no need to match the first feature information with all the feature information included in the invalid alarm database.
  • the characteristic information can be matched with the third characteristic information corresponding to the first alarm type, thereby reducing invalid matching, reducing calculation amount, and improving matching efficiency.
  • inventions of the present application provide a device for reducing invalid alarms.
  • the device may be a camera, or a chip or chip system in a camera, or a server, or a chip or chip system in a server.
  • the device includes processing Unit and transceiver unit. in,
  • a processing unit configured to obtain first characteristic information of a first target, the behavior of the first target is a behavior that triggers a camera alarm; matching the first characteristic information with the characteristic information in the invalid alarm database, the invalid
  • the alarm database includes characteristic information of at least one target, and the behavior of each target in the at least one target is a behavior that triggers an invalid alarm;
  • the transceiver unit is configured to not output alarm information when the degree of matching between the first characteristic information and the characteristic information in the invalid alarm database is greater than or equal to a first threshold.
  • the transceiver unit is further configured to:
  • the processing unit is further configured to add the first characteristic information to the invalid alarm database, Otherwise, the transceiver unit is used to output alarm information.
  • the processing unit is specifically configured to:
  • the at least one second characteristic information is added to the invalid alarm database.
  • the transceiver unit is further configured to:
  • the processing unit is specifically used for:
  • a first image is obtained from the multimedia information, and the Feature extraction is performed on a first target in an image to obtain the first feature information.
  • the transceiver unit is further configured to:
  • the processing unit when the type of the alarm triggered by the first target is the first alarm type, the processing unit is specifically configured to:
  • an embodiment of the present application provides a device for reducing invalid alarms.
  • the device for reducing invalid alarms includes at least one processor; the at least one processor is configured to run a computer program or instruction to enable the device to execute The method described in the first aspect above.
  • the at least one processor executes the following steps when running a computer program or instruction:
  • the first characteristic information is matched with the characteristic information in an invalid alarm database, the invalid alarm database includes characteristic information of at least one target, and the behavior of each target in the at least one target is a behavior that triggers an invalid alarm ;
  • the device for reducing invalid alarms further includes a memory for storing computer programs or instructions.
  • an embodiment of the present application provides a computer-readable storage medium, the computer-readable storage medium stores a computer program, and the computer program includes program instructions that, when executed by a computer, cause the The computer executes the method described in the first aspect or any one of the possible designs of the first aspect.
  • an embodiment of the present application provides a computer program product, the computer program product stores a computer program, the computer program includes program instructions, and when executed by a computer, the program instructions cause the computer to execute the first Aspect or the method of any one of the possible designs of the first aspect.
  • the present application provides a chip system including a processor for implementing the method described in the first aspect or any one of the possible designs of the first aspect.
  • the chip system can be composed of chips, and can also include chips and other discrete devices.
  • the present application provides an alarm signal processing device, which includes an interface and a processor.
  • the interface is used to receive the first feature information sent by the camera or the first image corresponding to the first feature information, and the processor communicates with the interface, and is used to implement the first aspect or any one of the possible designs of the first aspect. The method described.
  • FIG. 1 is a schematic diagram of the architecture of a security monitoring system to which an embodiment of the application is applicable;
  • FIG. 2 is a schematic flowchart of a method for reducing invalid alarms according to an embodiment of the application
  • FIG. 3 is a schematic diagram of a display interface provided by an embodiment of this application.
  • FIG. 4 is a schematic flowchart of another method for reducing invalid alarms according to an embodiment of the application.
  • Figure 5 is a schematic structural diagram of a device for reducing invalid alarms provided by an embodiment of the application.
  • Fig. 6 is a schematic structural diagram of an alarm signal processing device provided by an embodiment of the application.
  • Security area can refer to areas that require security protection, such as railways in unmanned areas, fences in parks, or display cabinets where anti-theft objects are located. If an abnormal intrusion situation in a security area needs to be detected, one or more collection devices, such as cameras, can be set around the security area. The collection range of the one or more collection devices can cover the security area, for example, the security area can be part of the collection area covered by the one or more collection devices, or it can also be covered by the one or more collection devices All collection areas.
  • Security targets can refer to objects that need to be guarded (or need to be monitored), such as people, animals, or vehicles. If the security target enters the security area, an alarm can be triggered.
  • the corresponding security targets can be different in different security scenarios.
  • the security purpose of the railway in the unmanned land is mainly to prevent the surrounding wild animals from wandering on the railway causing accidents such as sudden train braking or derailment. Therefore, the security target in the security scene may be wild animals.
  • the security purpose of a fence in a zoo is mainly to prevent animals inside the fence from jumping over the fence and causing injury to tourists, and tourists entering the fence illegally, so the security targets in the security scene can be people and animals.
  • “multiple” refers to two or more than two. In view of this, “multiple” can also be understood as “at least two” in the embodiments of this application. “At least one” can be understood as one or more, for example, one, two or more. For example, including at least one refers to including one, two or more, and does not limit which ones are included. For example, including at least one of A, B, and C, then the included can be A, B, C, A and B, A and C, B and C, or A and B and C.
  • ordinal numbers such as “first” and “second” mentioned in the embodiments of the present application are used to distinguish multiple objects, and are not used to limit the order, timing, priority, or importance of multiple objects.
  • At least one camera needs to be deployed around the security area, so that the area that needs to be secured falls into the shooting area of the at least one camera in whole or in part. Then, image recognition is performed on the picture captured by the at least one camera to detect whether there is an abnormal intrusion in the security area in real time.
  • the warning information may include an image of the target.
  • the staff can judge whether the alarm triggered by the target is an invalid alarm according to the image. If the staff judges that the alarm triggered by the target is an invalid alarm, then delete the alarm information; if the staff judges that the alarm triggered by the target is a valid alarm, then respond to the alarm information.
  • the preset behavior that triggers the alarm is the wandering of a person, and the plants around the security area are swayed by the wind, and are mistakenly identified as the wandering of a person, which triggers the alarm, but in fact the plants do not belong to the security area.
  • Security targets so the staff will receive invalid warnings.
  • plants generally stay in the picture taken by the camera for a long time, and the alarm will be triggered repeatedly in windy weather. Accordingly, the staff will receive multiple invalid alarms. The staff have to screen each alarm and confirm that it is a false alarm.
  • the embodiment of the present application provides a method for reducing invalid alarms.
  • the characteristic information of the target that triggers the alarm is matched with the characteristic information in the invalid alarm database.
  • the matching degree between the two is greater than or equal to the first
  • the alarm information triggered by the target is filtered, thereby reducing the overhead of manual maintenance and improving user experience.
  • FIG. 1 is a schematic structural diagram of a possible security monitoring system to which an embodiment of this application is adapted.
  • the security monitoring system 100 may include multiple image acquisition devices 110 (including two image acquisition devices in FIG. 1) and a server 120.
  • the image collection device 110 is deployed around the security area, and is used to collect images of the security area in real time and send the collected images to the server 120.
  • the server 120 is configured to receive the picture taken by the image acquisition device, and recognize the taken picture to determine whether to trigger an alarm.
  • multiple image acquisition devices 110 may be deployed around the same security area, or may be deployed in different security areas, which is not limited in the embodiment of the present application.
  • the image acquisition device 110 includes, but is not limited to, a camera, a video camera, or a smart mobile terminal with a camera function (such as a mobile phone, a tablet computer, a portable computer), etc.
  • the specific implementation form of the image acquisition device 110 is not limited herein.
  • the image acquisition device 110 is a camera 110 as an example for introduction.
  • the server 120 includes, but is not limited to, an independent server, a server cluster, or a cloud server, etc.
  • the specific implementation form of the server 120 is not limited herein.
  • the security monitoring system 100 may further include a display 130, which is used to display an image including a target that triggers an alarm to the staff.
  • the staff can also perform input operations on the input interface (or called the display interface) of the display 130, such as deleting invalid alarm information.
  • the server 120 includes a processor 121 that can recognize the image to determine whether there is an abnormal intrusion in the security area.
  • the processor 121 may also extract feature information of the target that triggers the alarm from the image.
  • the processor 121 may be implemented in one or more of the following forms: a general-purpose processor, a central processing unit (CPU), an image signal processor (ISP), a microprocessor, and a digital signal processor. Processor (digital signal processor, DSP), or field-programmable gate array (field-programmable gate array, FPGA), etc.
  • the server 120 may further include a memory 122.
  • the memory 122 may be a read-only memory (ROM) or other types of static storage devices that can store static information and instructions, random access memory (RAM), or other types that can store information and instructions
  • the dynamic storage device can also be electrically erasable programmable read-only memory (Electrically Erasable Programmable Read-Only Memory, EEPROM), CD-ROM (Compact Disc Read-Only Memory, CD-ROM) or other optical disc storage, optical disc storage (Including compact discs, laser discs, optical discs, digital versatile discs, Blu-ray discs, etc.), magnetic disk storage media or other magnetic storage devices, or can be used to carry or store desired program codes in the form of instructions or data structures and can be used by the Any other medium accessed by the device, but not limited to this.
  • the memory 122 may exist independently and is connected to the processor 121 through a bus.
  • the memory 122 may also be integrated with the processor 121.
  • the memory 122 may be used to store the application program code for executing the solution of the present application, and the processor 121 controls the execution, that is, the processor 121 is used to execute the application program code stored in the memory 122 The method for reducing invalid alarms in the embodiments of the present application is implemented.
  • the processor 121 may also have the ability to store code inside, and the stored code can be executed without using the memory 122.
  • the camera 110 may recognize the captured image to determine whether to send alarm information to the server 120.
  • the camera 110 may include the aforementioned processor 120, and optionally, the camera 110 may further include the aforementioned memory 122.
  • the processor 121 and the memory 122 please refer to the foregoing description, which will not be repeated here.
  • the embodiments of this application can be applied to scenes that require security, for example, indoor video surveillance scenes, outdoor video surveillance scenes, night video surveillance scenes or security surveillance scenes, or can also be applied to common image shooting scenes, etc., which vary here.
  • the following describes a method for reducing invalid alarms provided by an embodiment of the present application in conjunction with the security monitoring system 100 shown in FIG. 1. Please refer to Figure 2, which shows a flowchart of this method.
  • the server 120 receives multimedia information from the camera 110.
  • the camera 110 captures images in its shooting area, obtains multimedia information, and sends the multimedia information to the server 120.
  • the server 120 receives multimedia information.
  • the multimedia information may be video data.
  • the camera 110 compresses a picture taken within a set time period into video data in the H.264/H.265 format, and then sends the video data to the server 120.
  • the multimedia information may also be image data.
  • the camera 110 extracts multiple images from the images captured by the camera 110 within a set time period, and then compresses the multiple images into image data in JPEG format, and then The image data is sent to the server 120.
  • part or all of the shooting area of the camera 110 is a security area.
  • the camera 110 needs to be deployed in the room, so that the shooting area of the camera 110 is all or part of the area in the room, that is, the shooting area of the camera 110 All areas in are security areas.
  • the wall of the park is a security area, and the camera 110 needs to be deployed around the wall, so that part of the picture in the shooting area of the camera 110 is the picture of the wall, that is, in the shooting area of the camera 110 Part of the area is a security area.
  • the server 120 detects the media information, and if it detects that there is a moving first target in the shooting area of the camera 110 and the behavior of the first target is a behavior that triggers an alarm, perform S203; otherwise, perform S201.
  • the server 120 may first determine whether there is a moving target in the shooting area according to the multimedia information (here, the detected moving target is called the first target), and then determine whether the behavior of the first target is triggering an alarm. behavior. For example, if the multimedia information is video data, the server 120 may decompress the video data, extract at least one image from the decompressed video data, and then detect the at least one image through a moving target detection method to determine the shooting area Whether there is the first goal of the movement.
  • the multimedia information is video data
  • the server 120 may decompress the video data, extract at least one image from the decompressed video data, and then detect the at least one image through a moving target detection method to determine the shooting area Whether there is the first goal of the movement.
  • the server 120 may decompress the image data to obtain at least one image, and then detect the at least one image by a moving target detection method to determine whether there is a moving first target in the shooting area.
  • the moving target detection method is a target detection method, and machine learning algorithms can be used.
  • the server 120 determines that there is no moving target in the shooting area, the server 120 executes the step of S201, that is, receives multimedia information within the next set time period. If the server 120 determines that there is a moving first target in the shooting area, the server 120 needs to determine whether the behavior of the first target is a behavior that triggers an alarm. Optionally, the server 120 may determine whether the behavior of the first target is a behavior that triggers an alarm through an alarm recognition model. For example, the server 120 may extract the first characteristic information of the first target from the image including the first target, and input the first characteristic information into the alarm recognition model to obtain the recognition result.
  • the server 120 may reduce the area of the image where the first target is located according to different reduced sizes, enlarge according to different enlarged sizes, or reduce and enlarge according to different reduced sizes and different enlarged sizes, respectively, to obtain at least one
  • the feature information of the first target is extracted from each sub-image in the at least one sub-image to obtain at least one second feature information, and then the at least one second feature information is input into the alarm recognition model to obtain a recognition result. If the recognition result is greater than or equal to the preset second threshold, the server 120 determines that the behavior of the first target is a behavior that triggers an alarm; otherwise, the behavior of the first target is not a behavior that triggers an alarm.
  • the behavior that triggers the alarm can be a behavior that is preset according to different security scenarios.
  • the wandering of wild animals on the railway in the unmanned area is the behavior that triggers the alarm
  • the behavior of people over the wall in the park security is the behavior that triggers the alarm.
  • Wait. The alarm recognition model is obtained by the server 120 performing model training on the feature information corresponding to the preset alarm-triggering behavior.
  • the corresponding model training process can refer to the prior art, which is not limited in the embodiment of the application.
  • the method of extracting the feature information of the target from the image can include but is not limited to the feature extraction method based on the histogram of oriented gradient (HOG), and the feature based on the local binary pattern (LBP) Extraction methods, feature extraction methods based on deep neural networks (DNN) or feature extraction methods based on convolutional neural networks (convolutional neural networks, CNN), etc.
  • HOG histogram of oriented gradient
  • LBP local binary pattern
  • Extraction methods feature extraction methods based on deep neural networks (DNN) or feature extraction methods based on convolutional neural networks (convolutional neural networks, CNN), etc.
  • the server 120 may determine, one by one, whether the behavior of each target in the multiple running targets is a behavior that triggers an alarm through an alarm recognition model. If the behavior of one of the multiple running targets is a behavior that triggers an alarm, the server 120 executes S203.
  • the first moving target in the shooting area that is, the first target, is taken as an example for description.
  • the server 120 determines that the behavior of the first target is not the behavior that triggers the alarm, the server 120 executes the step of S201, that is, receives the multimedia information within the next set time period. If the server 120 determines that the behavior of the first target is a behavior that triggers an alarm, the server 120 executes S203, that is, acquires a first image including the first target.
  • the abnormal intrusion detection in step S202 can be implemented by using the above-mentioned method of first detecting a moving target and then recognizing a target behavior, or can be implemented by using existing technology, which is not limited in the embodiment of the present application.
  • the server 120 obtains a first image from the multimedia information, where the first image includes the first target.
  • the multimedia information may include multiple images, each of the multiple images includes the first target, and the server 120 may select an image from the multiple images as the first image.
  • the server 120 may select the image with the most feature information of the first target among the plurality of images as the first image, or select the image with the earliest shooting time among the plurality of images as the first image, or select the image from among the plurality of images.
  • the image with the highest resolution is used as the first image, etc., which is not limited in the embodiment of the present application.
  • S204 The server 120 performs feature extraction on the first target in the first image to obtain first feature information.
  • the server 120 may not need to perform step S204, that is, the characteristic information extracted by the server 120 in step S202 may be As the first feature information, the amount of calculation can be reduced. Otherwise, the server 120 extracts the first feature information of the first target from the first image. It should be understood that, even if the server 120 has extracted the characteristic information of the first target in step S202, the server 120 may also perform step S204. For example, in step S202, the server 120 may extract the feature information of the first target according to the HOG-based feature extraction method, and in step S204, the server 120 may extract the feature information of the first target according to the CNN-based feature extraction method.
  • the server 120 may determine the area of the first target in the first image, and reduce, or enlarge, or reduce and enlarge the area according to different sizes to obtain at least one sub-image, and then At least one piece of second feature information is obtained from the feature information of the first target extracted from each of the at least one sub-image, and the at least one piece of second feature information may include the first feature information. Since the feature information of the first target included in images of different sizes may be different, the area including the first target may be reduced in different reduced sizes, enlarged in accordance with different enlarged sizes, or in accordance with different reduced sizes and differences.
  • the zoomed-in size of is reduced and enlarged to obtain at least one sub-image, and then the feature information of the first target is extracted from each sub-image in the at least one sub-image, so that the feature information of the first target can be enriched and the diversity of feature information is increased .
  • S205 The server 120 matches the first characteristic information with the characteristic information in the invalid alarm database. If the degree of matching between the first characteristic information and the characteristic information in the invalid alarm database is greater than or equal to the first threshold, execute S206; if the degree of matching between the first characteristic information and the characteristic information in the invalid alarm database is less than For the first threshold, S207 is executed.
  • the invalid alarm database stores characteristic information of at least one target, and the behavior of each target in the at least one target is a behavior that triggers an invalid alarm.
  • the characteristic information in the invalid alarm database may include the characteristic information of the target that easily triggers the invalid alarm obtained in advance according to the security scene, or the characteristic information in the invalid alarm database may include the characteristic information of the target that triggers the invalid alarm in history, or
  • the feature information in the invalid alarm database includes feature information of targets that are easy to trigger invalid alarms obtained in advance according to security scenarios, and feature information of targets that trigger invalid alarms in history.
  • the invalid alarm database may also include at least one of information such as an alarm type, a security target, a security area, or an identity (ID) of the camera.
  • the alarm type may include, but is not limited to, human cross-border behavior, human wandering behavior, human over-wall behavior, animal cross-border behavior, or vehicle cross-border behavior, etc.
  • the feature information of a target in the invalid alarm database can be obtained by performing feature extraction on sub-images of different sizes of the region in the image where the target is located, so as to increase invalidity.
  • the specific extraction process can be referred to the foregoing description, which will not be repeated here.
  • the server 120 may match the first feature information with the feature information in the invalid alarm database, or match at least one second feature information with the feature information in the invalid alarm database, to determine whether the behavior of the first target is invalid triggering The behavior of the alert.
  • the server 120 may match the first feature information with all the feature information in the invalid alarm database one by one, although the accuracy of the matching result can be guaranteed.
  • the server 120 may match the alarm type, security area, or security scenario as consideration factors to eliminate partial invalid matches, reduce the amount of calculation, and improve matching efficiency.
  • the type of the alarm triggered by the first target is the first alarm type (such as a person's behavior of overturning the wall)
  • the server 120 may obtain the third characteristic information from the invalid alarm database according to the first alarm type, and the third characteristic finely corresponds to
  • the invalid alarm triggered by the target of is the invalid alarm of the first alarm type, and then the first characteristic information is matched with the third characteristic information.
  • the server 120 may determine that the alarm triggered by the first target is an invalid alarm, that is, execute step S206; Or when the server 120 determines that the average matching degree between the first characteristic information and the set number (such as 3) of the characteristic information in the invalid alarm data is greater than or equal to the first threshold, the server 120 may determine that the first target triggers If the alarm is an invalid alarm, step S206 is executed.
  • the server 120 may send the first image to the display 130 for display, that is, step S207 is performed.
  • S206 The server 120 determines that the alarm triggered by the first target is an invalid alarm, and does not output alarm information.
  • the invalid alarm database stores the characteristic information of the target that previously triggered the invalid alarm, and/or the characteristic information of the target that easily triggers the invalid alarm, when the first characteristic information matches the characteristic information in the invalid alarm database
  • the degree is high (for example, greater than or equal to the first threshold)
  • S207 The server 120 sends the first image to the display 130 for display.
  • the server 120 sends the first image to the display 130 for display, and the display 130 uses the first image to display the first image. It is displayed on the display interface (or called the input interface), so that the staff can judge whether the alarm triggered by the first target is an invalid alarm according to the first image.
  • the server 120 sends the first image to the display 130 for display, it can also remind the staff to judge the first image displayed on the current display interface through voice, warning lights or animation.
  • FIG. 3 is a schematic diagram of a display interface.
  • the display interface 300 may include a first image 310, an invalid warning option 320, a valid warning option 330, and a second information area 340.
  • the first image 310 includes the first target 311.
  • a focus frame may be used to clarify the area of the first target 311 in the first image 310.
  • the second information area 340 is used to display second information, which is used to assist the staff in determining whether the alarm triggered by the first target in the first image is an invalid alarm.
  • the second information may include but is not limited to The ID of the camera, the address information of the security zone, the alarm type or time, etc.
  • each option in the display interface shown in FIG. 3 is only an example, which is not limited in the embodiment of the present application.
  • the second information area 340 in FIG. 3 is located on the left of the first image 310, but in fact the second information area 340 may be located above, below, or to the left of the first image 310.
  • the staff member determines that the alarm triggered by the first target is a valid alarm
  • the staff member can select the valid alarm option 330 through input methods such as keyboard input, mouse input, or voice input to execute step 210.
  • the staff member determines that the alarm triggered by the first target is an invalid alarm
  • the staff member can select the invalid alarm option 320 through input methods such as keyboard input, mouse input, or voice input to execute the content executed in step S209.
  • the server 120 receives first information from the touch screen display 130, where the first information is used to indicate whether the alarm triggered by the first target is an invalid alarm.
  • the first information may also come from other input devices such as a keyboard and a mouse.
  • the first information may be information triggered by the invalid alarm option 320 or information triggered by the valid alarm option 330.
  • the first information is used to indicate that the alarm triggered by the first target is an invalid alarm.
  • the first information is the information triggered by the valid alarm option 330, the first information is used to indicate that the alarm triggered by the first target is a valid alarm.
  • the server 120 filters the alarm information of the first target, that is, does not output the alarm information, and the server 120 may also add the first characteristic information to the invalid alarm database. In this way, repeated alarms triggered by the first target can be filtered, and manual detection links can be eliminated, manual maintenance costs can be reduced, and user performance can be improved.
  • the server 120 may add the at least one second characteristic information to the invalid alarm database in step S209 , To enrich the characteristic information of the first target and increase the diversity of the invalid alarm database, thereby improving the accuracy of judging invalid alarms.
  • step S209 the server 120 may reduce the area of the first target in the first image according to different sizes, Or zoom in, or reduce and zoom in to obtain at least one sub-image, obtain feature information of the first target from each of the at least one sub-image to obtain at least one second feature information, and then add the at least one second feature information
  • the feature information of the first target is enriched, and the diversity of the invalid alarm database is increased, so that the accuracy of judging invalid alarms can be improved.
  • the server 120 When the first information indicates that the alarm triggered by the first target is an invalid alarm, the server 120 outputs the alarm information.
  • the form, or content, or form and content of the alarm information output in different security scenarios may be different, and the ways of responding to the alarm information may also be different.
  • the alarm information may include, but is not limited to, the type of alarm, the location information that triggered the alarm, the alarm level, the security target or the number of security targets, etc.
  • the server 120 outputs the alarm information At the same time, it can also send warning information to the train at a set distance from the warning position to remind the train to decelerate in advance or whistle.
  • the alarm level is used to indicate the urgency corresponding to the alarm triggered by the target.
  • the higher the alarm level the higher the urgency.
  • the alarm information may include, but is not limited to, the type of alarm, the location information or the alarm level that triggered the alarm, etc.
  • the server 120 outputs the alarm information, it can also use the speaker near the alarm location. Give voice warnings, or notify relevant security personnel to give manual warnings.
  • the server 120 receives multimedia information from the camera 110, and the multimedia information may be video data or multiple images.
  • the server 120 detects the multimedia information, and when it detects that there is a moving first target in the shooting area of the camera 110, and the behavior of the first target is a behavior that triggers an alarm (such as area intrusion, cross-border or wandering, etc.),
  • the first feature information of the first target is extracted from the first image including the first target, that is, the behavior of triggering an alarm is recognized by the server 120 without the participation of the camera 110, which can reduce the amount of calculation of the camera 110.
  • the server 120 matches the first characteristic information with the characteristic information in the invalid alarm database.
  • the server 120 can automatically filter the alarm information triggered by the first target, that is, No alarm information is output, thereby saving manual detection links, reducing manual maintenance costs, and improving the efficiency of the alarm process and user experience.
  • the server 120 may display the first image including the first target, so that the staff can judge whether the alarm triggered by the first target is based on the first image. It is an invalid alarm.
  • the server 120 When the staff judges that the alarm triggered by the first target is an invalid alarm based on the first image, the server 120 does not output the alarm information, and at the same time adds the first characteristic information to the invalid alarm database to increase the diversity of samples in the invalid alarm database .
  • the server 120 can automatically filter the alarm information triggered by the first target without requiring staff to check again, which can reduce the probability of generating an invalid alarm, improve the accuracy of the alarm, and improve user experience.
  • the server 120 may include a hardware structure and/or a software module. Form to achieve the above functions. Whether a certain function among the above-mentioned functions is executed by a hardware structure, a software module, or a hardware structure plus a software module depends on the specific application and design constraint conditions of the technical solution.
  • FIG. 4 is a schematic flowchart of another method for reducing invalid alarms according to an embodiment of the application.
  • the server 120 receives an alarm request from the camera 110, where the alarm request includes a first image and first feature information.
  • the first image includes a first target
  • the behavior of the first target is a behavior that triggers an alarm
  • the first characteristic information is characteristic information of the first target.
  • the camera 110 photographs the picture in its shooting area, and at the same time detects the picture in its shooting area to determine whether there is a moving target in its shooting area (here, the detected moving target is called the first target), And the behavior of the first target is a behavior that triggers an alarm.
  • the camera 110 may extract at least one image from a shooting frame of a set duration, and detect the at least one image by a moving target detection method to determine whether there is a moving first target in the shooting area.
  • part or all of the shooting area of the camera 110 is a security area.
  • the moving target detection method is a target detection method, and machine learning algorithms can be used.
  • the camera 110 determines whether the behavior of the first target is a behavior that triggers an alarm.
  • the camera 110 may determine whether the behavior of the first target is a behavior that triggers an alarm through an alarm recognition model.
  • the camera 110 may extract first characteristic information of the first target from an image including the first target, and input the first characteristic information into an alarm recognition model to obtain a recognition result.
  • the camera 100 may reduce the area of the image where the first target is located according to different reduced sizes, enlarge according to different enlarged sizes, or reduce and enlarge according to different reduced sizes and different enlarged sizes, respectively, to obtain at least one
  • the feature information of the first target is extracted from each sub-image of the at least one sub-image to obtain at least one second feature information, and then the at least one second feature information is input into the alarm recognition model to obtain a recognition result. If the recognition result is greater than or equal to the preset second threshold, the camera 110 determines that the behavior of the first target is a behavior that triggers an alarm; otherwise, the behavior of the first target is not a behavior that triggers an alarm.
  • the behavior that triggers the alarm can be a behavior that is preset according to different security scenarios.
  • the wandering of wild animals on the railway in the unmanned area is the behavior that triggers the alarm
  • the behavior of people over the wall in the park security is the behavior that triggers the alarm.
  • Wait. The alarm recognition model is obtained by the camera 110 performing model training on the feature information corresponding to the preset alarm-triggering behavior.
  • the corresponding model training process can refer to the prior art, which is not limited in the embodiment of the application.
  • the camera 110 can record the first feature information of the first target or at least one second target of the first target.
  • the characteristic information is sent to the server 120.
  • the server 120 receives the first characteristic information or at least one second characteristic information.
  • the camera 110 may also send the first image including the first target to the server 120.
  • the camera 110 may select the image with the most feature information of the first target among the multiple images as the first image and send it to the server 120, or select the image with the earliest shooting time among the multiple images and send it to the server 120 as the first image. , Or select the image with the highest resolution among the multiple images as the first image and send it to the server 120, etc., which is not limited in the embodiment of the present application.
  • S402 The server 120 matches the first characteristic information with the characteristic information in the invalid alarm database. If the degree of matching between the first characteristic information and the characteristic information in the invalid alarm database is greater than or equal to the first threshold, execute S403; if the degree of matching between the first characteristic information and the characteristic information in the invalid alarm database is less than For the first threshold, S404 is executed.
  • the invalid alarm database stores characteristic information of at least one target, and the behavior of each target in the at least one target is a behavior that triggers an invalid alarm.
  • the characteristic information in the invalid alarm database may include the characteristic information of the target that easily triggers the invalid alarm obtained in advance according to the security scene, or the characteristic information in the invalid alarm database may include the characteristic information of the target that triggers the invalid alarm in history, or
  • the feature information in the invalid alarm database includes feature information of targets that are easy to trigger invalid alarms obtained in advance according to security scenarios, and feature information of targets that trigger invalid alarms in history.
  • the invalid alarm database may also include at least one of information such as an alarm type, a security target, a security area, or the identity of a camera.
  • the alarm type may include, but is not limited to, human cross-border behavior, human wandering behavior, human over-wall behavior, animal cross-border behavior, or vehicle cross-border behavior, etc.
  • the feature information of a target in the invalid alarm database can be obtained by performing feature extraction on sub-images of different sizes of the region in the image where the target is located, so as to increase invalidity.
  • the specific extraction process can be referred to the foregoing description, which will not be repeated here.
  • the server 120 may match the first feature information with the feature information in the invalid alarm database, or match at least one second feature information with the feature information in the invalid alarm database, to determine whether the behavior of the first target is invalid triggering The behavior of the alert.
  • the server 120 may match the first feature information with all the feature information in the invalid alarm database one by one, although the accuracy of the matching result can be guaranteed.
  • the server 120 may match the alarm type, security area, or security scenario as consideration factors to eliminate partial invalid matches, reduce the amount of calculation, and improve matching efficiency.
  • the type of the alarm triggered by the first target is the first alarm type (such as the behavior of a person overturning the wall)
  • the server 120 may obtain the third characteristic information from the invalid alarm database according to the first alarm type, and the third characteristic finely corresponds to
  • the invalid alarm triggered by the target of is the invalid alarm of the first alarm type, and then the first characteristic information is matched with the third characteristic information.
  • the server 120 may determine that the alarm triggered by the first target is an invalid alarm, that is, execute step S403; Or when the server 120 determines that the average matching degree between the first characteristic information and the set number (such as 3) of the characteristic information in the invalid alarm data is greater than or equal to the first threshold, the server 120 may determine that the first target triggers If the alarm is an invalid alarm, step S403 is executed.
  • the server 120 may send the first image to the display 130 for display, that is, step S404 is performed.
  • S403 The server 120 determines that the alarm triggered by the first target is an invalid alarm, and does not output alarm information. This step can also be understood as terminating the alarm request sent by the camera.
  • the invalid alarm database stores the characteristic information of the target that previously triggered the invalid alarm, and/or the characteristic information of the target that easily triggers the invalid alarm, when the first characteristic information matches the characteristic information in the invalid alarm database
  • the degree is high (for example, greater than or equal to the first threshold)
  • S404 The server 120 sends the first image to the display 130 for display.
  • the server 120 sends the first image to the display 130 for display, and the display 130 uses the first image to display the first image. It is displayed on the display interface (or called the input interface), so that the staff can judge whether the alarm triggered by the first target is an invalid alarm according to the first image.
  • the server 120 sends the first image to the display 130 for display, it can also remind the staff to judge the first image displayed on the current display interface through voice, warning lights or animation.
  • the display interface can be seen in Figure 3, which will not be repeated here.
  • the server 120 receives the first information from the touch screen display 130, where the first information is used to indicate whether the alarm triggered by the first target is an invalid alarm.
  • the first information may also come from other input devices such as a keyboard and a mouse.
  • the first information may be information triggered by the invalid alarm option 320 or information triggered by the valid alarm option 330.
  • the first information is used to indicate that the alarm triggered by the first target is an invalid alarm.
  • the first information is the information triggered by the valid alarm option 330, the first information is used to indicate that the alarm triggered by the first target is a valid alarm.
  • the server 120 filters the alarm request from the camera and does not output the alarm information.
  • the server 120 can also add the first characteristic information to the invalid alarm database, so that it can filter The repetitive alarm triggered by the first target eliminates the need for manual detection, which can reduce the overhead of manual maintenance and improve user performance.
  • step S401 the server 120 has acquired at least one second characteristic information of the first target
  • step S406 the server 120 may add the at least one second characteristic information to the invalid alarm database to enrich The feature information of the first target increases the diversity of the invalid alarm database, thereby improving the accuracy of judging invalid alarms.
  • step S401 the server 120 does not obtain at least one second feature information of the first target
  • step S406 the server 120 may reduce, or enlarge, or enlarge, or enlarge, or reduce, the area of the first target in the first image according to different sizes.
  • the feature information of the first target is enriched, and the diversity of the invalid alarm database is increased, so that the accuracy of judging invalid alarms can be improved.
  • the server 120 When the first information indicates that the alarm triggered by the first target is an invalid alarm, the server 120 outputs the alarm information.
  • the form, or content, or form and content of the alarm information output in different security scenarios may be different, and the ways of responding to the alarm information may also be different.
  • the alarm information may include, but is not limited to, the type of alarm, the location information that triggered the alarm, the alarm level, the security target or the number of security targets, etc.
  • the server 120 outputs the alarm information At the same time, it can also send warning information to the train at a set distance from the warning position to remind the train to decelerate in advance or whistle.
  • the alarm level is used to indicate the urgency corresponding to the alarm triggered by the target.
  • the higher the alarm level the higher the urgency.
  • the alarm information may include, but is not limited to, the type of alarm, the location information or the alarm level that triggered the alarm, etc.
  • the server 120 outputs the alarm information, it can also use the speaker near the alarm location. Give voice warnings, or notify relevant security personnel to give manual warnings.
  • the server 120 receives the first characteristic information from the camera 110, the first characteristic information is that the camera 110 detects that there is a first target moving in its shooting area, and the behavior of the first target is to trigger an alarm Is sent after extracting the first characteristic information of the first target from the first image that includes the first target. That is, the behavior that triggers the alarm is recognized by the camera 110 without sending multimedia information to the server 120 in real time to identify the behavior that triggers the alarm, which can reduce the load of the server 120 and save network resources.
  • the server 120 may include a hardware structure and/or a software module. Form to achieve the above functions. Whether a certain function among the above-mentioned functions is executed by a hardware structure, a software module, or a hardware structure plus a software module depends on the specific application and design constraint conditions of the technical solution.
  • the embodiment of the present application also provides a device for reducing invalid alarms.
  • FIG. 5 shows a schematic structural diagram of a device 500 for reducing invalid alarms.
  • the device 500 for reducing invalid alarms can be used to implement the function of the server 120 in the embodiment shown in FIG. 2 or 4, that is, the function of the server 120 in the embodiment shown in FIG. 1.
  • the device 500 for reducing invalid alarms may be a hardware structure, a software module, or a hardware structure plus a software module.
  • the device 500 for reducing invalid alarms can be implemented by a chip or a chip system. In the embodiments of the present application, the chip system may be composed of chips, or may include chips and other discrete devices.
  • the apparatus 500 for reducing invalid alarms may include a processing unit 501 and a transceiver unit 502.
  • the processing unit 501 can execute steps S202 to S206, step S209, and step S210 in the embodiment shown in FIG. 2, and/or other processes for supporting the technology described herein.
  • the processing unit 501 can be used to communicate with the receiving unit 502, or the processing unit 501 can communicate with other modules of the security system 100, which can be circuits, devices, interfaces, buses, software modules, transceivers, etc. Device or any other device that can realize communication.
  • the receiving unit 502 may perform step S201, step S207, and step S208 in the embodiment shown in FIG. 2, and/or other processes for supporting the technology described herein.
  • the receiving unit 502 can be used to communicate with the processing unit 501, or can communicate with other modules of the security system 100, which can be circuits, devices, interfaces, buses, software modules, transceivers, or other modules. Any device that can realize communication.
  • the processing unit 501 may execute step S402, step S403, step S406, and step S407 in the embodiment shown in FIG. 4, and/or other processes for supporting the technology described herein.
  • the processing unit 501 can be used to communicate with the receiving unit 502, or the processing unit 501 can communicate with other modules of the security system 100, which can be circuits, devices, interfaces, buses, software modules, transceivers, etc. Device or any other device that can realize communication.
  • the receiving unit 502 may perform step S401, step S404, and step S407 in the embodiment shown in FIG. 4, and/or other processes for supporting the technology described herein.
  • the receiving unit 502 can be used to communicate with the processing unit 501, or can communicate with other modules of the security system 100, which can be circuits, devices, interfaces, buses, software modules, transceivers, or other modules. Any device that can realize communication.
  • the division of modules in the embodiment shown in FIG. 5 is illustrative, and it is only a logical function division. In actual implementation, there may be other division methods.
  • the functional modules in the various embodiments of the present application may be integrated In a processor, it may exist alone physically, or two or more modules may be integrated into one module.
  • the above-mentioned integrated modules can be implemented in the form of hardware or software functional modules.
  • FIG. 6 shows an alarm signal processing device 600 provided in an embodiment of the application, where the alarm signal processing device 600 may be used to implement the function of the server 120 in the embodiment shown in FIG. 2 and/or FIG. 4.
  • the processor 601 in the alarm signal processing device 600 may be a chip or a chip system. In the embodiments of the present application, the chip system may be composed of chips, or may include chips and other discrete devices.
  • the alarm signal processing device 600 is, for example, an independent server, a calculator, a server cluster, or a cloud server.
  • the alarm signal processing device 600 includes at least one processor 601 for implementing or used for the alarm signal processing device 600 to implement the functions of the server 120 in the embodiment shown in FIG. 2 and/or FIG. 4.
  • the processor 601 may obtain the first characteristic information of the first target, and the behavior of the first target is the behavior that triggers the camera alarm; the first characteristic information is matched with the characteristic information in the invalid alarm database, and the invalid alarm database is The characteristic information of at least one target is included, and the behavior of each target in the at least one target is a behavior that triggers an invalid alarm; if the degree of matching between the first characteristic information and the characteristic information in the invalid alarm database is greater than or equal to the first threshold, No warning information is output.
  • the processor 601 may obtain the first characteristic information of the first target, and the behavior of the first target is the behavior that triggers the camera alarm; the first characteristic information is matched with the characteristic information in the invalid alarm database, and the invalid alarm database is The characteristic information of at least one target is included, and the behavior of each target in the at least one target
  • the alarm signal processing device 600 may also include at least one memory 602 for storing program instructions and/or data.
  • the memory 602 and the processor 601 are coupled.
  • the coupling in the embodiments of the present application is an indirect coupling or communication connection between devices, units or modules, and may be in electrical, mechanical or other forms, and is used for information exchange between devices, units or modules.
  • the processor 601 may operate in cooperation with the memory 602.
  • the processor 601 may execute program instructions stored in the memory 602. At least one of the at least one memory may be included in the processor.
  • the memory 602 may be integrated in the processor 601.
  • the alarm signal processing device 600 may further include an interface 603 for communicating with the processor 601 or for communicating with other devices through a transmission medium, so that the alarm signal processing device 600 can communicate with other devices.
  • the other device may be a computing module.
  • the processor 601 may use the interface 603 to send and receive data, for example, to receive multimedia information or an alarm request sent by a camera, where the alarm request includes the first characteristic information and a first image corresponding to the first characteristic information.
  • the specific connection medium between the aforementioned interface 603, the processor 601, and the memory 602 is not limited in the embodiment of the present application.
  • the memory 602, the processor 601, and the interface 603 are connected by a bus 604.
  • the bus is represented by a thick line in FIG. It is not limited.
  • the bus can be divided into an address bus, a data bus, a control bus, and so on. For ease of representation, only one thick line is used in FIG. 6, but it does not mean that there is only one bus or one type of bus.
  • the processor 601 may be a general-purpose processor, a digital signal processor, an application specific integrated circuit, a field programmable gate array or other programmable logic device, a discrete gate or transistor logic device, or a discrete hardware component, which can implement Or execute the methods, steps, and logical block diagrams disclosed in the embodiments of the present application.
  • the general-purpose processor may be a microprocessor or any conventional processor or the like.
  • the steps of the method disclosed in combination with the embodiments of the present application may be directly embodied as being executed and completed by a hardware processor, or executed and completed by a combination of hardware and software modules in the processor.
  • the memory 602 may be a non-volatile memory, such as a hard disk drive (HDD) or a solid-state drive (SSD), etc., or a volatile memory (volatile memory).
  • a non-volatile memory such as a hard disk drive (HDD) or a solid-state drive (SSD), etc.
  • a volatile memory volatile memory
  • RAM random access memory
  • the memory is any other medium that can be used to carry or store desired program codes in the form of instructions or data structures and that can be accessed by a computer, but is not limited to this.
  • the memory 602 in the embodiment of the present application may also be a circuit or any other device capable of realizing a storage function for storing program instructions and/or data.
  • An embodiment of the present application also provides a computer-readable storage medium, including instructions, which when run on a computer, cause the computer to execute the method executed by the server 120 in the embodiment shown in FIG. 2 and/or FIG. 4.
  • the embodiment of the present application provides a chip system.
  • the chip system includes a processor and may also include a memory for implementing the function of the server 120 in the foregoing method.
  • the chip system can be composed of chips, and can also include chips and other discrete devices.
  • the embodiment of the present application provides a device for reducing invalid alarms, and the device includes the server 120 in the embodiment shown in FIG. 2 and/or FIG. 4.
  • the methods provided in the embodiments of the present application may be implemented in whole or in part by software, hardware, firmware, or any combination thereof.
  • software When implemented by software, it can be implemented in the form of a computer program product in whole or in part.
  • the computer program product includes one or more computer instructions.
  • the computer may be a general-purpose computer, a special-purpose computer, a computer network, network equipment, user equipment, or other programmable devices.
  • the computer instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another computer-readable storage medium. For example, the computer instructions may be transmitted from a website, computer, server, or data center.
  • a computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server or data center integrated with one or more available media.
  • the available medium may be a magnetic medium (for example, a floppy disk, hard disk, Magnetic tape), optical media (for example, digital video disc (DVD for short)), or semiconductor media (for example, SSD).

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Alarm Systems (AREA)

Abstract

A method and device for reducing invalid warnings. The method is applied to a security monitoring system. The method comprises: when a camera or a server detects that a behavior of a first target is a warning triggering behavior, obtaining first feature information of the first target; and then matching the first feature information with feature information in an invalid warning database. Because the invalid warning database stores feature information of targets that triggered invalid warnings before, and/or pre-stored feature information of targets that are prone to triggering invalid warnings, when the matching degree between the first feature information and the feature information in the invalid warning database is high (e.g., greater than or equal to a first threshold), this indicates that the warning triggered by the first target is an invalid warning, and the warning information triggered by the first target can be filtered, i.e., no warning information is outputted. The probability of generating an invalid warning is reduced, and the warning accuracy is improved, thereby improving user experience.

Description

一种减少无效告警的方法及装置Method and device for reducing invalid alarm
本申请要求于2020年05月08日提交的申请号为202010383960.6、发明名称为“一种减少无效告警的方法及装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。This application claims the priority of the Chinese patent application with the application number 202010383960.6 and the invention title "A method and device for reducing invalid alarms" filed on May 8, 2020, the entire content of which is incorporated into this application by reference.
技术领域Technical field
本申请涉及图像处理领域,尤其涉及一种减少无效告警的方法及装置。This application relates to the field of image processing, and in particular to a method and device for reducing invalid alarms.
背景技术Background technique
为了安全起见,对于一些特殊的区域,比如铁路、动物园的围栏或陈列的珍贵物品等,需要采取安防措施,传统的安防措施主要是以人工巡逻为主。传统的安防措施存在人工开销大,安防效率低以及环境适应性差等缺点,现在对于这些特殊的区域引入了更为智能的异常入侵检测技术,例如当检测到有异常入侵行为时触发告警。For the sake of safety, some special areas, such as railways, zoo fences or precious items on display, need to take security measures. Traditional security measures are mainly manual patrols. Traditional security measures have disadvantages such as high labor costs, low security efficiency, and poor environmental adaptability. Nowadays, more intelligent abnormal intrusion detection technologies are introduced for these special areas, such as triggering an alarm when abnormal intrusion behavior is detected.
目前的异常入侵检测一般以图像处理技术为基础。在以图像处理技术为基础的异常入侵检测技术中,先将至少一个摄像机部署在安防区域的周围,摄像机可实时拍摄,然后对至少一个摄像机所拍摄到的画面进行图像识别。当识别确定该安防区域存在运动的目标,且确定该目标的行为是预设的触发告警的行为时,则触发告警,并将该目标的告警信息上报给工作人员进行处理。The current anomaly intrusion detection is generally based on image processing technology. In the abnormal intrusion detection technology based on image processing technology, at least one camera is first deployed around the security area, the camera can shoot in real time, and then the image captured by the at least one camera is recognized. When it is determined that there is a moving target in the security area, and it is determined that the behavior of the target is a preset behavior that triggers an alarm, an alarm is triggered, and the alarm information of the target is reported to the staff for processing.
例如,预设的触发告警的行为是人的徘徊行为,而由于安防区域所处的环境具有多样性,安防区域周围的植物在风的吹动下也会来回摇晃,这可能会被错误地识别为人的徘徊,从而触发告警。但实际上植物并不属于该安防区域的安防目标,因此工作人员会收到无效的告警信息。同时植物一般会长时间滞留在摄像机拍摄的画面中,可能会触发多次告警,相应地工作人员会收到多次无效告警信息。可见,目前的异常入侵检测技术中,产生无效告警的概率较高,导致告警的准确率较低。For example, the preset behavior that triggers an alarm is human wandering behavior, and because of the diversity of the environment in the security area, the plants around the security area will also shake back and forth under the blow of the wind, which may be misidentified Wandering as a person, triggering an alarm. But in fact, the plant does not belong to the security target of the security area, so the staff will receive invalid warning information. At the same time, plants generally stay in the picture taken by the camera for a long time, which may trigger multiple alarms, and correspondingly, the staff will receive multiple invalid alarm messages. It can be seen that in the current abnormal intrusion detection technology, the probability of generating invalid alarms is high, resulting in low accuracy of alarms.
发明内容Summary of the invention
本申请实施例提供了一种减少无效告警的方法及装置,可以降低产生无效告警的概率,提高告警的准确率,提高用户体验。The embodiments of the present application provide a method and device for reducing invalid alarms, which can reduce the probability of generating invalid alarms, improve the accuracy of alarms, and improve user experience.
第一方面,本申请实施例提供一种减少无效告警的方法,该方法可以由摄像机、或摄像机中的芯片或芯片系统实现,也可以由服务器、或服务器中的芯片或芯片系统实现,该方法包括:先获取第一目标的第一特征信息,然后将该第一特征信息与无效告警数据库中的特征信息进行匹配,当第一特性信息与无效告警数据库中的特征信息之间的匹配度小于第一阈值时,不输出告警信息。In the first aspect, the embodiments of the present application provide a method for reducing invalid alarms. The method can be implemented by a camera, or a chip or a chip system in the camera, or a server, or a chip or a chip system in the server. Including: first obtain the first characteristic information of the first target, and then match the first characteristic information with the characteristic information in the invalid alarm database, when the degree of matching between the first characteristic information and the characteristic information in the invalid alarm database is less than At the first threshold, no alarm information is output.
其中,告警数据库中包括至少一个目标的特征信息,该至少一个目标中的每个目标的行为是触发无效告警的行为。上述第一目标的行为是触发告警的行为。例如,上述方法由摄像机实现,则第一目标的行为是触发摄像机告警的行为。再例如,上述方法由服务器实现,则第一目标的行为可以是触发摄像机告警的行为,也可以是触发服务器告警的行为。Wherein, the alarm database includes characteristic information of at least one target, and the behavior of each target in the at least one target is a behavior that triggers an invalid alarm. The above-mentioned behavior of the first target is the behavior of triggering an alarm. For example, if the above method is implemented by a camera, the behavior of the first target is a behavior that triggers an alarm of the camera. For another example, if the foregoing method is implemented by a server, the behavior of the first target may be a behavior that triggers a camera alarm, or a behavior that triggers a server alarm.
在上述技术方案中,当摄像机或服务器检测到第一目标的行为是触发警告的行为(如越线、区域入侵或徘徊等)时,获取第一目标的第一特征信息,然后将第一特征信息与无效告警数据库中的特征信息进行匹配。由于该无效告警数据库中存储有以前触发无效告警的目标的特征信息,和/或容易触发无效告警的目标的特征信息,因此当第一特征信息与该无效告警数据库中的特征信息之间的匹配度较高(如大于或等于第一阈值)时,表明该第一目标所触 发的告警是无效的告警,可以自动过滤该第一目标触发的告警信息,即不输出告警信息,从而节省人工检测环节,降低产生无效告警的概率,提高告警的准确率,从而提高用户体验。In the above technical solution, when the camera or the server detects that the behavior of the first target is a behavior that triggers a warning (such as crossing the line, area intrusion, or wandering, etc.), the first characteristic information of the first target is acquired, and then the first characteristic The information is matched with the characteristic information in the invalid alarm database. Since the invalid alarm database stores the characteristic information of the target that previously triggered the invalid alarm, and/or the characteristic information of the target that easily triggers the invalid alarm, when the first characteristic information matches the characteristic information in the invalid alarm database When the level is high (such as greater than or equal to the first threshold), it indicates that the alarm triggered by the first target is an invalid alarm. The alarm information triggered by the first target can be automatically filtered, that is, no alarm information is output, thereby saving manual detection. Link, reduce the probability of generating invalid alarms, improve the accuracy of alarms, thereby improving user experience.
换言之,执行本方案方法的设备(例如告警服务器,或者云服务平台)会收到摄像机频繁发出了告警,但是经过告警平台的进一步确认,如果与无效告警数据库中的特征信息之间的匹配度较高,这意味着这个告警是一个无需关注的错误告警(误报),因此告警平台会终结告警从而不会真正输出告警信息给用户,减少了用户受到误报的干扰。In other words, the device (such as the alarm server or cloud service platform) that implements the method of this solution will receive frequent alarms from the camera, but after further confirmation by the alarm platform, if the matching degree between the feature information and the feature information in the invalid alarm database is better High, which means that the alarm is an error alarm (false alarm) that does not need attention. Therefore, the alarm platform will terminate the alarm and will not actually output the alarm information to the user, reducing the interference of the user from the false alarm.
在第一方面的一种可能的设计中,当第一特征信息与无效告警数据库中的特征信息之间的匹配度小于第一阈值时,接收来自输入界面的第一信息,该第一信息用于指示第一目标触发的告警是否为无效告警;当该第一信息用于指示第一目标触发的告警为无效告警时,不输出告警信息,并将第一特征信息添加到无效告警数据库中,否则,输出告警信息。In a possible design of the first aspect, when the degree of matching between the first feature information and the feature information in the invalid alarm database is less than the first threshold, the first information from the input interface is received, and the first information is used To indicate whether the alarm triggered by the first target is an invalid alarm; when the first information is used to indicate that the alarm triggered by the first target is an invalid alarm, no alarm information is output, and the first characteristic information is added to the invalid alarm database, Otherwise, output alarm information.
以上述方法由服务器实现为例,当第一特征信息与该无效告警数据库中的特征信息之间的匹配度较低(如小于第一阈值)时,服务器可以将包括第一目标的第一图像进行显示,以使得工作人员根据第一图像判断第一目标触发的告警是否为无效的告警,并将判断结果(记为第一信息)输入(如鼠标输入、键盘输入或语音输入等)到输入界面中。当第一信息用于指示第一目标触发的告警为有效告警时,服务器输出告警信息;当第一信息用于指示第一目标触发的告警为无效告警时,服务器过滤第一目标触发的告警信息,即不输出告警信息,并将第一特征信息添加到无效告警数据库中。当前无效告警数据库中的特征信息与第一特征信息之间的匹配度较低,但工作人员又确定该第一目标触发的告警为无效告警,服务器将第一特征信息添加到无效告警数据库中,可以增加无效告警数据库中样本的多样性。当第一目标再次触发告警时,可以自动过滤第一目标触发的告警信息,无需工作人员进行再次检查,减少了人工维护的开销,提高用户体验。Taking the foregoing method implemented by the server as an example, when the degree of matching between the first feature information and the feature information in the invalid alarm database is low (for example, less than the first threshold), the server may include the first image of the first target Display so that the staff can judge whether the alarm triggered by the first target is an invalid alarm according to the first image, and input the judgment result (recorded as the first information) (such as mouse input, keyboard input or voice input) into the input Interface. When the first information is used to indicate that the alarm triggered by the first target is a valid alarm, the server outputs alarm information; when the first information is used to indicate that the alarm triggered by the first target is an invalid alarm, the server filters the alarm information triggered by the first target , That is, no alarm information is output, and the first characteristic information is added to the invalid alarm database. The matching degree between the feature information in the current invalid alarm database and the first feature information is low, but the staff determines that the alarm triggered by the first target is an invalid alarm, and the server adds the first feature information to the invalid alarm database. The diversity of samples in the invalid alarm database can be increased. When the first target triggers an alarm again, the alarm information triggered by the first target can be automatically filtered, without the need for staff to check again, which reduces the overhead of manual maintenance and improves user experience.
在第一方面的一种可能的设计中,将第一特征信息添加到无效告警数据库中,包括:获取第一图像,该第一图像中包括第一目标;确定该第一目标在第一图像中的区域,然后对该区域按照不同的尺寸进行缩小和/或放大,得到至少一个子图像;从至少一个子图像中的每个子图像中提取该第一目标的特征信息,得到至少一个第二特征信息,该至少一个第二特征信息包括第一特征信息;然后将至少一个第二特征信息添加到无效告警数据库中。In a possible design of the first aspect, adding the first feature information to the invalid alarm database includes: acquiring a first image, the first image includes a first target; determining that the first target is in the first image Then, the area is reduced and/or enlarged according to different sizes to obtain at least one sub-image; the feature information of the first target is extracted from each sub-image in the at least one sub-image to obtain at least one second Characteristic information, the at least one second characteristic information includes the first characteristic information; then the at least one second characteristic information is added to the invalid alarm database.
在上述设计中,由于不同尺寸的图像中所包括的第一目标的特征信息可能不一样,通过将包括第一目标的区域按照不同的缩小尺寸进行缩小、按照不同的放大尺寸进行放大、或者按照不同的缩小尺寸和不同的放大尺寸分别进行缩小和放大,得到至少一个子图像,然后将基于该至少一个子图像中每个子图像得到的特征信息添加到无效告警数据库中,这样可以丰富第一目标的特征信息,增加特征信息的多样性,从而可以提高自动判断无效告警的准确性。In the above design, since the feature information of the first target included in images of different sizes may be different, the area including the first target may be reduced according to different reduced sizes, enlarged according to different enlarged sizes, or according to Different reduction sizes and different enlargement sizes are respectively reduced and enlarged to obtain at least one sub-image, and then the feature information obtained based on each sub-image in the at least one sub-image is added to the invalid alarm database, which can enrich the first target To increase the diversity of feature information, the accuracy of automatic judgment of invalid alarms can be improved.
在第一方面的一种可能的设计中,获取第一目标的第一特征信息,包括:接收来自摄像机的多媒体信息;当检测到摄像机的拍摄区域中存在运动的第一目标、且第一目标的行为是触发告警的行为时,从多媒体信息中获得第一图像,并对第一图像中的第一目标进行特征提取得到第一特征信息。In a possible design of the first aspect, acquiring the first feature information of the first target includes: receiving multimedia information from the camera; when it is detected that there is a moving first target in the shooting area of the camera, and the first target The behavior of is to obtain the first image from the multimedia information when an alarm is triggered, and perform feature extraction on the first target in the first image to obtain the first feature information.
在上述设计中,服务器接收来自摄像机的多媒体信息,该多媒体信息可以是视频数据,也可以是多个图像。服务器对该多媒体信息进行检测,当检测到摄像机拍摄的区域中存在运动的第一目标,且该第一目标的行为是触发告警的行为(如区域入侵、越界或徘徊等)时,从包括该第一目标的第一图像中提取该第一目标的第一特征信息。也即是触发告警的行为由服务器进行识别无需摄像机进行识别,可以减少摄像机的负荷。In the above design, the server receives multimedia information from the camera. The multimedia information may be video data or multiple images. The server detects the multimedia information, and when it detects that there is a moving first target in the area captured by the camera, and the behavior of the first target is a behavior that triggers an alarm (such as area intrusion, cross-border or wandering, etc.), it will not include the The first feature information of the first target is extracted from the first image of the first target. That is, the behavior that triggers the alarm is recognized by the server without the need for the camera to recognize, which can reduce the load of the camera.
在第一方面的一种可能的设计中,获取第一目标的第一特性信息,包括:接收来自摄像机的第一特征信息。In a possible design of the first aspect, acquiring the first characteristic information of the first target includes: receiving the first characteristic information from the camera.
在上述设计中,服务器接收来自摄像机的第一特征信息,该第一特征信息是摄像机检测到其拍摄区域中存在运动的第一目标,且该第一目标的行为是触发告警的行为时,从包括该第一目标的第一图像中提取该第一目标的第一特征信息后发送的。也即是触发告警的行为由摄像机进行识别无需实时地向服务器发送多媒体信息以识别触发告警的行为,可以减少服务器的负荷以及节省网络资源。In the above design, the server receives the first feature information from the camera. The first feature information is the first target that the camera detects that there is motion in its shooting area, and the behavior of the first target is a behavior that triggers an alarm. It is sent after extracting the first characteristic information of the first target from the first image including the first target. That is, the behavior that triggers the alarm is recognized by the camera without sending multimedia information to the server in real time to identify the behavior that triggers the alarm, which can reduce the load on the server and save network resources.
在第一方面的一种可能的设计中,在第一目标触发的告警的类型为第一告警类型时,将第一特征信息与无效告警数据库中的特征信息进行匹配,包括:根据第一告警类型,确定无效告警数据库中的第三特征信息,第三特征信息对应的目标所触发的无效告警为第一告警类型的无效告警;将第一特征信息与第三特征信息进行匹配。In a possible design of the first aspect, when the type of the alarm triggered by the first target is the first alarm type, matching the first characteristic information with the characteristic information in the invalid alarm database includes: according to the first alarm Type, determine the third characteristic information in the invalid alarm database, the invalid alarm triggered by the target corresponding to the third characteristic information is an invalid alarm of the first alarm type; the first characteristic information is matched with the third characteristic information.
在上述设计中,由于不同告警类型对应的目标的行为之间的差异较大,故不同告警类型对应的特征信息之间的差异也较大。因此,在确定是否过滤第一目标的告警信息时,无需将第一特征信息与无效告警数据库中所包括的所有的特征信息进行一一匹配,而是以告警类型为参考因素,仅将第一特征信息与第一告警类型对应的第三特征信息进行匹配即可,从而可以减少无效匹配,减少计算量,提高匹配效率。In the above design, since the behaviors of targets corresponding to different alarm types have large differences, the difference between the characteristic information corresponding to different alarm types is also large. Therefore, when determining whether to filter the alarm information of the first target, there is no need to match the first feature information with all the feature information included in the invalid alarm database. The characteristic information can be matched with the third characteristic information corresponding to the first alarm type, thereby reducing invalid matching, reducing calculation amount, and improving matching efficiency.
第二方面,本申请实施例提供一种减少无效告警的装置,该装置可以是摄像机,或摄像机中的芯片或芯片系统,也可以是服务器、或服务器中的芯片或芯片系统,该装置包括处理单元和收发单元。其中,In the second aspect, embodiments of the present application provide a device for reducing invalid alarms. The device may be a camera, or a chip or chip system in a camera, or a server, or a chip or chip system in a server. The device includes processing Unit and transceiver unit. in,
处理单元,用于获取第一目标的第一特征信息,所述第一目标的行为是触发摄像机告警的行为;将所述第一特征信息与无效告警数据库中的特征信息进行匹配,所述无效告警数据库中包括至少一个目标的特征信息,所述至少一个目标中的每个目标的行为是触发无效告警的行为;A processing unit, configured to obtain first characteristic information of a first target, the behavior of the first target is a behavior that triggers a camera alarm; matching the first characteristic information with the characteristic information in the invalid alarm database, the invalid The alarm database includes characteristic information of at least one target, and the behavior of each target in the at least one target is a behavior that triggers an invalid alarm;
收发单元,用于当所述第一特征信息与所述无效告警数据库中的特征信息之间的匹配度大于或等于第一阈值时,不输出告警信息。The transceiver unit is configured to not output alarm information when the degree of matching between the first characteristic information and the characteristic information in the invalid alarm database is greater than or equal to a first threshold.
在第二方面的一种可能的设计中,所述收发单元,进一步用于:In a possible design of the second aspect, the transceiver unit is further configured to:
当所述第一特征信息与所述无效告警数据库中的特征信息之间的匹配度小于第一阈值时,接收来自输入界面的第一信息,所述第一信息用于指示所述第一目标触发的告警是否为无效告警;When the degree of matching between the first feature information and the feature information in the invalid alarm database is less than a first threshold, receive first information from an input interface, where the first information is used to indicate the first target Whether the triggered alarm is an invalid alarm;
当所述第一信息用于指示所述第一目标触发的告警为无效告警时,不输出告警信息,所述处理单元进一步用于将所述第一特征信息添加到所述无效告警数据库中,否则,所述收发单元用于输出告警信息。When the first information is used to indicate that the alarm triggered by the first target is an invalid alarm, no alarm information is output, and the processing unit is further configured to add the first characteristic information to the invalid alarm database, Otherwise, the transceiver unit is used to output alarm information.
在第二方面的一种可能的设计中,所述处理单元,具体用于:In a possible design of the second aspect, the processing unit is specifically configured to:
获取第一图像,所述第一图像中包括所述第一目标;Acquiring a first image, the first image including the first target;
确定所述第一目标在所述第一图像中的区域;Determine the area of the first target in the first image;
对所述区域按照不同的尺寸进行缩小和/或放大,得到至少一个子图像;Reduce and/or enlarge the area according to different sizes to obtain at least one sub-image;
从所述至少一个子图像中的每个子图像中提取所述第一目标的特征信息,得到至少一个第二特征信息,所述至少一个第二特征信息包括所述第一特征信息;Extracting characteristic information of the first target from each of the at least one sub-image to obtain at least one second characteristic information, where the at least one second characteristic information includes the first characteristic information;
将所述至少一个第二特征信息添加到所述无效告警数据库中。The at least one second characteristic information is added to the invalid alarm database.
在第二方面的一种可能的设计中,所述收发单元,进一步用于:In a possible design of the second aspect, the transceiver unit is further configured to:
接收来自所述摄像机的多媒体信息;Receiving multimedia information from the camera;
所述处理单元,具体用于:The processing unit is specifically used for:
当检测到所述摄像机的拍摄区域中存在运动的所述第一目标、且所述第一目标的行为是触发告警的行为时,从所述多媒体信息中获得第一图像,并对所述第一图像中的第一目标进行特征提取得到所述第一特征信息。When it is detected that there is a moving first target in the shooting area of the camera, and the behavior of the first target is a behavior that triggers an alarm, a first image is obtained from the multimedia information, and the Feature extraction is performed on a first target in an image to obtain the first feature information.
在第二方面的一种可能的设计中,所述收发单元,进一步用于:In a possible design of the second aspect, the transceiver unit is further configured to:
接收来自所述摄像机的所述第一特征信息。Receiving the first characteristic information from the camera.
在第二方面的一种可能的设计中,在所述第一目标触发的告警的类型为第一告警类型时,所述处理单元,具体用于:In a possible design of the second aspect, when the type of the alarm triggered by the first target is the first alarm type, the processing unit is specifically configured to:
根据所述第一告警类型,确定所述无效告警数据库中的第三特征信息,所述第三特征信息对应的目标所触发的无效告警为所述第一告警类型的无效告警;Determine the third characteristic information in the invalid alarm database according to the first alarm type, and the invalid alarm triggered by the target corresponding to the third characteristic information is the invalid alarm of the first alarm type;
将所述第一特征信息与所述第三特征信息进行匹配。Matching the first characteristic information with the third characteristic information.
第三方面,本申请实施例提供一种减少无效告警的装置,该减少无效告警的装置包括至少一个处理器;所述至少一个处理器,用于运行计算机程序或指令,以使得所述装置执行上述第一方面描述的方法。In a third aspect, an embodiment of the present application provides a device for reducing invalid alarms. The device for reducing invalid alarms includes at least one processor; the at least one processor is configured to run a computer program or instruction to enable the device to execute The method described in the first aspect above.
在第三方面的一种可能的设计中,该至少一个处理器在运行计算机程序或指令时,执行如下步骤:In a possible design of the third aspect, the at least one processor executes the following steps when running a computer program or instruction:
获取第一目标的第一特征信息,所述第一目标的行为是触发摄像机告警的行为;Acquiring first characteristic information of a first target, where the behavior of the first target is a behavior that triggers a camera alarm;
将所述第一特征信息与无效告警数据库中的特征信息进行匹配,所述无效告警数据库中包括至少一个目标的特征信息,所述至少一个目标中的每个目标的行为是触发无效告警的行为;The first characteristic information is matched with the characteristic information in an invalid alarm database, the invalid alarm database includes characteristic information of at least one target, and the behavior of each target in the at least one target is a behavior that triggers an invalid alarm ;
当所述第一特征信息与所述无效告警数据库中的特征信息之间的匹配度大于或等于第一阈值时,不输出告警信息。When the degree of matching between the first characteristic information and the characteristic information in the invalid alarm database is greater than or equal to a first threshold, no alarm information is output.
在第三方面的一种可能的设计中,该减少无效告警的装置还包括存储器,所述存储器用于存储计算机程序或指令。In a possible design of the third aspect, the device for reducing invalid alarms further includes a memory for storing computer programs or instructions.
第四方面,本申请实施例提供一种计算机可读存储介质,所述计算机可读存储介质存储有计算机程序,所述计算机程序包括程序指令,所述程序指令当被计算机执行时,使所述计算机执行第一方面或第一方面可能的设计中任意一项所述的方法。In a fourth aspect, an embodiment of the present application provides a computer-readable storage medium, the computer-readable storage medium stores a computer program, and the computer program includes program instructions that, when executed by a computer, cause the The computer executes the method described in the first aspect or any one of the possible designs of the first aspect.
第五方面,本申请实施例提供一种计算机程序产品,所述计算机程序产品存储有计算机程序,所述计算机程序包括程序指令,所述程序指令当被计算机执行时,使所述计算机执行第一方面或第一方面可能的设计中任意一项所述的方法。In a fifth aspect, an embodiment of the present application provides a computer program product, the computer program product stores a computer program, the computer program includes program instructions, and when executed by a computer, the program instructions cause the computer to execute the first Aspect or the method of any one of the possible designs of the first aspect.
第六方面,本申请提供了一种芯片系统,该芯片系统包括处理器,用于实现第一方面或第一方面可能的设计中任意一项所述的方法。该芯片系统可以由芯片构成,也可以包含芯片和其他分立器件。In a sixth aspect, the present application provides a chip system including a processor for implementing the method described in the first aspect or any one of the possible designs of the first aspect. The chip system can be composed of chips, and can also include chips and other discrete devices.
第七方面,本申请提供了一种告警信号处理设备,该告警信号处理设备包括接口和处理器。其中,接口用于接收摄像机发送的第一特征信息或者与第一特征信息对应的第一图像,处理器,与接口通信,用于实现第一方面或第一方面可能的设计中任意一项所述的方法。In a seventh aspect, the present application provides an alarm signal processing device, which includes an interface and a processor. Wherein, the interface is used to receive the first feature information sent by the camera or the first image corresponding to the first feature information, and the processor communicates with the interface, and is used to implement the first aspect or any one of the possible designs of the first aspect. The method described.
上述第二方面至第七方面及其可能的实现方式的有益效果可以参考对第一方面及其可能的实现方式的有益效果的描述。For the beneficial effects of the aforementioned second aspect to the seventh aspect and possible implementation manners, reference may be made to the description of the beneficial effects of the first aspect and possible implementation manners.
附图说明Description of the drawings
图1所示为本申请实施例适用的一种安防监控系统的架构示意图;FIG. 1 is a schematic diagram of the architecture of a security monitoring system to which an embodiment of the application is applicable;
图2所示为本申请实施例提供的一种减少无效告警的方法流程示意图;FIG. 2 is a schematic flowchart of a method for reducing invalid alarms according to an embodiment of the application;
图3所示为本申请实施例提供的一种显示界面的示意图;FIG. 3 is a schematic diagram of a display interface provided by an embodiment of this application;
图4所示为本申请实施例提供的另一种减少无效告警的方法的流程示意图;FIG. 4 is a schematic flowchart of another method for reducing invalid alarms according to an embodiment of the application;
图5所示为本申请实施例提供的一种减少无效告警的装置的结构示意图;Figure 5 is a schematic structural diagram of a device for reducing invalid alarms provided by an embodiment of the application;
图6所示为本申请实施例提供的一种告警信号处理设备的结构示意图。Fig. 6 is a schematic structural diagram of an alarm signal processing device provided by an embodiment of the application.
具体实施方式Detailed ways
为了使本申请实施例的目的、技术方案和优点更加清楚,下面将结合附图对本申请实施例作进一步地详细描述。In order to make the objectives, technical solutions, and advantages of the embodiments of the present application clearer, the embodiments of the present application will be further described in detail below with reference to the accompanying drawings.
为便于技术人员理解,首先对本申请实施例所涉及的技术术语进行说明。To facilitate the understanding of the technical personnel, the technical terms involved in the embodiments of the present application will be described first.
(1)安防区域,可以是指需要进行安全防范的区域,如无人区的铁路、园区中的围墙或防盗物品所在的陈列柜等。如果需要检测一个安防区域的异常入侵情况,则可以在该安防区域周围设置一个或多个采集装置,例如摄像头等。这一个或多个采集装置的采集范围可以覆盖该安防区域,例如该安防区域可以是这一个或多个采集装置所覆盖的部分采集区域,或者也可以是这一个或多个采集装置所覆盖的全部采集区域。(1) Security area can refer to areas that require security protection, such as railways in unmanned areas, fences in parks, or display cabinets where anti-theft objects are located. If an abnormal intrusion situation in a security area needs to be detected, one or more collection devices, such as cameras, can be set around the security area. The collection range of the one or more collection devices can cover the security area, for example, the security area can be part of the collection area covered by the one or more collection devices, or it can also be covered by the one or more collection devices All collection areas.
(2)安防目标,可以指需要防范(或者需要监控)的对象,如人、动物或车辆等。如果安防目标进入安防区域,则可以触发告警。不同的安防场景下对应的安防目标可以不同。例如,无人区中铁路的安防目的主要是避免周围的野生动物在铁路上徘徊导致列车急刹或出轨等事故,因此该安防场景中的安防目标可以是野生动物。再例如,动物园中围墙的安防目的主要是避免围墙内的动物翻越围墙对游客造成伤害,以及游客违规进入围墙内,因此该安防场景中的安防目标可以是人和动物。(2) Security targets can refer to objects that need to be guarded (or need to be monitored), such as people, animals, or vehicles. If the security target enters the security area, an alarm can be triggered. The corresponding security targets can be different in different security scenarios. For example, the security purpose of the railway in the unmanned land is mainly to prevent the surrounding wild animals from wandering on the railway causing accidents such as sudden train braking or derailment. Therefore, the security target in the security scene may be wild animals. For another example, the security purpose of a fence in a zoo is mainly to prevent animals inside the fence from jumping over the fence and causing injury to tourists, and tourists entering the fence illegally, so the security targets in the security scene can be people and animals.
(3)本申请实施例中“多个”是指两个或两个以上,鉴于此,本申请实施例中也可以将“多个”理解为“至少两个”。“至少一个”,可理解为一个或多个,例如理解为一个、两个或更多个。例如,包括至少一个,是指包括一个、两个或更多个,而且不限制包括的是哪几个,例如,包括A、B和C中的至少一个,那么包括的可以是A、B、C、A和B、A和C、B和C、或A和B和C。“和/或”,描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。另外,字符“/”,如无特殊说明,一般表示前后关联对象是一种“或”的关系。(3) In the embodiments of this application, "multiple" refers to two or more than two. In view of this, "multiple" can also be understood as "at least two" in the embodiments of this application. "At least one" can be understood as one or more, for example, one, two or more. For example, including at least one refers to including one, two or more, and does not limit which ones are included. For example, including at least one of A, B, and C, then the included can be A, B, C, A and B, A and C, B and C, or A and B and C. "And/or" describes the association relationship of the associated objects, indicating that there can be three types of relationships, for example, A and/or B, which can mean: A alone exists, A and B exist at the same time, and B exists alone. In addition, the character "/", unless otherwise specified, generally indicates that the associated objects before and after are in an "or" relationship.
除非有相反的说明,本申请实施例提及“第一”、“第二”等序数词用于对多个对象进行区分,不用于限定多个对象的顺序、时序、优先级或者重要程度。Unless otherwise stated, ordinal numbers such as “first” and “second” mentioned in the embodiments of the present application are used to distinguish multiple objects, and are not used to limit the order, timing, priority, or importance of multiple objects.
下面,对本申请实施例所涉及的技术特征进行介绍。In the following, the technical features involved in the embodiments of the present application will be introduced.
传统的安防措施一般是通过多个工作人员以巡逻的方式对安防区域进行监视,人工维护的开销很大。一些环境条件较为苛刻的安防场景对人类的健康或生命不太友好,因此在这些安防场景中,传统的安防措施不再适用,例如环境温度高的安防场景或无人区中铁路的安防。随着图像处理技术的快速发展,尤其是图像识别技术的发展,以图像处理技术为基础的异常入侵检测技术因其自动化、对环境条件要求低等优点,逐渐替代了传输的安防措施。Traditional security measures generally monitor the security area by patrolling multiple workers, and manual maintenance costs a lot. Some security scenarios with harsher environmental conditions are not friendly to human health or life. Therefore, in these security scenarios, traditional security measures are no longer applicable, such as security scenarios with high ambient temperatures or railway security in unmanned areas. With the rapid development of image processing technology, especially the development of image recognition technology, the abnormal intrusion detection technology based on image processing technology has gradually replaced the transmission security measures due to its advantages such as automation and low requirements for environmental conditions.
在目前的异常入侵检测技术中,需要将至少一个摄像机部署在安防区域的周围,以使需 要安防的区域全部或部分落入该至少一个摄像机的拍摄区域中。然后通过对该至少一个摄像机所拍摄到的画面进行图像识别,以实时检测该安防区域中是否有异常入侵。当识别到该安防区域存在运动的目标,且该目标的行为是预设的触发告警的行为时,触发告警,并将该目标的告警信息上报给工作人员进行处理。该告警信息可以包括该目标的图像。工作人员收到该告警信息后可以根据该图像判断该目标触发的告警是否为无效告警。如果工作人员判断该目标触发的告警为无效告警,则删除该告警信息;如果工作人员判断该目标触发的告警为有效告警,则响应该告警信息。In the current abnormal intrusion detection technology, at least one camera needs to be deployed around the security area, so that the area that needs to be secured falls into the shooting area of the at least one camera in whole or in part. Then, image recognition is performed on the picture captured by the at least one camera to detect whether there is an abnormal intrusion in the security area in real time. When it is recognized that there is a moving target in the security area, and the behavior of the target is a preset behavior that triggers an alarm, an alarm is triggered, and the alarm information of the target is reported to the staff for processing. The warning information may include an image of the target. After receiving the alarm information, the staff can judge whether the alarm triggered by the target is an invalid alarm according to the image. If the staff judges that the alarm triggered by the target is an invalid alarm, then delete the alarm information; if the staff judges that the alarm triggered by the target is a valid alarm, then respond to the alarm information.
由于安防区域所处的环境具有多样性,可能会触发上报无效告警。例如,预设的触发告警的行为是人的徘徊,安防区域周围的植物在风的吹动下来回摇晃,被错误地识别为人的徘徊,从而触发告警,但实际上植物并不属于该安防区域的安防目标,因此工作人员会收到无效的告警。同时植物一般会长时间滞留在摄像机拍摄的画面中,在刮风的天气会反复触发告警,相应地工作人员会收到多次无效告警,工作人员不得不对每次告警进行甄别,确认是错误告警(植物摇晃引起的告警)还是正确告警(安防目标引起的告警),增加了人工维护的开销,用户体验较差。另外,部署在安防区域周围的多个摄像机的拍摄画面中皆有该目标时,每个摄像机都会单独向工作人员进行告警,因此工作人员也会收到来自该多个摄像机中的每个摄像机的无效告警,工作人员需要对每个无效告警进行逐一确认、删除,增加了人工维护的开销,用户体验差。Due to the diversity of the environment in the security area, invalid alarms may be triggered. For example, the preset behavior that triggers the alarm is the wandering of a person, and the plants around the security area are swayed by the wind, and are mistakenly identified as the wandering of a person, which triggers the alarm, but in fact the plants do not belong to the security area. Security targets, so the staff will receive invalid warnings. At the same time, plants generally stay in the picture taken by the camera for a long time, and the alarm will be triggered repeatedly in windy weather. Accordingly, the staff will receive multiple invalid alarms. The staff have to screen each alarm and confirm that it is a false alarm. (Alarms caused by plant shaking) is still correct (alarms caused by security targets), which increases the cost of manual maintenance, and the user experience is poor. In addition, when multiple cameras deployed around the security area have the target in their shooting screens, each camera will alert the staff individually, so the staff will also receive information from each of the multiple cameras. Invalid alarms, the staff needs to confirm and delete each invalid alarm one by one, which increases the cost of manual maintenance, and the user experience is poor.
鉴于此,本申请实施例提供一种减少无效告警的方法,该方法中将触发告警的目标的特征信息与无效告警数据库中的特征信息进行匹配,当两者之间的匹配度大于或等于第一阈值时,过滤该目标触发的告警信息,从而可以降低人工维护的开销,提高用户体验。In view of this, the embodiment of the present application provides a method for reducing invalid alarms. In the method, the characteristic information of the target that triggers the alarm is matched with the characteristic information in the invalid alarm database. When the matching degree between the two is greater than or equal to the first When a threshold is reached, the alarm information triggered by the target is filtered, thereby reducing the overhead of manual maintenance and improving user experience.
下面结合附图对本申请实施例提供的方法进行说明。The method provided by the embodiment of the present application will be described below in conjunction with the accompanying drawings.
请参见图1,图1所示为本申请实施例适应的一种可能的安防监控系统的架构示意图。如图1所示,该安防监控系统100可以包括多个图像采集装置110(图1中包括2个图像采集装置)和一个服务器120。该图像采集装置110部署在安防区域的周围,用于实时采集该安防区域的画面,并将采集的画面发送给服务器120。该服务器120用于接收图像采集装置拍摄的画面,并对该拍摄的画面进行识别以判断是否触发告警。其中,多个图像采集装置110可以部署在同一个安防区域的周围,也可以部署在不同的安防区域,本申请实施例对此不做限定。Please refer to FIG. 1. FIG. 1 is a schematic structural diagram of a possible security monitoring system to which an embodiment of this application is adapted. As shown in FIG. 1, the security monitoring system 100 may include multiple image acquisition devices 110 (including two image acquisition devices in FIG. 1) and a server 120. The image collection device 110 is deployed around the security area, and is used to collect images of the security area in real time and send the collected images to the server 120. The server 120 is configured to receive the picture taken by the image acquisition device, and recognize the taken picture to determine whether to trigger an alarm. Wherein, multiple image acquisition devices 110 may be deployed around the same security area, or may be deployed in different security areas, which is not limited in the embodiment of the present application.
该图像采集装置110包括但不限于相机,摄像机,或具有摄像功能的智能移动终端(例如移动电话、平板电脑,便携电脑)等,在此不对图像采集装置110的具体实现形式进行限制。在下文中将以图像采集装置110是摄像机110为例进行介绍。服务器120包括但不限于独立服务器,服务器集群,或云端服务器等,在此不对服务器120的具体实现形式进行限制。The image acquisition device 110 includes, but is not limited to, a camera, a video camera, or a smart mobile terminal with a camera function (such as a mobile phone, a tablet computer, a portable computer), etc. The specific implementation form of the image acquisition device 110 is not limited herein. In the following, the image acquisition device 110 is a camera 110 as an example for introduction. The server 120 includes, but is not limited to, an independent server, a server cluster, or a cloud server, etc. The specific implementation form of the server 120 is not limited herein.
可选的,该安防监控系统100中还可以包括显示器130,该显示器130用于向工作人员显示包括触发告警的目标的图像。工作人员还可以在该显示器130的输入界面(或称为显示界面)进行输入操作,如删除无效的告警信息等。Optionally, the security monitoring system 100 may further include a display 130, which is used to display an image including a target that triggers an alarm to the staff. The staff can also perform input operations on the input interface (or called the display interface) of the display 130, such as deleting invalid alarm information.
在一种可能的实施方式中,该服务器120包括处理器121,该处理器121可以对图像进行识别以判断是否安防区域是否存在异常入侵。可选的,该处理器121还可以从图像中提取触发告警的目标的特征信息。例如,该处理器121可以通过以下一种或者多种形式实现:通用处理器、中央处理器(central processing unit,CPU)、图像信号处理器(image signal processor,ISP)、微处理器、数字信号处理器(digital signal processor,DSP)、或现场可编 程门阵列(field-programmable gate array,FPGA)等。In a possible implementation manner, the server 120 includes a processor 121 that can recognize the image to determine whether there is an abnormal intrusion in the security area. Optionally, the processor 121 may also extract feature information of the target that triggers the alarm from the image. For example, the processor 121 may be implemented in one or more of the following forms: a general-purpose processor, a central processing unit (CPU), an image signal processor (ISP), a microprocessor, and a digital signal processor. Processor (digital signal processor, DSP), or field-programmable gate array (field-programmable gate array, FPGA), etc.
示例性的,该服务器120中还可以包括存储器122。存储器122可以是只读存储器(read-only memory,ROM)或可存储静态信息和指令的其他类型的静态存储设备,随机存取存储器(random access memory,RAM)或者可存储信息和指令的其他类型的动态存储设备,也可以是电可擦可编程只读存储器(Electrically Erasable Programmable Read-Only Memory,EEPROM)、只读光盘(Compact Disc Read-Only Memory,CD-ROM)或其他光盘存储、光碟存储(包括压缩光碟、激光碟、光碟、数字通用光碟、蓝光光碟等)、磁盘存储介质或者其他磁存储设备、或者能够用于携带或存储具有指令或数据结构形式的期望的程序代码并能够由该装置存取的任何其他介质,但不限于此。存储器122可以是独立存在,通过总线与处理器121相连接。存储器122也可以和处理器121集成在一起。Exemplarily, the server 120 may further include a memory 122. The memory 122 may be a read-only memory (ROM) or other types of static storage devices that can store static information and instructions, random access memory (RAM), or other types that can store information and instructions The dynamic storage device can also be electrically erasable programmable read-only memory (Electrically Erasable Programmable Read-Only Memory, EEPROM), CD-ROM (Compact Disc Read-Only Memory, CD-ROM) or other optical disc storage, optical disc storage (Including compact discs, laser discs, optical discs, digital versatile discs, Blu-ray discs, etc.), magnetic disk storage media or other magnetic storage devices, or can be used to carry or store desired program codes in the form of instructions or data structures and can be used by the Any other medium accessed by the device, but not limited to this. The memory 122 may exist independently and is connected to the processor 121 through a bus. The memory 122 may also be integrated with the processor 121.
其中,所述存储器122可以用于存储执行本申请方案的应用程序代码,并由处理器121来控制执行,也就是说,所述处理器121用于执行所述存储器122中存储的应用程序代码实现本申请实施例中的减少无效告警的方法。在一些实施例中,所述处理器121内部也可以拥有存储代码的能力,不借助存储器122就可以执行存储代码。Wherein, the memory 122 may be used to store the application program code for executing the solution of the present application, and the processor 121 controls the execution, that is, the processor 121 is used to execute the application program code stored in the memory 122 The method for reducing invalid alarms in the embodiments of the present application is implemented. In some embodiments, the processor 121 may also have the ability to store code inside, and the stored code can be executed without using the memory 122.
在另一种可能的实施方式中,摄像机110可以对拍摄到的画面进行识别以判断是否向服务器120发送告警信息。在此实施方式中,摄像机110可以包括前述的处理器120,可选的,该摄像机110还可以包括前述的存储器122。其中,处理器121和存储器122的具体实现方式请参见前文的描述,在此不再赘述。In another possible implementation manner, the camera 110 may recognize the captured image to determine whether to send alarm information to the server 120. In this embodiment, the camera 110 may include the aforementioned processor 120, and optionally, the camera 110 may further include the aforementioned memory 122. For the specific implementation of the processor 121 and the memory 122, please refer to the foregoing description, which will not be repeated here.
本申请实施例可以应用于需要安防的场景等,例如,室内视频监控场景、室外视频监控场景、夜间视频监控场景或者安防监控场景,或者也可以应用于普通的图像拍摄场景等,在此不一一举例。下面结合图1所示的安防监控系统100,介绍本申请实施例提供的一种减少无效告警的方法。请参考图2,图2所示为该方法的流程图。The embodiments of this application can be applied to scenes that require security, for example, indoor video surveillance scenes, outdoor video surveillance scenes, night video surveillance scenes or security surveillance scenes, or can also be applied to common image shooting scenes, etc., which vary here. An example. The following describes a method for reducing invalid alarms provided by an embodiment of the present application in conjunction with the security monitoring system 100 shown in FIG. 1. Please refer to Figure 2, which shows a flowchart of this method.
S201:服务器120接收来自摄像机110的多媒体信息。S201: The server 120 receives multimedia information from the camera 110.
摄像机110对其拍摄区域内的画面进行拍摄,得到多媒体信息,并将该多媒体信息发送给服务器120。服务器120接收多媒体信息。该多媒体信息可以是视频数据,例如摄像机110将其在设定时长内拍摄得到的画面压缩成H.264/H.265格式的视频数据,然后将该视频数据发送给服务器120。或者,该多媒体信息还可以是图像数据,例如摄像机110从该摄像机110在设定时长内拍摄得到的画面中抽取多个图像,然后将该多个图像压缩成JPEG格式的图像数据,然后将该图像数据发送给服务器120。另外,摄像机110的拍摄区域中的部分或全部区域为安防区域。例如,室内监控场景中房间内的区域皆为安防区域,需要将摄像机110部署在该房间内,这样摄像机110的拍摄区域为该房间内的全部或部分区域,也即是该摄像机110的拍摄区域中的全部区域皆为安防区域。再例如,园区监控场景中园区的围墙为安防区域,需要将摄像机110部署在围墙的周围,这样摄像机110的拍摄区域中的部分画面为该围墙的画面,也即是该摄像机110的拍摄区域中的部分区域为安防区域。The camera 110 captures images in its shooting area, obtains multimedia information, and sends the multimedia information to the server 120. The server 120 receives multimedia information. The multimedia information may be video data. For example, the camera 110 compresses a picture taken within a set time period into video data in the H.264/H.265 format, and then sends the video data to the server 120. Alternatively, the multimedia information may also be image data. For example, the camera 110 extracts multiple images from the images captured by the camera 110 within a set time period, and then compresses the multiple images into image data in JPEG format, and then The image data is sent to the server 120. In addition, part or all of the shooting area of the camera 110 is a security area. For example, in an indoor surveillance scene, all areas in the room are security areas, and the camera 110 needs to be deployed in the room, so that the shooting area of the camera 110 is all or part of the area in the room, that is, the shooting area of the camera 110 All areas in are security areas. For another example, in a park surveillance scene, the wall of the park is a security area, and the camera 110 needs to be deployed around the wall, so that part of the picture in the shooting area of the camera 110 is the picture of the wall, that is, in the shooting area of the camera 110 Part of the area is a security area.
S202:服务器120对媒体信息进行检测,如果检测到摄像机110的拍摄区域中存在运动的第一目标、且该第一目标的行为是触发告警的行为时,则执行S203,否则,则执行S201。S202: The server 120 detects the media information, and if it detects that there is a moving first target in the shooting area of the camera 110 and the behavior of the first target is a behavior that triggers an alarm, perform S203; otherwise, perform S201.
示例的,服务器120接收到来自摄像机110的多媒体信息后,需要对多媒体信息进行检测,以判断该摄像机110的拍摄区域中是否存在异常入侵。具体的,服务器120可以先根据多媒体信息判断该拍摄区域中是否存在运动的目标(这里把被检测到的运动目标称为第一目标),然后再确定该第一目标的行为是否为触发告警的行为。例如,如果多媒体信息为视频数 据,则服务器120可以解压该视频数据,并从解压后的视频数据中抽取至少一个图像,然后通过运动目标检测方法对该至少一个图像进行检测,以确定拍摄区域中是否存在运动的第一目标。再例如,如果多媒体信息为图像数据,则服务器120可以解压该图像数据得到至少一个图像,然后通过运动目标检测方法对该至少一个图像进行检测,以确定拍摄区域中是否存在运动的第一目标。其中,运动目标检测方法是一种目标检测方法,可以采用机器学习算法。For example, after the server 120 receives the multimedia information from the camera 110, it needs to detect the multimedia information to determine whether there is an abnormal intrusion in the shooting area of the camera 110. Specifically, the server 120 may first determine whether there is a moving target in the shooting area according to the multimedia information (here, the detected moving target is called the first target), and then determine whether the behavior of the first target is triggering an alarm. behavior. For example, if the multimedia information is video data, the server 120 may decompress the video data, extract at least one image from the decompressed video data, and then detect the at least one image through a moving target detection method to determine the shooting area Whether there is the first goal of the movement. For another example, if the multimedia information is image data, the server 120 may decompress the image data to obtain at least one image, and then detect the at least one image by a moving target detection method to determine whether there is a moving first target in the shooting area. Among them, the moving target detection method is a target detection method, and machine learning algorithms can be used.
如果服务器120确定拍摄区域内不存在运动的目标,则服务器120执行S201的步骤,即接收下一个设定时长内的多媒体信息。如果服务器120确定拍摄区域内存在运动的第一目标,则服务器120需要确定该第一目标的行为是否为触发告警的行为。可选的,服务器120可以通过告警识别模型来确定该第一目标的行为是否为触发告警的行为。例如,服务器120可以从包括第一目标的图像中提取该第一目标的第一特征信息,将该第一特征信息输入到告警识别模型中得到识别结果。再例如,服务器120可以将第一目标所在图像的区域按照不同的缩小尺寸进行缩小、按照不同的放大尺寸进行放大、或者按照不同的缩小尺寸和不同的放大尺寸分别进行缩小和放大,得到至少一个子图像,从该至少一个子图像中的每个子图像中提取第一目标的特征信息得到至少一个第二特征信息,然后将该至少一个第二特征信息输入到告警识别模型中得到识别结果。如果该识别结果大于或等于预设的第二阈值,则服务器120确定该第一目标的行为是触发告警的行为,否则,该第一目标的行为不是触发告警的行为。其中,触发告警的行为可以是根据不同的安防场景预先设定的行为,例如无人区中野生动物在铁路上的徘徊是触发告警的行为,园区安防中人的翻墙行为是触发告警的行为等。该告警识别模型是服务器120对预设的触发告警的行为所对应的特征信息进行模型训练得到,其对应的模型训练过程可以参考现有技术,本申请实施例对此不做限定。If the server 120 determines that there is no moving target in the shooting area, the server 120 executes the step of S201, that is, receives multimedia information within the next set time period. If the server 120 determines that there is a moving first target in the shooting area, the server 120 needs to determine whether the behavior of the first target is a behavior that triggers an alarm. Optionally, the server 120 may determine whether the behavior of the first target is a behavior that triggers an alarm through an alarm recognition model. For example, the server 120 may extract the first characteristic information of the first target from the image including the first target, and input the first characteristic information into the alarm recognition model to obtain the recognition result. For another example, the server 120 may reduce the area of the image where the first target is located according to different reduced sizes, enlarge according to different enlarged sizes, or reduce and enlarge according to different reduced sizes and different enlarged sizes, respectively, to obtain at least one For sub-images, the feature information of the first target is extracted from each sub-image in the at least one sub-image to obtain at least one second feature information, and then the at least one second feature information is input into the alarm recognition model to obtain a recognition result. If the recognition result is greater than or equal to the preset second threshold, the server 120 determines that the behavior of the first target is a behavior that triggers an alarm; otherwise, the behavior of the first target is not a behavior that triggers an alarm. Among them, the behavior that triggers the alarm can be a behavior that is preset according to different security scenarios. For example, the wandering of wild animals on the railway in the unmanned area is the behavior that triggers the alarm, and the behavior of people over the wall in the park security is the behavior that triggers the alarm. Wait. The alarm recognition model is obtained by the server 120 performing model training on the feature information corresponding to the preset alarm-triggering behavior. The corresponding model training process can refer to the prior art, which is not limited in the embodiment of the application.
其中,从图像中提取目标的特征信息的方法可以包括但不限定于基于方向梯度直方图(histogram of oriented gradient,HOG)的特征提取方法,基于局部二值模式(local binary pattern,LBP)的特征提取方法,基于深度神经网络(deep neural networks,DNN)的特征提取方法或基于卷积神经网络(convolutional neural networks,CNN)的特征提取方法等。Among them, the method of extracting the feature information of the target from the image can include but is not limited to the feature extraction method based on the histogram of oriented gradient (HOG), and the feature based on the local binary pattern (LBP) Extraction methods, feature extraction methods based on deep neural networks (DNN) or feature extraction methods based on convolutional neural networks (convolutional neural networks, CNN), etc.
应理解的是,拍摄区域内可能存在多个运动的目标。当拍摄区域内存在多个运动的目标时,服务器120可以通过告警识别模型,逐一确定该多个运行的目标中的每个目标的行为是否为触发告警的行为。如果该多个运行的目标中的一个目标的行为是触发告警的行为,则服务器120执行S203。下文中以拍摄区域内存在第一个运动的目标,即第一目标为例进行描述。It should be understood that there may be multiple moving targets in the shooting area. When there are multiple moving targets in the shooting area, the server 120 may determine, one by one, whether the behavior of each target in the multiple running targets is a behavior that triggers an alarm through an alarm recognition model. If the behavior of one of the multiple running targets is a behavior that triggers an alarm, the server 120 executes S203. In the following description, the first moving target in the shooting area, that is, the first target, is taken as an example for description.
如果服务器120确定第一目标的行为不是触发告警的行为,则服务器120执行S201的步骤,即接收下一个设定时长内的多媒体信息。如果服务器120确定第一目标的行为是触发告警的行为,则服务器120执行S203,即获取包括第一目标的第一图像。If the server 120 determines that the behavior of the first target is not the behavior that triggers the alarm, the server 120 executes the step of S201, that is, receives the multimedia information within the next set time period. If the server 120 determines that the behavior of the first target is a behavior that triggers an alarm, the server 120 executes S203, that is, acquires a first image including the first target.
需要说明的是,步骤S202中的异常入侵检测可以采用上述先进行运动目标检测再进行目标行为识别的方法进行实现,也可以采用现有技术实现,本申请实施例对此不做限定。It should be noted that the abnormal intrusion detection in step S202 can be implemented by using the above-mentioned method of first detecting a moving target and then recognizing a target behavior, or can be implemented by using existing technology, which is not limited in the embodiment of the present application.
S203:服务器120从多媒体信息中获取第一图像,该第一图像包括第一目标。S203: The server 120 obtains a first image from the multimedia information, where the first image includes the first target.
多媒体信息中可以包括多个图像,该多个图像中的每个图像皆包括该第一目标,服务器120可以从该多个图像中选取一个图像作为第一图像。例如,服务器120可以选取该多个图像中第一目标的特征信息最多的图像作为第一图像,或选取该多个图像中的拍摄时间最早的图像作为第一图像,或选取该多个图像中分辨率最高的图像作为第一图像等,本申请实施例对此不作限定。The multimedia information may include multiple images, each of the multiple images includes the first target, and the server 120 may select an image from the multiple images as the first image. For example, the server 120 may select the image with the most feature information of the first target among the plurality of images as the first image, or select the image with the earliest shooting time among the plurality of images as the first image, or select the image from among the plurality of images. The image with the highest resolution is used as the first image, etc., which is not limited in the embodiment of the present application.
S204:服务器120对第一图像中的第一目标进行特征提取得到第一特征信息。S204: The server 120 performs feature extraction on the first target in the first image to obtain first feature information.
在一种可能的实施方式中,如果在步骤S202中服务器120已经提取了第一目标的特征信息,则服务器120可以不用执行步骤S204,也即是在步骤S202中服务器120所提取的特征信息可以作为该第一特征信息,可以减少计算量。否则,服务器120从第一图像中提取该第一目标的第一特征信息。应理解的是,即便在步骤S202中服务器120已经提取了第一目标的特征信息,服务器120也可以执行步骤S204。例如,在步骤S202中服务器120可以根据基于HOG的特征提取方法提取第一目标的特征信息,在步骤S204中服务器120可以根据基于CNN的特征提取方法提取第一目标的特征信息。In a possible implementation, if the server 120 has extracted the characteristic information of the first target in step S202, the server 120 may not need to perform step S204, that is, the characteristic information extracted by the server 120 in step S202 may be As the first feature information, the amount of calculation can be reduced. Otherwise, the server 120 extracts the first feature information of the first target from the first image. It should be understood that, even if the server 120 has extracted the characteristic information of the first target in step S202, the server 120 may also perform step S204. For example, in step S202, the server 120 may extract the feature information of the first target according to the HOG-based feature extraction method, and in step S204, the server 120 may extract the feature information of the first target according to the CNN-based feature extraction method.
在另一种可能的实施方式中,服务器120可以确定第一目标在第一图像中的区域,对该区域按照不同的尺寸进行缩小,或放大,或缩小和放大,得到至少一个子图像,然后从至少一个子图像中的每个子图像中提取的该第一目标的特征信息,得到至少一个第二特征信息,该至少一个第二特征信息可以包括第一特征信息。由于不同尺寸的图像中所包括的第一目标的特征信息可能不一样,通过将包括第一目标的区域不同的缩小尺寸进行缩小、按照不同的放大尺寸进行放大、或者按照不同的缩小尺寸和不同的放大尺寸分别进行缩小和放大,得到至少一个子图像,然后从该至少一个子图像中每个子图像提取第一目标的特征信息,这样可以丰富第一目标的特征信息,增加特征信息的多样性。In another possible implementation manner, the server 120 may determine the area of the first target in the first image, and reduce, or enlarge, or reduce and enlarge the area according to different sizes to obtain at least one sub-image, and then At least one piece of second feature information is obtained from the feature information of the first target extracted from each of the at least one sub-image, and the at least one piece of second feature information may include the first feature information. Since the feature information of the first target included in images of different sizes may be different, the area including the first target may be reduced in different reduced sizes, enlarged in accordance with different enlarged sizes, or in accordance with different reduced sizes and differences. The zoomed-in size of is reduced and enlarged to obtain at least one sub-image, and then the feature information of the first target is extracted from each sub-image in the at least one sub-image, so that the feature information of the first target can be enriched and the diversity of feature information is increased .
S205:服务器120将第一特征信息与无效告警数据库中的特征信息进行匹配。如果该第一特征信息与无效告警数据库中的特征信息之间的匹配度大于或等于第一阈值,则执行S206;如果该第一特征信息与无效告警数据库中的特征信息之间的匹配度小于第一阈值,则执行S207。S205: The server 120 matches the first characteristic information with the characteristic information in the invalid alarm database. If the degree of matching between the first characteristic information and the characteristic information in the invalid alarm database is greater than or equal to the first threshold, execute S206; if the degree of matching between the first characteristic information and the characteristic information in the invalid alarm database is less than For the first threshold, S207 is executed.
其中,无效告警数据库中存储有至少一个目标的特征信息,该至少一个目标中的每个目标的行为是触发无效告警的行为。例如,该无效告警数据库中的特征信息可以包括根据安防场景预先获取的容易触发无效告警的目标的特征信息,或者该无效告警数据库中的特征信息可以包括历史触发无效告警的目标的特征信息,或者该无效告警数据库中的特征信息包括根据安防场景预先获取的容易触发无效告警的目标的特征信息,以及历史触发无效告警的目标的特征信息。可选的,该无效告警数据库中还可以包括告警类型、安防目标、安防区域或摄像机的身份标识(identity,ID)等信息中的至少一种。其中,告警类型可以包括但不限于人的越界行为、人的徘徊行为、人的翻墙行为、动物的越界行为或车的越界行为等。可选的,该无效告警数据库中一目标的特征信息可以通过对该目标所在图像中的区域进行不同尺寸的缩小、或放大、或缩小和放大后的子图像进行特征提取得到的,以增加无效告警数据库中特征信息的多样性,具体提取过程可以参见前述描述,在此不再赘述。Wherein, the invalid alarm database stores characteristic information of at least one target, and the behavior of each target in the at least one target is a behavior that triggers an invalid alarm. For example, the characteristic information in the invalid alarm database may include the characteristic information of the target that easily triggers the invalid alarm obtained in advance according to the security scene, or the characteristic information in the invalid alarm database may include the characteristic information of the target that triggers the invalid alarm in history, or The feature information in the invalid alarm database includes feature information of targets that are easy to trigger invalid alarms obtained in advance according to security scenarios, and feature information of targets that trigger invalid alarms in history. Optionally, the invalid alarm database may also include at least one of information such as an alarm type, a security target, a security area, or an identity (ID) of the camera. Among them, the alarm type may include, but is not limited to, human cross-border behavior, human wandering behavior, human over-wall behavior, animal cross-border behavior, or vehicle cross-border behavior, etc. Optionally, the feature information of a target in the invalid alarm database can be obtained by performing feature extraction on sub-images of different sizes of the region in the image where the target is located, so as to increase invalidity. For the diversity of feature information in the alarm database, the specific extraction process can be referred to the foregoing description, which will not be repeated here.
服务器120可以将第一特征信息与无效告警数据库中的特征信息进行匹配,或者将至少一个第二特征信息与无效告警数据库中的特征信息进行匹配,以确定该第一目标的行为是否为触发无效告警的行为。以将第一特征信息与无效告警数据库中的特征信息进行匹配为例,服务器120可以将第一特征信息与无效告警数据库中的所有的特征信息进行逐一匹配,这样虽然可以保证匹配结果的准确性,但当无效告警数据库中的特征信息较多时,会大幅增加服务器120的计算量。可选的,服务器120可以将告警类型、安防区域或安防场景等作为考虑因素进行匹配,以排除部分无效匹配,减少计算量,提高匹配效率。例如,第一目标触发的告警的类型为第一告警类型(如人的翻墙行为),服务器120可以根据该第一告警类型从无效告警数据库中获取第三特征信息,该第三特征细腻对应的目标所触发的无效告警为第一告警类型的无效告警,然后将第一特征信息与第三特征信息进行匹配。The server 120 may match the first feature information with the feature information in the invalid alarm database, or match at least one second feature information with the feature information in the invalid alarm database, to determine whether the behavior of the first target is invalid triggering The behavior of the alert. Taking the matching of the first feature information with the feature information in the invalid alarm database as an example, the server 120 may match the first feature information with all the feature information in the invalid alarm database one by one, although the accuracy of the matching result can be guaranteed. However, when there are many feature information in the invalid alarm database, the calculation amount of the server 120 will be greatly increased. Optionally, the server 120 may match the alarm type, security area, or security scenario as consideration factors to eliminate partial invalid matches, reduce the amount of calculation, and improve matching efficiency. For example, the type of the alarm triggered by the first target is the first alarm type (such as a person's behavior of overturning the wall), and the server 120 may obtain the third characteristic information from the invalid alarm database according to the first alarm type, and the third characteristic finely corresponds to The invalid alarm triggered by the target of is the invalid alarm of the first alarm type, and then the first characteristic information is matched with the third characteristic information.
当服务器120确定第一特征信息与无效告警数据中的一特征信息之间的匹配度大于或等于第一阈值,则服务器120可以确定该第一目标触发的告警为无效告警,即执行步骤S206;或者当服务器120确定第一特征信息与无效告警数据中的设定数目(如3个)的特征信息之间的平均匹配度大于或等于第一阈值,则服务器120可以确定该第一目标触发的告警为无效告警,即执行步骤S206。当服务器120确定第一特征信息与无效告警数据中的任一特征信息之间的匹配度小于第一阈值时,则服务器120可以将第一图像发送给显示器130进行显示,即执行步骤S207。When the server 120 determines that the degree of matching between the first characteristic information and a characteristic information in the invalid alarm data is greater than or equal to the first threshold, the server 120 may determine that the alarm triggered by the first target is an invalid alarm, that is, execute step S206; Or when the server 120 determines that the average matching degree between the first characteristic information and the set number (such as 3) of the characteristic information in the invalid alarm data is greater than or equal to the first threshold, the server 120 may determine that the first target triggers If the alarm is an invalid alarm, step S206 is executed. When the server 120 determines that the degree of matching between the first feature information and any feature information in the invalid alarm data is less than the first threshold, the server 120 may send the first image to the display 130 for display, that is, step S207 is performed.
S206:服务器120确定第一目标触发的告警为无效告警,不输出告警信息。S206: The server 120 determines that the alarm triggered by the first target is an invalid alarm, and does not output alarm information.
由于该无效告警数据库中存储有以前触发无效告警的目标的特征信息,和/或容易触发无效告警的目标的特征信息,因此当第一特征信息与该无效告警数据库中的特征信息之间的匹配度较高(如大于或等于第一阈值)时,表明该第一目标所触发的告警是无效的告警。所以可以自动过滤该第一目标触发的告警信息,即不输出告警信息,从而节省人工检测环节,减少人工维护的开销,可以提高告警流程的工作效率和用户体验。Since the invalid alarm database stores the characteristic information of the target that previously triggered the invalid alarm, and/or the characteristic information of the target that easily triggers the invalid alarm, when the first characteristic information matches the characteristic information in the invalid alarm database When the degree is high (for example, greater than or equal to the first threshold), it indicates that the alarm triggered by the first target is an invalid alarm. Therefore, the alarm information triggered by the first target can be automatically filtered, that is, no alarm information is output, thereby saving manual detection links, reducing manual maintenance costs, and improving the work efficiency and user experience of the alarm process.
S207:服务器120将第一图像发送给显示器130进行显示。S207: The server 120 sends the first image to the display 130 for display.
当第一特征信息与该无效告警数据库中的特征信息之间的匹配度较低(如小于第一阈值)时,服务器120将第一图像发送给显示器130进行显示,显示器130将该第一图像显示在显示界面中(或称为输入界面),以使工作人员根据第一图像判断第一目标触发的告警是否为无效告警。为了提高告警流程的效率,服务器120将第一图像发送给显示器130进行显示的同时,还可以通过语音、告警灯或动画等方式提醒工作人员对当前显示界面所显示的第一图像进行判断。When the degree of matching between the first feature information and the feature information in the invalid alarm database is low (for example, less than the first threshold), the server 120 sends the first image to the display 130 for display, and the display 130 uses the first image to display the first image. It is displayed on the display interface (or called the input interface), so that the staff can judge whether the alarm triggered by the first target is an invalid alarm according to the first image. In order to improve the efficiency of the alarm process, while the server 120 sends the first image to the display 130 for display, it can also remind the staff to judge the first image displayed on the current display interface through voice, warning lights or animation.
示例的,图3所示为显示界面的一种示意图,如图3所示,显示界面300中可以包括第一图像310、无效告警选项320、有效告警选项330以及第二信息区域340等。其中,第一图像310中包括第一目标311。可选的,可以采用焦点框的方式明确第一目标311在第一图像310中区域。第二信息区域340用于显示第二信息,该第二信息用于辅助工作人员判断第一图像中的第一目标所触发的告警是否为无效告警,例如该第二信息可以包括但不限定于摄像机的ID、安防区域的地址信息、告警类型或时间等。应理解,图3所示的显示界面中各选项的位置仅为一种示例,本申请实施例对此不做限定。例如图3中第二信息区域340位于第一图像310的左边,但实际上该第二信息区域340可以位于第一图像310的上方、或下方、或左方等。当工作人员确定第一目标触发的告警为有效告警时,工作人员可以通过键盘输入、鼠标输入或语音输入等输入方式选定有效告警选项330,以执行步骤210。当工作人员确定第一目标触发的告警为无效告警时,工作人员可以通过键盘输入、鼠标输入或语音输入等输入方式选定无效告警选项320,以执行步骤S209所执行的内容。For example, FIG. 3 is a schematic diagram of a display interface. As shown in FIG. 3, the display interface 300 may include a first image 310, an invalid warning option 320, a valid warning option 330, and a second information area 340. Wherein, the first image 310 includes the first target 311. Optionally, a focus frame may be used to clarify the area of the first target 311 in the first image 310. The second information area 340 is used to display second information, which is used to assist the staff in determining whether the alarm triggered by the first target in the first image is an invalid alarm. For example, the second information may include but is not limited to The ID of the camera, the address information of the security zone, the alarm type or time, etc. It should be understood that the position of each option in the display interface shown in FIG. 3 is only an example, which is not limited in the embodiment of the present application. For example, the second information area 340 in FIG. 3 is located on the left of the first image 310, but in fact the second information area 340 may be located above, below, or to the left of the first image 310. When the staff member determines that the alarm triggered by the first target is a valid alarm, the staff member can select the valid alarm option 330 through input methods such as keyboard input, mouse input, or voice input to execute step 210. When the staff member determines that the alarm triggered by the first target is an invalid alarm, the staff member can select the invalid alarm option 320 through input methods such as keyboard input, mouse input, or voice input to execute the content executed in step S209.
S208:服务器120接收来自触屏显示器130的第一信息,该第一信息用于指示第一目标触发的告警是否为无效告警。S208: The server 120 receives first information from the touch screen display 130, where the first information is used to indicate whether the alarm triggered by the first target is an invalid alarm.
当然,第一信息除了来自于显示器130,还可以来自于键盘、鼠标等其他输入装置。Of course, in addition to the display 130, the first information may also come from other input devices such as a keyboard and a mouse.
例如,该第一信息可以是无效告警选项320触发的信息,或是有效告警选项330触发的信息。当第一信息是无效告警选项320触发的信息时,该第一信息用于指示第一目标触发的告警为无效告警。当第一信息是有效告警选项330触发的信息时,第一信息用于指示第一目标触发的告警为有效告警。For example, the first information may be information triggered by the invalid alarm option 320 or information triggered by the valid alarm option 330. When the first information is information triggered by the invalid alarm option 320, the first information is used to indicate that the alarm triggered by the first target is an invalid alarm. When the first information is the information triggered by the valid alarm option 330, the first information is used to indicate that the alarm triggered by the first target is a valid alarm.
S209:在第一信息指示第一目标触发的告警是无效告警时,服务器120不输出告警信息, 并将第一特征信息添加至无效告警数据库中。S209: When the first information indicates that the alarm triggered by the first target is an invalid alarm, the server 120 does not output the alarm information, and adds the first characteristic information to the invalid alarm database.
在第一信息指示第一目标触发的告警是无效告警时,服务器120过滤该第一目标的告警信息,即不输出告警信息,同时服务器120还可以将第一特征信息添加至无效告警数据库中,这样可以过滤第一目标触发的重复告警,省去了人工检测环节,可以减少人工维护的开销,提高用户体现。When the first information indicates that the alarm triggered by the first target is an invalid alarm, the server 120 filters the alarm information of the first target, that is, does not output the alarm information, and the server 120 may also add the first characteristic information to the invalid alarm database. In this way, repeated alarms triggered by the first target can be filtered, and manual detection links can be eliminated, manual maintenance costs can be reduced, and user performance can be improved.
可选的,如果在步骤S202或步骤S204中,服务器120有获取第一目标的至少一个第二特征信息,则在步骤S209中服务器120可以将该至少一个第二特征信息添加到无效告警数据库中,以丰富第一目标的特征信息,增加无效告警数据库的多样性,从而可以提高判断无效告警的准确性。如果在步骤S202或步骤S204中,服务器120没有获取第一目标的至少一个第二特征信息,则在步骤S209中服务器120可以将第一目标在第一图像中的区域按照不同的尺寸进行缩小、或放大、或缩小和放大得到至少一个子图像,从该至少一个子图像中的每个子图像中获取第一目标的特征信息得到至少一个第二特征信息,然后将该至少一个第二特征信息添加到无效告警数据库中,以丰富第一目标的特征信息,增加无效告警数据库的多样性,从而可以提高判断无效告警的准确性。Optionally, if in step S202 or step S204, the server 120 has acquired at least one second characteristic information of the first target, the server 120 may add the at least one second characteristic information to the invalid alarm database in step S209 , To enrich the characteristic information of the first target and increase the diversity of the invalid alarm database, thereby improving the accuracy of judging invalid alarms. If in step S202 or step S204, the server 120 does not obtain at least one second feature information of the first target, then in step S209, the server 120 may reduce the area of the first target in the first image according to different sizes, Or zoom in, or reduce and zoom in to obtain at least one sub-image, obtain feature information of the first target from each of the at least one sub-image to obtain at least one second feature information, and then add the at least one second feature information In the invalid alarm database, the feature information of the first target is enriched, and the diversity of the invalid alarm database is increased, so that the accuracy of judging invalid alarms can be improved.
S210:在第一信息指示第一目标触发的告警是有效告警时,服务器120输出告警信息。S210: When the first information indicates that the alarm triggered by the first target is a valid alarm, the server 120 outputs alarm information.
在第一信息指示第一目标触发的告警是无效告警时,服务器120输出告警信息。不同安防场景中输出的告警信息的形式、或内容、或形式和内容等可能不同,同时应对该告警信息的方式也可能不同。例如,当确定动物在无人区的铁路上徘徊时,该告警信息可能包括但不限于告警类型、触发告警的位置信息、告警等级、安防目标或安防目标的数量等,服务器120输出该告警信息的同时,还可以向将告警信息发送给距离告警位置设定距离的列车,以提示列车提前减速或鸣笛等。其中,告警等级用于指示目标的触发的告警所对应的紧急程度,一般情况下告警等级越高,紧急程度越高。再例如,当确定有人越界进入安防区域时,该告警信息可能包括但不限于告警类型、触发告警的位置信息或告警等级等,服务器120输出该告警信息的同时,还可以通过告警位置附近的喇叭进行语音示警,或者通知相关的安保人员进行人工示警。When the first information indicates that the alarm triggered by the first target is an invalid alarm, the server 120 outputs the alarm information. The form, or content, or form and content of the alarm information output in different security scenarios may be different, and the ways of responding to the alarm information may also be different. For example, when it is determined that an animal is wandering on a railway in a no-man’s land, the alarm information may include, but is not limited to, the type of alarm, the location information that triggered the alarm, the alarm level, the security target or the number of security targets, etc., and the server 120 outputs the alarm information At the same time, it can also send warning information to the train at a set distance from the warning position to remind the train to decelerate in advance or whistle. Among them, the alarm level is used to indicate the urgency corresponding to the alarm triggered by the target. Generally, the higher the alarm level, the higher the urgency. For another example, when it is determined that someone has crossed the border and entered the security area, the alarm information may include, but is not limited to, the type of alarm, the location information or the alarm level that triggered the alarm, etc. While the server 120 outputs the alarm information, it can also use the speaker near the alarm location. Give voice warnings, or notify relevant security personnel to give manual warnings.
本申请上述实施例中,服务器120接收来自摄像机110的多媒体信息,该多媒体信息可以是视频数据,也可以是多个图像。服务器120对该多媒体信息进行检测,当检测到摄像机110的拍摄区域中存在运动的第一目标,且该第一目标的行为是触发告警的行为(如区域入侵、越界或徘徊等)时,从包括该第一目标的第一图像中提取该第一目标的第一特征信息,也即是触发告警的行为由服务器120进行识别无需摄像机110参与,可以减少摄像机110的计算量。进一步地,服务器120将第一特征信息与无效告警数据库中的特征信息之间的匹配。当两者之间的匹配度较高(如大于或等于第一阈值)时,表明该第一目标所触发的告警是无效的告警,服务器120可以自动过滤该第一目标触发的告警信息,即不输出告警信息,从而节省人工检测环节,减少人工维护的开销,可以提高告警流程的工作效率和用户体验。当两者之间的匹配度较低(如小于第一阈值)时,服务器120可以将包括第一目标的第一图像进行显示,以使得工作人员根据第一图像判断第一目标触发的告警是否为无效的告警。当工作人员根据第一图像判断第一目标触发的告警为无效的告警时,服务器120不输出告警信息,同时将第一特征信息添加到无效告警数据库中,以增加无效告警数据库中样本的多样性。当第一目标再次触发告警时,服务器120可以自动过滤第一目标触发的告警信息,无需工作人员进行再次检查,可以降低产生无效告警的概率,提高告警的准确率,从而提高用户体验。In the foregoing embodiment of the present application, the server 120 receives multimedia information from the camera 110, and the multimedia information may be video data or multiple images. The server 120 detects the multimedia information, and when it detects that there is a moving first target in the shooting area of the camera 110, and the behavior of the first target is a behavior that triggers an alarm (such as area intrusion, cross-border or wandering, etc.), The first feature information of the first target is extracted from the first image including the first target, that is, the behavior of triggering an alarm is recognized by the server 120 without the participation of the camera 110, which can reduce the amount of calculation of the camera 110. Further, the server 120 matches the first characteristic information with the characteristic information in the invalid alarm database. When the matching degree between the two is high (for example, greater than or equal to the first threshold), it indicates that the alarm triggered by the first target is an invalid alarm, and the server 120 can automatically filter the alarm information triggered by the first target, that is, No alarm information is output, thereby saving manual detection links, reducing manual maintenance costs, and improving the efficiency of the alarm process and user experience. When the matching degree between the two is low (for example, less than the first threshold), the server 120 may display the first image including the first target, so that the staff can judge whether the alarm triggered by the first target is based on the first image. It is an invalid alarm. When the staff judges that the alarm triggered by the first target is an invalid alarm based on the first image, the server 120 does not output the alarm information, and at the same time adds the first characteristic information to the invalid alarm database to increase the diversity of samples in the invalid alarm database . When the first target triggers an alarm again, the server 120 can automatically filter the alarm information triggered by the first target without requiring staff to check again, which can reduce the probability of generating an invalid alarm, improve the accuracy of the alarm, and improve user experience.
上述本申请提供的实施例中,为了实现上述本申请实施例提供的方法中的各功能,服务器120可以包括硬件结构和/或软件模块,以硬件结构、软件模块、或硬件结构加软件模块的形式来实现上述各功能。上述各功能中的某个功能以硬件结构、软件模块、还是硬件结构加软件模块的方式来执行,取决于技术方案的特定应用和设计约束条件。In the foregoing embodiments of the present application, in order to implement the functions in the methods provided in the foregoing embodiments of the present application, the server 120 may include a hardware structure and/or a software module. Form to achieve the above functions. Whether a certain function among the above-mentioned functions is executed by a hardware structure, a software module, or a hardware structure plus a software module depends on the specific application and design constraint conditions of the technical solution.
下面结合图1所示的安防监控系统100,介绍本申请实施例提供的另一种减少无效告警的方法。请参见图4,图4所示为本申请实施例提供的另一种减少无效告警的方法的流程示意图。In the following, in conjunction with the security monitoring system 100 shown in FIG. 1, another method for reducing invalid alarms provided by an embodiment of the present application is introduced. Please refer to FIG. 4, which is a schematic flowchart of another method for reducing invalid alarms according to an embodiment of the application.
S401:服务器120接收来自摄像机110的告警请求,该告警请求包括第一图像和第一特征信息。S401: The server 120 receives an alarm request from the camera 110, where the alarm request includes a first image and first feature information.
其中,第一图像中包括第一目标,该第一目标的行为是触发告警的行为,第一特征信息是该第一目标的特征信息。Wherein, the first image includes a first target, the behavior of the first target is a behavior that triggers an alarm, and the first characteristic information is characteristic information of the first target.
摄像机110对其拍摄区域内的画面进行拍摄,同时对其拍摄区域内的画面进行检测,以确定其拍摄区域内是否存在运动的目标(这里把被检测到的运动目标称为第一目标)、且该第一目标的行为是触发告警的行为。具体的,摄像机110可以从设定时长的拍摄画面中抽取至少一个图像,通过运动目标检测方法对该至少一个图像进行检测,以确定拍摄区域中是否存在运动的第一目标。其中,摄像机110的拍摄区域中的部分或全部区域为安防区域。例如,室内监控场景中房间内的区域皆为安防区域,需要将摄像机110部署在该房间内,这样摄像机110的拍摄区域为该房间内的全部或部分区域,也即是该摄像机110的拍摄区域中的全部区域皆为安防区域。再例如,园区监控场景中园区的围墙为安防区域,需要将摄像机110部署在围墙的周围,这样摄像机110的拍摄区域中的部分画面为该围墙的画面,也即是该摄像机110的拍摄区域中的部分区域为安防区域。其中,运动目标检测方法是一种目标检测方法,可以采用机器学习算法。The camera 110 photographs the picture in its shooting area, and at the same time detects the picture in its shooting area to determine whether there is a moving target in its shooting area (here, the detected moving target is called the first target), And the behavior of the first target is a behavior that triggers an alarm. Specifically, the camera 110 may extract at least one image from a shooting frame of a set duration, and detect the at least one image by a moving target detection method to determine whether there is a moving first target in the shooting area. Wherein, part or all of the shooting area of the camera 110 is a security area. For example, in an indoor surveillance scene, all areas in the room are security areas, and the camera 110 needs to be deployed in the room, so that the shooting area of the camera 110 is all or part of the area in the room, that is, the shooting area of the camera 110 All areas in are security areas. For another example, in a park surveillance scene, the wall of the park is a security area, and the camera 110 needs to be deployed around the wall, so that part of the picture in the shooting area of the camera 110 is the picture of the wall, that is, in the shooting area of the camera 110 Part of the area is a security area. Among them, the moving target detection method is a target detection method, and machine learning algorithms can be used.
当摄像机110检测到其拍摄区域中存在运动的第一目标时,摄像机110再确定该第一目标的行为是否为触发告警的行为。可选的,摄像机110可以通过告警识别模型来确定该第一目标的行为是否为触发告警的行为。例如,摄像机110可以从包括第一目标的图像中提取该第一目标的第一特征信息,将该第一特征信息输入到告警识别模型中得到识别结果。再例如,摄像机100可以将第一目标所在图像的区域按照不同的缩小尺寸进行缩小、按照不同的放大尺寸进行放大、或者按照不同的缩小尺寸和不同的放大尺寸分别进行缩小和放大,得到至少一个子图像,从该至少一个子图像中的每个子图像中提取第一目标的特征信息得到至少一个第二特征信息,然后将该至少一个第二特征信息输入到告警识别模型中得到识别结果。如果该识别结果大于或等于预设的第二阈值,则摄像机110确定该第一目标的行为是触发告警的行为,否则,该第一目标的行为不是触发告警的行为。其中,触发告警的行为可以是根据不同的安防场景预先设定的行为,例如无人区中野生动物在铁路上的徘徊是触发告警的行为,园区安防中人的翻墙行为是触发告警的行为等。该告警识别模型是摄像机110对预设的触发告警的行为所对应的特征信息进行模型训练得到,其对应的模型训练过程可以参考现有技术,本申请实施例对此不做限定。When the camera 110 detects that there is a moving first target in its shooting area, the camera 110 then determines whether the behavior of the first target is a behavior that triggers an alarm. Optionally, the camera 110 may determine whether the behavior of the first target is a behavior that triggers an alarm through an alarm recognition model. For example, the camera 110 may extract first characteristic information of the first target from an image including the first target, and input the first characteristic information into an alarm recognition model to obtain a recognition result. For another example, the camera 100 may reduce the area of the image where the first target is located according to different reduced sizes, enlarge according to different enlarged sizes, or reduce and enlarge according to different reduced sizes and different enlarged sizes, respectively, to obtain at least one For sub-images, the feature information of the first target is extracted from each sub-image of the at least one sub-image to obtain at least one second feature information, and then the at least one second feature information is input into the alarm recognition model to obtain a recognition result. If the recognition result is greater than or equal to the preset second threshold, the camera 110 determines that the behavior of the first target is a behavior that triggers an alarm; otherwise, the behavior of the first target is not a behavior that triggers an alarm. Among them, the behavior that triggers the alarm can be a behavior that is preset according to different security scenarios. For example, the wandering of wild animals on the railway in the unmanned area is the behavior that triggers the alarm, and the behavior of people over the wall in the park security is the behavior that triggers the alarm. Wait. The alarm recognition model is obtained by the camera 110 performing model training on the feature information corresponding to the preset alarm-triggering behavior. The corresponding model training process can refer to the prior art, which is not limited in the embodiment of the application.
当摄像机110检测到其拍摄区域存在运动的第一目标、且该第一目标的行为触发告警的行为时,摄像机110可以将第一目标的第一特征信息或该第一目标的至少一个第二特征信息发送给服务器120。服务器120接收该第一特征信息或至少一个第二特征信息。可选的,摄像机110还可以将包括第一目标的第一图像发送给服务器120。例如,摄像机110可以选取 该多个图像中第一目标的特征信息最多的图像作为第一图像发送给服务器120,或选取该多个图像中的拍摄时间最早的图像作为第一图像发送给服务器120,或选取该多个图像中分辨率最高的图像作为第一图像发送给服务器120等,本申请实施例对此不作限定。When the camera 110 detects that there is a moving first target in its shooting area, and the behavior of the first target triggers an alert behavior, the camera 110 can record the first feature information of the first target or at least one second target of the first target. The characteristic information is sent to the server 120. The server 120 receives the first characteristic information or at least one second characteristic information. Optionally, the camera 110 may also send the first image including the first target to the server 120. For example, the camera 110 may select the image with the most feature information of the first target among the multiple images as the first image and send it to the server 120, or select the image with the earliest shooting time among the multiple images and send it to the server 120 as the first image. , Or select the image with the highest resolution among the multiple images as the first image and send it to the server 120, etc., which is not limited in the embodiment of the present application.
S402:服务器120将第一特征信息与无效告警数据库中的特征信息进行匹配。如果该第一特征信息与无效告警数据库中的特征信息之间的匹配度大于或等于第一阈值,则执行S403;如果该第一特征信息与无效告警数据库中的特征信息之间的匹配度小于第一阈值,则执行S404。S402: The server 120 matches the first characteristic information with the characteristic information in the invalid alarm database. If the degree of matching between the first characteristic information and the characteristic information in the invalid alarm database is greater than or equal to the first threshold, execute S403; if the degree of matching between the first characteristic information and the characteristic information in the invalid alarm database is less than For the first threshold, S404 is executed.
其中,无效告警数据库中存储有至少一个目标的特征信息,该至少一个目标中的每个目标的行为是触发无效告警的行为。例如,该无效告警数据库中的特征信息可以包括根据安防场景预先获取的容易触发无效告警的目标的特征信息,或者该无效告警数据库中的特征信息可以包括历史触发无效告警的目标的特征信息,或者该无效告警数据库中的特征信息包括根据安防场景预先获取的容易触发无效告警的目标的特征信息,以及历史触发无效告警的目标的特征信息。可选的,该无效告警数据库中还可以包括告警类型、安防目标、安防区域或摄像机的身份等信息中的至少一种。其中,告警类型可以包括但不限于人的越界行为、人的徘徊行为、人的翻墙行为、动物的越界行为或车的越界行为等。可选的,该无效告警数据库中一目标的特征信息可以通过对该目标所在图像中的区域进行不同尺寸的缩小、或放大、或缩小和放大后的子图像进行特征提取得到的,以增加无效告警数据库中特征信息的多样性,具体提取过程可以参见前述描述,在此不再赘述。Wherein, the invalid alarm database stores characteristic information of at least one target, and the behavior of each target in the at least one target is a behavior that triggers an invalid alarm. For example, the characteristic information in the invalid alarm database may include the characteristic information of the target that easily triggers the invalid alarm obtained in advance according to the security scene, or the characteristic information in the invalid alarm database may include the characteristic information of the target that triggers the invalid alarm in history, or The feature information in the invalid alarm database includes feature information of targets that are easy to trigger invalid alarms obtained in advance according to security scenarios, and feature information of targets that trigger invalid alarms in history. Optionally, the invalid alarm database may also include at least one of information such as an alarm type, a security target, a security area, or the identity of a camera. Among them, the alarm type may include, but is not limited to, human cross-border behavior, human wandering behavior, human over-wall behavior, animal cross-border behavior, or vehicle cross-border behavior, etc. Optionally, the feature information of a target in the invalid alarm database can be obtained by performing feature extraction on sub-images of different sizes of the region in the image where the target is located, so as to increase invalidity. For the diversity of feature information in the alarm database, the specific extraction process can be referred to the foregoing description, which will not be repeated here.
服务器120可以将第一特征信息与无效告警数据库中的特征信息进行匹配,或者将至少一个第二特征信息与无效告警数据库中的特征信息进行匹配,以确定该第一目标的行为是否为触发无效告警的行为。以将第一特征信息与无效告警数据库中的特征信息进行匹配为例,服务器120可以将第一特征信息与无效告警数据库中的所有的特征信息进行逐一匹配,这样虽然可以保证匹配结果的准确性,但当无效告警数据库中的特征信息较多时,会大幅增加服务器120的计算量。可选的,服务器120可以将告警类型、安防区域或安防场景等作为考虑因素进行匹配,以排除部分无效匹配,减少计算量,提高匹配效率。例如,第一目标触发的告警的类型为第一告警类型(如人的翻墙行为),服务器120可以根据该第一告警类型从无效告警数据库中获取第三特征信息,该第三特征细腻对应的目标所触发的无效告警为第一告警类型的无效告警,然后将第一特征信息与第三特征信息进行匹配。The server 120 may match the first feature information with the feature information in the invalid alarm database, or match at least one second feature information with the feature information in the invalid alarm database, to determine whether the behavior of the first target is invalid triggering The behavior of the alert. Taking the matching of the first feature information with the feature information in the invalid alarm database as an example, the server 120 may match the first feature information with all the feature information in the invalid alarm database one by one, although the accuracy of the matching result can be guaranteed. However, when there are many feature information in the invalid alarm database, the calculation amount of the server 120 will be greatly increased. Optionally, the server 120 may match the alarm type, security area, or security scenario as consideration factors to eliminate partial invalid matches, reduce the amount of calculation, and improve matching efficiency. For example, the type of the alarm triggered by the first target is the first alarm type (such as the behavior of a person overturning the wall), and the server 120 may obtain the third characteristic information from the invalid alarm database according to the first alarm type, and the third characteristic finely corresponds to The invalid alarm triggered by the target of is the invalid alarm of the first alarm type, and then the first characteristic information is matched with the third characteristic information.
当服务器120确定第一特征信息与无效告警数据中的一特征信息之间的匹配度大于或等于第一阈值,则服务器120可以确定该第一目标触发的告警为无效告警,即执行步骤S403;或者当服务器120确定第一特征信息与无效告警数据中的设定数目(如3个)的特征信息之间的平均匹配度大于或等于第一阈值,则服务器120可以确定该第一目标触发的告警为无效告警,即执行步骤S403。当服务器120确定第一特征信息与无效告警数据中的任一特征信息之间的匹配度小于第一阈值时,则服务器120可以将第一图像发送给显示器130进行显示,即执行步骤S404。When the server 120 determines that the degree of matching between the first characteristic information and a characteristic information in the invalid alarm data is greater than or equal to the first threshold, the server 120 may determine that the alarm triggered by the first target is an invalid alarm, that is, execute step S403; Or when the server 120 determines that the average matching degree between the first characteristic information and the set number (such as 3) of the characteristic information in the invalid alarm data is greater than or equal to the first threshold, the server 120 may determine that the first target triggers If the alarm is an invalid alarm, step S403 is executed. When the server 120 determines that the degree of matching between the first feature information and any feature information in the invalid alarm data is less than the first threshold, the server 120 may send the first image to the display 130 for display, that is, step S404 is performed.
S403:服务器120确定第一目标触发的告警为无效告警,不输出告警信息。本步骤也可以理解成对摄像机发出的告警请求进行终止。S403: The server 120 determines that the alarm triggered by the first target is an invalid alarm, and does not output alarm information. This step can also be understood as terminating the alarm request sent by the camera.
由于该无效告警数据库中存储有以前触发无效告警的目标的特征信息,和/或容易触发无效告警的目标的特征信息,因此当第一特征信息与该无效告警数据库中的特征信息之间的匹配度较高(如大于或等于第一阈值)时,表明该第一目标所触发的告警是无效的告警。所以 可以自动过滤摄像机发送的告警请求,不输出告警信息,从而节省人工检测环节,减少人工维护的开销,可以提高告警流程的工作效率和用户体验。Since the invalid alarm database stores the characteristic information of the target that previously triggered the invalid alarm, and/or the characteristic information of the target that easily triggers the invalid alarm, when the first characteristic information matches the characteristic information in the invalid alarm database When the degree is high (for example, greater than or equal to the first threshold), it indicates that the alarm triggered by the first target is an invalid alarm. Therefore, the alarm request sent by the camera can be automatically filtered, and the alarm information is not output, thereby saving manual detection links, reducing manual maintenance costs, and improving the efficiency of the alarm process and user experience.
S404:服务器120将第一图像发送给显示器130进行显示。S404: The server 120 sends the first image to the display 130 for display.
当第一特征信息与该无效告警数据库中的特征信息之间的匹配度较低(如小于第一阈值)时,服务器120将第一图像发送给显示器130进行显示,显示器130将该第一图像显示在显示界面中(或称为输入界面),以使工作人员根据第一图像判断第一目标触发的告警是否为无效告警。为了提高告警流程的效率,服务器120将第一图像发送给显示器130进行显示的同时,还可以通过语音、告警灯或动画等方式提醒工作人员对当前显示界面所显示的第一图像进行判断。显示界面可以参见图3所示,在此不再赘述。When the degree of matching between the first feature information and the feature information in the invalid alarm database is low (for example, less than the first threshold), the server 120 sends the first image to the display 130 for display, and the display 130 uses the first image to display the first image. It is displayed on the display interface (or called the input interface), so that the staff can judge whether the alarm triggered by the first target is an invalid alarm according to the first image. In order to improve the efficiency of the alarm process, while the server 120 sends the first image to the display 130 for display, it can also remind the staff to judge the first image displayed on the current display interface through voice, warning lights or animation. The display interface can be seen in Figure 3, which will not be repeated here.
S405:服务器120接收来自触屏显示器130的第一信息,该第一信息用于指示第一目标触发的告警是否为无效告警。S405: The server 120 receives the first information from the touch screen display 130, where the first information is used to indicate whether the alarm triggered by the first target is an invalid alarm.
当然,第一信息除了来自于显示器130,还可以来自于键盘、鼠标等其他输入装置。Of course, in addition to the display 130, the first information may also come from other input devices such as a keyboard and a mouse.
例如,该第一信息可以是无效告警选项320触发的信息,或是有效告警选项330触发的信息。当第一信息是无效告警选项320触发的信息时,该第一信息用于指示第一目标触发的告警为无效告警。当第一信息是有效告警选项330触发的信息时,第一信息用于指示第一目标触发的告警为有效告警。For example, the first information may be information triggered by the invalid alarm option 320 or information triggered by the valid alarm option 330. When the first information is information triggered by the invalid alarm option 320, the first information is used to indicate that the alarm triggered by the first target is an invalid alarm. When the first information is the information triggered by the valid alarm option 330, the first information is used to indicate that the alarm triggered by the first target is a valid alarm.
S406:在第一信息指示第一目标触发的告警是无效告警时,服务器120不输出告警信息,并将第一特征信息添加至无效告警数据库中。S406: When the first information indicates that the alarm triggered by the first target is an invalid alarm, the server 120 does not output the alarm information, and adds the first characteristic information to the invalid alarm database.
在第一信息指示第一目标触发的告警是无效告警时,服务器120过滤来自摄像机的告警请求,不输出告警信息,同时服务器120还可以将第一特征信息添加至无效告警数据库中,这样可以过滤第一目标触发的重复告警,省去了人工检测环节,可以减少人工维护的开销,提高用户体现。When the first information indicates that the alarm triggered by the first target is an invalid alarm, the server 120 filters the alarm request from the camera and does not output the alarm information. At the same time, the server 120 can also add the first characteristic information to the invalid alarm database, so that it can filter The repetitive alarm triggered by the first target eliminates the need for manual detection, which can reduce the overhead of manual maintenance and improve user performance.
可选的,如果在步骤S401中,服务器120有获取第一目标的至少一个第二特征信息,则在步骤S406中服务器120可以将该至少一个第二特征信息添加到无效告警数据库中,以丰富第一目标的特征信息,增加无效告警数据库的多样性,从而可以提高判断无效告警的准确性。如果在步骤S401中,服务器120没有获取第一目标的至少一个第二特征信息,则在步骤S406中服务器120可以将第一目标在第一图像中的区域按照不同的尺寸进行缩小、或放大、或缩小和放大得到至少一个子图像,从该至少一个子图像中的每个子图像中获取第一目标的特征信息得到至少一个第二特征信息,然后将该至少一个第二特征信息添加到无效告警数据库中,以丰富第一目标的特征信息,增加无效告警数据库的多样性,从而可以提高判断无效告警的准确性。Optionally, if in step S401, the server 120 has acquired at least one second characteristic information of the first target, then in step S406, the server 120 may add the at least one second characteristic information to the invalid alarm database to enrich The feature information of the first target increases the diversity of the invalid alarm database, thereby improving the accuracy of judging invalid alarms. If in step S401, the server 120 does not obtain at least one second feature information of the first target, then in step S406, the server 120 may reduce, or enlarge, or enlarge, or enlarge, or reduce, the area of the first target in the first image according to different sizes. Or reduce and enlarge to obtain at least one sub-image, obtain characteristic information of the first target from each of the at least one sub-image to obtain at least one second characteristic information, and then add the at least one second characteristic information to the invalidity alarm In the database, the feature information of the first target is enriched, and the diversity of the invalid alarm database is increased, so that the accuracy of judging invalid alarms can be improved.
S407:在第一信息指示第一目标触发的告警是有效告警时,服务器120输出告警信息。S407: When the first information indicates that the alarm triggered by the first target is a valid alarm, the server 120 outputs alarm information.
在第一信息指示第一目标触发的告警是无效告警时,服务器120输出告警信息。不同安防场景中输出的告警信息的形式、或内容、或形式和内容等可能不同,同时应对该告警信息的方式也可能不同。例如,当确定动物在无人区的铁路上徘徊时,该告警信息可能包括但不限于告警类型、触发告警的位置信息、告警等级、安防目标或安防目标的数量等,服务器120输出该告警信息的同时,还可以向将告警信息发送给距离告警位置设定距离的列车,以提示列车提前减速或鸣笛等。其中,告警等级用于指示目标的触发的告警所对应的紧急程度,一般情况下告警等级越高,紧急程度越高。再例如,当确定有人越界进入安防区域时,该告警信息可能包括但不限于告警类型、触发告警的位置信息或告警等级等,服务器120输出该告 警信息的同时,还可以通过告警位置附近的喇叭进行语音示警,或者通知相关的安保人员进行人工示警。When the first information indicates that the alarm triggered by the first target is an invalid alarm, the server 120 outputs the alarm information. The form, or content, or form and content of the alarm information output in different security scenarios may be different, and the ways of responding to the alarm information may also be different. For example, when it is determined that an animal is wandering on a railway in a no-man’s land, the alarm information may include, but is not limited to, the type of alarm, the location information that triggered the alarm, the alarm level, the security target or the number of security targets, etc., and the server 120 outputs the alarm information At the same time, it can also send warning information to the train at a set distance from the warning position to remind the train to decelerate in advance or whistle. Among them, the alarm level is used to indicate the urgency corresponding to the alarm triggered by the target. Generally, the higher the alarm level, the higher the urgency. For another example, when it is determined that someone has crossed the border and entered the security area, the alarm information may include, but is not limited to, the type of alarm, the location information or the alarm level that triggered the alarm, etc. While the server 120 outputs the alarm information, it can also use the speaker near the alarm location. Give voice warnings, or notify relevant security personnel to give manual warnings.
本申请上述实施例中,服务器120接收来自摄像机110的第一特征信息,该第一特征信息是摄像机110检测到其拍摄区域中存在运动的第一目标,且该第一目标的行为是触发告警的行为时,从包括该第一目标的第一图像中提取该第一目标的第一特征信息后发送的。也即是触发告警的行为由摄像机110进行识别无需实时地向服务器120发送多媒体信息以识别触发告警的行为,可以减少服务器120的负荷以及节省网络资源。In the foregoing embodiment of the present application, the server 120 receives the first characteristic information from the camera 110, the first characteristic information is that the camera 110 detects that there is a first target moving in its shooting area, and the behavior of the first target is to trigger an alarm Is sent after extracting the first characteristic information of the first target from the first image that includes the first target. That is, the behavior that triggers the alarm is recognized by the camera 110 without sending multimedia information to the server 120 in real time to identify the behavior that triggers the alarm, which can reduce the load of the server 120 and save network resources.
上述本申请提供的实施例中,为了实现上述本申请实施例提供的方法中的各功能,服务器120可以包括硬件结构和/或软件模块,以硬件结构、软件模块、或硬件结构加软件模块的形式来实现上述各功能。上述各功能中的某个功能以硬件结构、软件模块、还是硬件结构加软件模块的方式来执行,取决于技术方案的特定应用和设计约束条件。In the foregoing embodiments of the present application, in order to implement the functions in the methods provided in the foregoing embodiments of the present application, the server 120 may include a hardware structure and/or a software module. Form to achieve the above functions. Whether a certain function among the above-mentioned functions is executed by a hardware structure, a software module, or a hardware structure plus a software module depends on the specific application and design constraint conditions of the technical solution.
基于相同的技术构思,本申请实施例还提供了一种减少无效告警的装置。Based on the same technical concept, the embodiment of the present application also provides a device for reducing invalid alarms.
图5示出了一种减少无效告警的装置500的结构示意图。其中,减少无效告警的装置500可以用于实现图2或图4所示的实施例中服务器120的功能,即图1所示的实施例中服务器120的功能。减少无效告警的装置500可以是硬件结构、软件模块、或硬件结构加软件模块。减少无效告警的装置500可以由芯片或芯片系统实现。本申请实施例中,芯片系统可以由芯片构成,也可以包含芯片和其他分立器件。FIG. 5 shows a schematic structural diagram of a device 500 for reducing invalid alarms. The device 500 for reducing invalid alarms can be used to implement the function of the server 120 in the embodiment shown in FIG. 2 or 4, that is, the function of the server 120 in the embodiment shown in FIG. 1. The device 500 for reducing invalid alarms may be a hardware structure, a software module, or a hardware structure plus a software module. The device 500 for reducing invalid alarms can be implemented by a chip or a chip system. In the embodiments of the present application, the chip system may be composed of chips, or may include chips and other discrete devices.
减少无效告警的装置500可以包括处理单元501和收发单元502。The apparatus 500 for reducing invalid alarms may include a processing unit 501 and a transceiver unit 502.
其中,处理单元501可以执行图2所示的实施例中的步骤S202~步骤S206、步骤S209和步骤S210,和/或用于支持本文所描述的技术的其它过程。一种可能的实现方式,处理单元501可以用于与接收单元502通信,或者,处理单元501可以与安防系统100的其它模块进行通信,其可以是电路、器件、接口、总线、软件模块、收发器或者其它任意可以实现通信的装置。接收单元502可以执行图2所示的实施例中的步骤S201,步骤S207和步骤S208,和/或用于支持本文所描述的技术的其它过程。一种可能的实现方式,接收单元502可以用于与处理单元501通信,或者,可以与安防系统100的其它模块进行通信,其可以是电路、器件、接口、总线、软件模块、收发器或者其它任意可以实现通信的装置。Wherein, the processing unit 501 can execute steps S202 to S206, step S209, and step S210 in the embodiment shown in FIG. 2, and/or other processes for supporting the technology described herein. In a possible implementation, the processing unit 501 can be used to communicate with the receiving unit 502, or the processing unit 501 can communicate with other modules of the security system 100, which can be circuits, devices, interfaces, buses, software modules, transceivers, etc. Device or any other device that can realize communication. The receiving unit 502 may perform step S201, step S207, and step S208 in the embodiment shown in FIG. 2, and/or other processes for supporting the technology described herein. In a possible implementation, the receiving unit 502 can be used to communicate with the processing unit 501, or can communicate with other modules of the security system 100, which can be circuits, devices, interfaces, buses, software modules, transceivers, or other modules. Any device that can realize communication.
或者,其中,处理单元501可以执行图4所示的实施例中的步骤S402、步骤S403、步骤S406以及步骤S407,和/或用于支持本文所描述的技术的其它过程。一种可能的实现方式,处理单元501可以用于与接收单元502通信,或者,处理单元501可以与安防系统100的其它模块进行通信,其可以是电路、器件、接口、总线、软件模块、收发器或者其它任意可以实现通信的装置。接收单元502可以执行图4所示的实施例中的步骤S401,步骤S404和步骤S407,和/或用于支持本文所描述的技术的其它过程。一种可能的实现方式,接收单元502可以用于与处理单元501通信,或者,可以与安防系统100的其它模块进行通信,其可以是电路、器件、接口、总线、软件模块、收发器或者其它任意可以实现通信的装置。Alternatively, the processing unit 501 may execute step S402, step S403, step S406, and step S407 in the embodiment shown in FIG. 4, and/or other processes for supporting the technology described herein. In a possible implementation, the processing unit 501 can be used to communicate with the receiving unit 502, or the processing unit 501 can communicate with other modules of the security system 100, which can be circuits, devices, interfaces, buses, software modules, transceivers, etc. Device or any other device that can realize communication. The receiving unit 502 may perform step S401, step S404, and step S407 in the embodiment shown in FIG. 4, and/or other processes for supporting the technology described herein. In a possible implementation, the receiving unit 502 can be used to communicate with the processing unit 501, or can communicate with other modules of the security system 100, which can be circuits, devices, interfaces, buses, software modules, transceivers, or other modules. Any device that can realize communication.
其中,上述方法实施例涉及的各步骤的所有相关内容均可以援引到对应功能模块的功能描述,在此不再赘述。Among them, all relevant content of the steps involved in the above method embodiments can be cited in the functional description of the corresponding functional module, which will not be repeated here.
图5所示的实施例中对模块的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,另外,在本申请各个实施例中的各功能模块可以集成在一个处理器中,也可以是单独物理存在,也可以两个或两个以上模块集成在一个模块中。上述集成的模块既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。The division of modules in the embodiment shown in FIG. 5 is illustrative, and it is only a logical function division. In actual implementation, there may be other division methods. In addition, the functional modules in the various embodiments of the present application may be integrated In a processor, it may exist alone physically, or two or more modules may be integrated into one module. The above-mentioned integrated modules can be implemented in the form of hardware or software functional modules.
如图6所示为本申请实施例提供的告警信号处理设备600,其中,告警信号处理设备600可以用于实现图2和/或图4所示的实施例中服务器120的功能。其中,该告警信号处理设备600中的处理器601可以为芯片或芯片系统。本申请实施例中,芯片系统可以由芯片构成,也可以包含芯片和其他分立器件。告警信号处理设备600例如是独立服务器、计算器、服务器集群、云服务器。FIG. 6 shows an alarm signal processing device 600 provided in an embodiment of the application, where the alarm signal processing device 600 may be used to implement the function of the server 120 in the embodiment shown in FIG. 2 and/or FIG. 4. The processor 601 in the alarm signal processing device 600 may be a chip or a chip system. In the embodiments of the present application, the chip system may be composed of chips, or may include chips and other discrete devices. The alarm signal processing device 600 is, for example, an independent server, a calculator, a server cluster, or a cloud server.
告警信号处理设备600包括至少一个处理器601,用于实现或用于告警信号处理设备600实现图2和/或图4所示的实施例中服务器120的功能。示例性地,处理器601可以获取第一目标的第一特征信息,第一目标的行为是触发摄像机告警的行为;将第一特征信息与无效告警数据库中的特征信息进行匹配,无效告警数据库中包括至少一个目标的特征信息,至少一个目标中的每个目标的行为是触发无效告警的行为;如果第一特征信息与无效告警数据库中的特征信息之间的匹配度大于或等于第一阈值,不输出告警信息。具体参见方法示例中的详细描述,此处不做赘述。The alarm signal processing device 600 includes at least one processor 601 for implementing or used for the alarm signal processing device 600 to implement the functions of the server 120 in the embodiment shown in FIG. 2 and/or FIG. 4. Exemplarily, the processor 601 may obtain the first characteristic information of the first target, and the behavior of the first target is the behavior that triggers the camera alarm; the first characteristic information is matched with the characteristic information in the invalid alarm database, and the invalid alarm database is The characteristic information of at least one target is included, and the behavior of each target in the at least one target is a behavior that triggers an invalid alarm; if the degree of matching between the first characteristic information and the characteristic information in the invalid alarm database is greater than or equal to the first threshold, No warning information is output. For details, please refer to the detailed description in the method example, which will not be repeated here.
告警信号处理设备600还可以包括至少一个存储器602,用于存储程序指令和/或数据。存储器602和处理器601耦合。本申请实施例中的耦合是装置、单元或模块之间的间接耦合或通信连接,可以是电性,机械或其它的形式,用于装置、单元或模块之间的信息交互。处理器601可能和存储器602协同操作。处理器601可能执行存储器602中存储的程序指令。所述至少一个存储器中的至少一个可以包括于处理器中。存储器602可以集成于处理器601之内。The alarm signal processing device 600 may also include at least one memory 602 for storing program instructions and/or data. The memory 602 and the processor 601 are coupled. The coupling in the embodiments of the present application is an indirect coupling or communication connection between devices, units or modules, and may be in electrical, mechanical or other forms, and is used for information exchange between devices, units or modules. The processor 601 may operate in cooperation with the memory 602. The processor 601 may execute program instructions stored in the memory 602. At least one of the at least one memory may be included in the processor. The memory 602 may be integrated in the processor 601.
告警信号处理设备600还可以包括接口603,用于与处理器601通信,或者用于通过传输介质和其它设备进行通信,从而用于告警信号处理设备600可以和其它设备进行通信。示例性地,该其它设备可以是计算模块。处理器601可以利用接口603收发数据,例如接收摄像机发送的多媒体信息或者告警请求,该告警请求包括第一特征信息以及第一特征信息对应的第一图像。The alarm signal processing device 600 may further include an interface 603 for communicating with the processor 601 or for communicating with other devices through a transmission medium, so that the alarm signal processing device 600 can communicate with other devices. Exemplarily, the other device may be a computing module. The processor 601 may use the interface 603 to send and receive data, for example, to receive multimedia information or an alarm request sent by a camera, where the alarm request includes the first characteristic information and a first image corresponding to the first characteristic information.
本申请实施例中不限定上述接口603、处理器601以及存储器602之间的具体连接介质。本申请实施例在图6中以存储器602、处理器601以及接口603之间通过总线604连接,总线在图6中以粗线表示,其它部件之间的连接方式,仅是进行示意性说明,并不引以为限。所述总线可以分为地址总线、数据总线、控制总线等。为便于表示,图6中仅用一条粗线表示,但并不表示仅有一根总线或一种类型的总线。The specific connection medium between the aforementioned interface 603, the processor 601, and the memory 602 is not limited in the embodiment of the present application. In the embodiment of the present application, in FIG. 6, the memory 602, the processor 601, and the interface 603 are connected by a bus 604. The bus is represented by a thick line in FIG. It is not limited. The bus can be divided into an address bus, a data bus, a control bus, and so on. For ease of representation, only one thick line is used in FIG. 6, but it does not mean that there is only one bus or one type of bus.
在本申请实施例中,处理器601可以是通用处理器、数字信号处理器、专用集成电路、现场可编程门阵列或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件,可以实现或者执行本申请实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者任何常规的处理器等。结合本申请实施例所公开的方法的步骤可以直接体现为硬件处理器执行完成,或者用处理器中的硬件及软件模块组合执行完成。In the embodiment of the present application, the processor 601 may be a general-purpose processor, a digital signal processor, an application specific integrated circuit, a field programmable gate array or other programmable logic device, a discrete gate or transistor logic device, or a discrete hardware component, which can implement Or execute the methods, steps, and logical block diagrams disclosed in the embodiments of the present application. The general-purpose processor may be a microprocessor or any conventional processor or the like. The steps of the method disclosed in combination with the embodiments of the present application may be directly embodied as being executed and completed by a hardware processor, or executed and completed by a combination of hardware and software modules in the processor.
在本申请实施例中,存储器602可以是非易失性存储器,例如硬盘(hard disk drive,HDD)或固态硬盘(solid-state drive,SSD)等,还可以是易失性存储器(volatile memory),例如随机存取存储器(random access memory,RAM)。存储器是能够用于携带或存储具有指令或数据结构形式的期望的程序代码并能够由计算机存取的任何其他介质,但不限于此。本申请实施例中的存储器602还可以是电路或者其它任意能够实现存储功能的装置,用于存储程序指令和/或数据。In the embodiment of the present application, the memory 602 may be a non-volatile memory, such as a hard disk drive (HDD) or a solid-state drive (SSD), etc., or a volatile memory (volatile memory). For example, random access memory (RAM). The memory is any other medium that can be used to carry or store desired program codes in the form of instructions or data structures and that can be accessed by a computer, but is not limited to this. The memory 602 in the embodiment of the present application may also be a circuit or any other device capable of realizing a storage function for storing program instructions and/or data.
本申请实施例中还提供一种计算机可读存储介质,包括指令,当其在计算机上运行时, 使得计算机执行图2和/或图4所示的实施例中服务器120执行的方法。An embodiment of the present application also provides a computer-readable storage medium, including instructions, which when run on a computer, cause the computer to execute the method executed by the server 120 in the embodiment shown in FIG. 2 and/or FIG. 4.
本申请实施例提供了一种芯片系统,该芯片系统包括处理器,还可以包括存储器,用于实现前述方法中服务器120的功能。该芯片系统可以由芯片构成,也可以包含芯片和其他分立器件。The embodiment of the present application provides a chip system. The chip system includes a processor and may also include a memory for implementing the function of the server 120 in the foregoing method. The chip system can be composed of chips, and can also include chips and other discrete devices.
本申请实施例提供了一种减少无效告警的装置,该装置包括图2和/或图4所示的实施例中服务器120。The embodiment of the present application provides a device for reducing invalid alarms, and the device includes the server 120 in the embodiment shown in FIG. 2 and/or FIG. 4.
本申请实施例提供的方法中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机程序指令时,全部或部分地产生按照本申请实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、网络设备、用户设备或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(digital subscriber line,简称DSL)或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机可以存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质(例如,软盘、硬盘、磁带)、光介质(例如,数字视频光盘(digital video disc,简称DVD))、或者半导体介质(例如,SSD)等。The methods provided in the embodiments of the present application may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented by software, it can be implemented in the form of a computer program product in whole or in part. The computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on the computer, the processes or functions described in the embodiments of the present application are generated in whole or in part. The computer may be a general-purpose computer, a special-purpose computer, a computer network, network equipment, user equipment, or other programmable devices. The computer instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another computer-readable storage medium. For example, the computer instructions may be transmitted from a website, computer, server, or data center. Transmission to another website, computer, server or data center via wired (such as coaxial cable, optical fiber, digital subscriber line (DSL for short) or wireless (such as infrared, wireless, microwave, etc.). A computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server or data center integrated with one or more available media. The available medium may be a magnetic medium (for example, a floppy disk, hard disk, Magnetic tape), optical media (for example, digital video disc (DVD for short)), or semiconductor media (for example, SSD).

Claims (14)

  1. 一种减少无效告警的方法,其特征在于,包括:A method for reducing invalid alarms, which is characterized in that it includes:
    获取第一目标的第一特征信息,所述第一目标的行为是触发摄像机告警的行为;Acquiring first characteristic information of a first target, where the behavior of the first target is a behavior that triggers a camera alarm;
    将所述第一特征信息与无效告警数据库中的特征信息进行匹配,所述无效告警数据库中包括至少一个目标的特征信息,所述至少一个目标中的每个目标的行为是触发无效告警的行为;The first characteristic information is matched with the characteristic information in an invalid alarm database, the invalid alarm database includes characteristic information of at least one target, and the behavior of each target in the at least one target is a behavior that triggers an invalid alarm ;
    当所述第一特征信息与所述无效告警数据库中的特征信息之间的匹配度大于或等于第一阈值时,不输出告警信息。When the degree of matching between the first characteristic information and the characteristic information in the invalid alarm database is greater than or equal to a first threshold, no alarm information is output.
  2. 如权利要求1所述的方法,其特征在于,所述方法还包括:The method of claim 1, wherein the method further comprises:
    当所述第一特征信息与所述无效告警数据库中的特征信息之间的匹配度小于第一阈值时,接收来自输入界面的第一信息,所述第一信息用于指示所述第一目标触发的告警是否为无效告警;When the degree of matching between the first feature information and the feature information in the invalid alarm database is less than a first threshold, receive first information from an input interface, where the first information is used to indicate the first target Whether the triggered alarm is an invalid alarm;
    当所述第一信息用于指示所述第一目标触发的告警为无效告警时,不输出告警信息,并将所述第一特征信息添加到所述无效告警数据库中,否则,输出告警信息。When the first information is used to indicate that the alarm triggered by the first target is an invalid alarm, no alarm information is output, and the first characteristic information is added to the invalid alarm database; otherwise, the alarm information is output.
  3. 如权利要求2所述的方法,其特征在于,将所述第一特征信息添加到所述无效告警数据库中,包括:The method of claim 2, wherein adding the first characteristic information to the invalid alarm database comprises:
    获取第一图像,所述第一图像中包括所述第一目标;Acquiring a first image, the first image including the first target;
    确定所述第一目标在所述第一图像中的区域;Determine the area of the first target in the first image;
    对所述区域按照不同的尺寸进行缩小和/或放大,得到至少一个子图像;Reduce and/or enlarge the area according to different sizes to obtain at least one sub-image;
    从所述至少一个子图像中的每个子图像中提取所述第一目标的特征信息,得到至少一个第二特征信息,所述至少一个第二特征信息包括所述第一特征信息;Extracting characteristic information of the first target from each of the at least one sub-image to obtain at least one second characteristic information, where the at least one second characteristic information includes the first characteristic information;
    将所述至少一个第二特征信息添加到所述无效告警数据库中。The at least one second characteristic information is added to the invalid alarm database.
  4. 如权利要求1~3中任一项所述的方法,其特征在于,所述获取第一目标的第一特征信息,包括:The method according to any one of claims 1 to 3, wherein the acquiring first characteristic information of the first target comprises:
    接收来自所述摄像机的多媒体信息;Receiving multimedia information from the camera;
    当检测到所述摄像机的拍摄区域中存在运动的所述第一目标、且所述第一目标的行为是触发告警的行为时,从所述多媒体信息中获得第一图像,并对所述第一图像中的第一目标进行特征提取得到所述第一特征信息。When it is detected that there is a moving first target in the shooting area of the camera, and the behavior of the first target is a behavior that triggers an alarm, a first image is obtained from the multimedia information, and the Feature extraction is performed on a first target in an image to obtain the first feature information.
  5. 如权利要求1~3中任一项所述的方法,其特征在于,所述获取第一目标的第一特性信息,包括:The method according to any one of claims 1 to 3, wherein the acquiring first characteristic information of the first target comprises:
    接收来自所述摄像机的所述第一特征信息。Receiving the first characteristic information from the camera.
  6. 如权利要求1~5中任一项所述的方法,其特征在于,在所述第一目标触发的告警的类型为第一告警类型时,将所述第一特征信息与无效告警数据库中的特征信息进行匹配,包括:The method according to any one of claims 1 to 5, wherein when the type of the alarm triggered by the first target is the first alarm type, the first characteristic information is combined with the information in the invalid alarm database. Feature information is matched, including:
    根据所述第一告警类型,确定所述无效告警数据库中的第三特征信息,所述第三特征信息对应的目标所触发的无效告警为所述第一告警类型的无效告警;Determine the third characteristic information in the invalid alarm database according to the first alarm type, and the invalid alarm triggered by the target corresponding to the third characteristic information is the invalid alarm of the first alarm type;
    将所述第一特征信息与所述第三特征信息进行匹配。Matching the first characteristic information with the third characteristic information.
  7. 一种减少无效告警的装置,其特征在于,包括:A device for reducing invalid alarms, which is characterized in that it comprises:
    处理单元,用于获取第一目标的第一特征信息,所述第一目标的行为是触发摄像机告警的行为;将所述第一特征信息与无效告警数据库中的特征信息进行匹配,所述无效告警数据库中包括至少一个目标的特征信息,所述至少一个目标中的每个目标的行为是触发无效告警的行为;A processing unit, configured to obtain first characteristic information of a first target, the behavior of the first target is a behavior that triggers a camera alarm; matching the first characteristic information with the characteristic information in the invalid alarm database, the invalid The alarm database includes characteristic information of at least one target, and the behavior of each target in the at least one target is a behavior that triggers an invalid alarm;
    收发单元,用于当所述第一特征信息与所述无效告警数据库中的特征信息之间的匹配度大于或等于第一阈值时,不输出告警信息。The transceiver unit is configured to not output alarm information when the degree of matching between the first characteristic information and the characteristic information in the invalid alarm database is greater than or equal to a first threshold.
  8. 如权利要求7所述的装置,其特征在于,所述收发单元,进一步用于:The device according to claim 7, wherein the transceiver unit is further configured to:
    当所述第一特征信息与所述无效告警数据库中的特征信息之间的匹配度小于第一阈值时,接收来自输入界面的第一信息,所述第一信息用于指示所述第一目标触发的告警是否为无效告警;When the degree of matching between the first feature information and the feature information in the invalid alarm database is less than a first threshold, receive first information from an input interface, where the first information is used to indicate the first target Whether the triggered alarm is an invalid alarm;
    当所述第一信息用于指示所述第一目标触发的告警为无效告警时,不输出告警信息,所述处理单元进一步用于将所述第一特征信息添加到所述无效告警数据库中,否则,所述收发单元用于输出告警信息。When the first information is used to indicate that the alarm triggered by the first target is an invalid alarm, no alarm information is output, and the processing unit is further configured to add the first characteristic information to the invalid alarm database, Otherwise, the transceiver unit is used to output alarm information.
  9. 如权利要求8所述的装置,其特征在于,所述处理单元,具体用于:The device according to claim 8, wherein the processing unit is specifically configured to:
    获取第一图像,所述第一图像中包括所述第一目标;Acquiring a first image, the first image including the first target;
    确定所述第一目标在所述第一图像中的区域;Determine the area of the first target in the first image;
    对所述区域按照不同的尺寸进行缩小和/或放大,得到至少一个子图像;Reduce and/or enlarge the area according to different sizes to obtain at least one sub-image;
    从所述至少一个子图像中的每个子图像中提取所述第一目标的特征信息,得到至少一个第二特征信息,所述至少一个第二特征信息包括所述第一特征信息;Extracting characteristic information of the first target from each of the at least one sub-image to obtain at least one second characteristic information, where the at least one second characteristic information includes the first characteristic information;
    将所述至少一个第二特征信息添加到所述无效告警数据库中。The at least one second characteristic information is added to the invalid alarm database.
  10. 如权利要求7~9中任一项所述的装置,其特征在于,所述收发单元,进一步用于:The device according to any one of claims 7-9, wherein the transceiver unit is further configured to:
    接收来自所述摄像机的多媒体信息;Receiving multimedia information from the camera;
    所述处理单元,具体用于:The processing unit is specifically used for:
    当检测到所述摄像机的拍摄区域中存在运动的所述第一目标、且所述第一目标的行为是触发告警的行为时,从所述多媒体信息中获得第一图像,并对所述第一图像中的第一目标进行特征提取得到所述第一特征信息。When it is detected that there is a moving first target in the shooting area of the camera, and the behavior of the first target is a behavior that triggers an alarm, a first image is obtained from the multimedia information, and the Feature extraction is performed on a first target in an image to obtain the first feature information.
  11. 如权利要求7~9中任一项所述的装置,其特征在于,所述收发单元,进一步用于:The device according to any one of claims 7-9, wherein the transceiver unit is further configured to:
    接收来自所述摄像机的所述第一特征信息。Receiving the first characteristic information from the camera.
  12. 如权利要求7~11中任一项所述的装置,其特征在于,在所述第一目标触发的告警的类型为第一告警类型时,所述处理单元,具体用于:The device according to any one of claims 7 to 11, wherein when the type of the alarm triggered by the first target is the first alarm type, the processing unit is specifically configured to:
    根据所述第一告警类型,确定所述无效告警数据库中的第三特征信息,所述第三特征信息对应的目标所触发的无效告警为所述第一告警类型的无效告警;Determine the third characteristic information in the invalid alarm database according to the first alarm type, and the invalid alarm triggered by the target corresponding to the third characteristic information is the invalid alarm of the first alarm type;
    将所述第一特征信息与所述第三特征信息进行匹配。Matching the first characteristic information with the third characteristic information.
  13. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质中存储有计算机程序或指令,当计算机读取并执行所述计算机程序或指令时,使得计算机执行如权利要求1至6中任意一项所述的方法。A computer-readable storage medium, characterized in that, a computer program or instruction is stored in the computer-readable storage medium, and when the computer reads and executes the computer program or instruction, the computer executes as claimed in claims 1 to 6 The method described in any one of.
  14. 一种告警信号处理设备,其特征在于,包括:An alarm signal processing equipment, which is characterized in that it comprises:
    接口,用于接收摄像机发送的第一特征信息或者与第一特征信息对应的第一图像;An interface for receiving the first feature information sent by the camera or the first image corresponding to the first feature information;
    处理器,与所述接口通信,用于执行如权利要求1至6中任一项所述的方法。The processor communicates with the interface and is configured to execute the method according to any one of claims 1 to 6.
PCT/CN2021/091209 2020-05-08 2021-04-29 Method and device for reducing invalid warnings WO2021223665A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202010383960.6A CN113628404A (en) 2020-05-08 2020-05-08 Method and device for reducing invalid alarm
CN202010383960.6 2020-05-08

Publications (1)

Publication Number Publication Date
WO2021223665A1 true WO2021223665A1 (en) 2021-11-11

Family

ID=78377517

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/091209 WO2021223665A1 (en) 2020-05-08 2021-04-29 Method and device for reducing invalid warnings

Country Status (2)

Country Link
CN (1) CN113628404A (en)
WO (1) WO2021223665A1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114155746A (en) * 2021-12-01 2022-03-08 南京莱斯电子设备有限公司 FOD alarm accuracy rate and FOD alarm false alarm rate calculation method
CN114218570A (en) * 2022-02-22 2022-03-22 广州思涵信息科技有限公司 Method and system for preventing computer information from being stolen and stolen based on AI and RPA technology
CN115766401A (en) * 2023-01-09 2023-03-07 北京安帝科技有限公司 Industrial alarm information analysis method and device, electronic equipment and computer medium
CN116054416A (en) * 2023-03-15 2023-05-02 扬州康德电气有限公司 Intelligent monitoring operation and maintenance management system based on Internet of things
CN116311716A (en) * 2022-12-27 2023-06-23 江苏兴力工程管理有限公司新兴分公司 Electronic power grid fence system based on intelligent strain type and guard method

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114758485A (en) * 2022-04-21 2022-07-15 成都商汤科技有限公司 Alarm information processing method and device, computer equipment and storage medium
CN115514613B (en) * 2022-11-15 2023-04-11 阿里云计算有限公司 Alarm strategy obtaining method and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102479416A (en) * 2010-11-29 2012-05-30 上海银晨智能识别科技有限公司 Method, system and device for eliminating false alarm in monitoring system
CN104794827A (en) * 2014-01-17 2015-07-22 温科尼克斯多夫国际有限公司 Method and apparatus for prevention of false alarms in monitoring systems
US20180260630A1 (en) * 2017-03-10 2018-09-13 Turing Video, Inc. Activity recognition method and system
CN110933955A (en) * 2017-06-02 2020-03-27 尼特莫公司 Improved generation of alarm events based on detection of objects from camera images
CN111063142A (en) * 2018-10-17 2020-04-24 杭州海康威视数字技术股份有限公司 Monitoring alarm processing method, device and equipment and readable medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102479416A (en) * 2010-11-29 2012-05-30 上海银晨智能识别科技有限公司 Method, system and device for eliminating false alarm in monitoring system
CN104794827A (en) * 2014-01-17 2015-07-22 温科尼克斯多夫国际有限公司 Method and apparatus for prevention of false alarms in monitoring systems
US20180260630A1 (en) * 2017-03-10 2018-09-13 Turing Video, Inc. Activity recognition method and system
CN110933955A (en) * 2017-06-02 2020-03-27 尼特莫公司 Improved generation of alarm events based on detection of objects from camera images
CN111063142A (en) * 2018-10-17 2020-04-24 杭州海康威视数字技术股份有限公司 Monitoring alarm processing method, device and equipment and readable medium

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114155746A (en) * 2021-12-01 2022-03-08 南京莱斯电子设备有限公司 FOD alarm accuracy rate and FOD alarm false alarm rate calculation method
CN114155746B (en) * 2021-12-01 2022-09-13 南京莱斯电子设备有限公司 FOD alarm accuracy rate and FOD alarm false alarm rate calculation method
CN114218570A (en) * 2022-02-22 2022-03-22 广州思涵信息科技有限公司 Method and system for preventing computer information from being stolen and stolen based on AI and RPA technology
CN114218570B (en) * 2022-02-22 2022-05-17 广州思涵信息科技有限公司 Method and system for preventing computer information from being stolen and stolen based on AI and RPA technologies
CN116311716A (en) * 2022-12-27 2023-06-23 江苏兴力工程管理有限公司新兴分公司 Electronic power grid fence system based on intelligent strain type and guard method
CN115766401A (en) * 2023-01-09 2023-03-07 北京安帝科技有限公司 Industrial alarm information analysis method and device, electronic equipment and computer medium
CN115766401B (en) * 2023-01-09 2023-04-21 北京安帝科技有限公司 Industrial alarm information analysis method and device, electronic equipment and computer medium
CN116054416A (en) * 2023-03-15 2023-05-02 扬州康德电气有限公司 Intelligent monitoring operation and maintenance management system based on Internet of things
CN116054416B (en) * 2023-03-15 2023-09-22 扬州康德电气有限公司 Intelligent monitoring operation and maintenance management system based on Internet of things

Also Published As

Publication number Publication date
CN113628404A (en) 2021-11-09

Similar Documents

Publication Publication Date Title
WO2021223665A1 (en) Method and device for reducing invalid warnings
CN108062349B (en) Video monitoring method and system based on video structured data and deep learning
CN108230594B (en) Method for generating alarm in video monitoring system
CN110428522B (en) Intelligent security system of wisdom new town
CN109166261B (en) Image processing method, device and equipment based on image recognition and storage medium
WO2021253961A1 (en) Intelligent visual perception system
JP6905850B2 (en) Image processing system, imaging device, learning model creation method, information processing device
US10657783B2 (en) Video surveillance method based on object detection and system thereof
CN111163285A (en) High-altitude falling object monitoring method and system and computer readable storage medium
CN111523397B (en) Intelligent lamp post visual identification device, method and system and electronic equipment thereof
KR102127276B1 (en) The System and Method for Panoramic Video Surveillance with Multiple High-Resolution Video Cameras
CN106454253A (en) Method and system for detecting area wandering
CN111047824B (en) Indoor child nursing linkage control early warning method and system
JP2003219399A (en) Supervisory apparatus for identifying supervisory object
CN110674753A (en) Theft early warning method, terminal device and storage medium
US20200250945A1 (en) Intrusion detection methods and devices
CN110782627A (en) Anti-lost system based on multi-person face recognition
US20220084216A1 (en) Method and apparatus for detecting motion deviation in a video
JP2005129003A (en) Device for detecting change
US9607210B2 (en) Video surveillance system and method for fraud detection
JP5758165B2 (en) Article detection device and stationary person detection device
WO2024093296A1 (en) Wake-up method and apparatus
CN115331386B (en) Prevent fishing detection alarm system based on computer vision
binti Harum et al. Smart surveillance system using background subtraction technique in IoT application
US20190188864A1 (en) Method and apparatus for detecting deviation from a motion pattern in a video

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21800381

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21800381

Country of ref document: EP

Kind code of ref document: A1