WO2024066501A1 - 视频监控数据处理方法、装置、设备及可读存储介质 - Google Patents

视频监控数据处理方法、装置、设备及可读存储介质 Download PDF

Info

Publication number
WO2024066501A1
WO2024066501A1 PCT/CN2023/101121 CN2023101121W WO2024066501A1 WO 2024066501 A1 WO2024066501 A1 WO 2024066501A1 CN 2023101121 W CN2023101121 W CN 2023101121W WO 2024066501 A1 WO2024066501 A1 WO 2024066501A1
Authority
WO
WIPO (PCT)
Prior art keywords
perimeter
area
video surveillance
location information
road network
Prior art date
Application number
PCT/CN2023/101121
Other languages
English (en)
French (fr)
Inventor
泮金炜
袁晨雪
Original Assignee
杭州海康威视系统技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 杭州海康威视系统技术有限公司 filed Critical 杭州海康威视系统技术有限公司
Publication of WO2024066501A1 publication Critical patent/WO2024066501A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/29Geographical information databases
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N17/00Diagnosis, testing or measuring for television systems or their details
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/907Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
    • G06F16/909Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using geographical or spatial information, e.g. location

Definitions

  • the present invention relates to the field of video security technology, and in particular to a video surveillance data processing method, device, equipment and computer-readable storage medium.
  • video surveillance equipment needs to be deployed in more and more application scenarios for security protection.
  • a certain security area is usually demarcated, and some video surveillance equipment is deployed in or around the security area for security protection.
  • technical personnel are often required to conduct on-site inspections to determine whether the deployment of video surveillance equipment is reasonable, or to determine where the video surveillance equipment is more reasonably deployed. This method is not only inefficient, but may also cause unnecessary waste of video surveillance equipment resources.
  • the main purpose of the present invention is to provide a video surveillance data processing method, device, equipment and computer-readable storage medium, aiming to facilitate users in deploying video surveillance equipment by generating perimeter enclosure results.
  • the present invention provides a video surveillance data processing method, the method comprising the following steps:
  • the location information of each of the overlapping areas and the perimeter is used to determine an enclosure result of the perimeter, wherein the enclosure result is used to characterize the extent to which the perimeter is covered by the monitoring range of the video surveillance device.
  • the step of determining the location information of the perimeter of the security area includes:
  • the location information of the perimeter is determined according to the corrected location information of the actual geographical area.
  • the step of determining the location information of the perimeter of the security area includes:
  • the boundary line is expanded into a boundary ring of a preset width, and the position information of the boundary ring is obtained;
  • the position information of the boundary ring is used as the position information of the perimeter.
  • the step of determining a target video surveillance device whose surveillance range overlaps with the perimeter comprises:
  • a target video surveillance device whose monitoring range overlaps with the perimeter is selected from the filtered video surveillance devices.
  • the step of determining the enclosing result of the perimeter by using the position information of each of the overlapping areas and the perimeter includes:
  • the enclosure degree is calculated using the sum of the areas and the total area, and the enclosure degree is used as the enclosure result of the perimeter.
  • the step of determining the enclosure result of the perimeter by using the position information of each overlapping area and the perimeter includes: calculating the sum of the lengths of each overlapping area; calculating the total length of the perimeter; and using The sum of the lengths and the total length are used to calculate the enclosure degree, and the enclosure degree is used as the enclosure result of the perimeter.
  • the method further comprises:
  • the overlapping areas on the perimeter are displayed on the electronic map with a second display effect, and the monitoring range of each target video surveillance device is displayed with a third display effect.
  • the present invention further provides a video surveillance data processing device, the device comprising:
  • a first determination module is used to determine the location information of the perimeter of the security area, wherein the perimeter includes a boundary line or a boundary area of an actual geographical area corresponding to the security area;
  • a second determination module is used to determine a target video surveillance device whose monitoring range overlaps with the perimeter
  • a third determination module is used to determine the overlapping area between the perimeter and the monitoring range of each of the target video surveillance devices according to the location information of the perimeter and the location information of the monitoring range of the target video surveillance device;
  • the fourth determination module is used to determine the enclosure result of the perimeter by using the position information of each of the overlapping areas and the perimeter, wherein the enclosure result is used to characterize the extent to which the perimeter is covered by the monitoring range of the video surveillance device.
  • the first determining module includes:
  • a first acquisition unit is used to acquire the regional location information of the security area planned on the electronic map
  • a second acquisition unit is used to acquire road network data, and determine a target road network area overlapping with the security area from the road network areas corresponding to each road network facility according to the road network data and the area location information;
  • a correction unit configured to correct the security area according to the target road network area to obtain a corrected actual geographical area corresponding to the corrected security area, wherein the correction includes at least one of removing the target road network area from the security area, merging the security area with the target road network area, and shrinking the security area to the target road network area;
  • the first determining unit is used to determine the location information of the perimeter according to the corrected location information of the actual geographical area.
  • the first determining module includes:
  • An expansion unit configured to expand the boundary line into a boundary ring of a preset width according to the location information of the boundary line of the actual geographical area corresponding to the security area, and obtain the location information of the boundary ring;
  • the second determining unit is configured to use the position information of the boundary ring as the position information of the perimeter.
  • the second determining module includes:
  • a third acquisition unit is used to acquire the layout data of multiple video surveillance devices
  • a screening unit configured to screen out, from the plurality of video surveillance devices, video surveillance devices whose shortest distance to the perimeter is less than a preset threshold value, according to the installation location information in the layout data;
  • a filtering unit configured to filter the video surveillance devices deployed within the building from the screened multiple video surveillance devices according to the installation location information in the deployment data;
  • a selection unit is used to select a target video surveillance device whose monitoring range overlaps with the perimeter from the filtered video surveillance devices according to the position information of the perimeter.
  • the fourth determining module includes:
  • a first calculation unit used to calculate the sum of the areas or the sum of the lengths of the overlapping regions
  • a second calculation unit used to calculate the total area or total length of the perimeter
  • the third calculation unit is used to calculate the enclosure degree by using the sum of the areas and the total area, or by using the sum of the lengths and the total length, and use the enclosure degree as the enclosure result of the perimeter.
  • the device further comprises:
  • a first display module used for displaying the area on the perimeter that is not covered by the monitoring range of the target video monitoring device on the electronic map with a first display effect
  • the second display module is used to display each of the overlapping areas on the perimeter on the electronic map with a second display effect, and to display the monitoring range of each of the target video surveillance devices with a third display effect.
  • the present invention also provides a video surveillance data processing device, which includes: a memory, a processor, and a video surveillance data processing program stored in the memory and executable on the processor, and when the video surveillance data processing program is executed by the processor, the steps of the video surveillance data processing method described above are implemented.
  • the present invention also provides a computer-readable storage medium, the computer-readable
  • the storage medium stores a video surveillance data processing program, which implements the steps of the video surveillance data processing method described above when executed by the processor.
  • the perimeter includes the boundary line or boundary area of the actual geographical area corresponding to the security area; determining the target video surveillance equipment whose monitoring range overlaps with the perimeter; determining the overlapping area between the perimeter and the monitoring range of each target video surveillance equipment according to the location information of the perimeter and the location information of the monitoring range of the target video surveillance equipment; using the location information of each overlapping area and the perimeter, determining the enclosure result of the perimeter, wherein the enclosure result is used to characterize the extent to which the perimeter is covered by the monitoring range of the video surveillance equipment.
  • the embodiment of the present invention by providing a scheme for generating the perimeter enclosure result, it is convenient for users to understand whether the installation of the video surveillance equipment at the boundary of the security area is reasonable, and it is convenient for users to make a reasonable video surveillance equipment deployment plan more quickly according to the generated enclosure result.
  • FIG1 is a schematic diagram of a flow chart of an embodiment of a method for processing video surveillance data according to the present invention
  • FIG2 is a schematic diagram of an overlap between a security area and a road network area corresponding to a road according to an embodiment of the present invention
  • FIG. 3 is a schematic diagram of an overlap between a security area and a road network area corresponding to a community involved in an embodiment of the present invention
  • FIG4 is a schematic diagram of a boundary ring involved in an embodiment of the present invention.
  • FIG5 is a schematic diagram of a monitoring range involved in an embodiment of the present invention.
  • FIG6 is a schematic diagram showing a display effect of a perimeter and a monitoring range according to an embodiment of the present invention.
  • FIG. 7 is a schematic diagram of the structure of the hardware operating environment involved in the embodiment of the present invention.
  • FIG. 1 is a flow chart of an embodiment of a method for processing video surveillance data according to the present invention.
  • the embodiment of the present invention provides an embodiment of a method for processing video surveillance data. It should be noted that although a logical order is shown in the flowchart, in some cases, the steps shown or described may be performed in an order different from that shown here.
  • the execution subject of the video surveillance data processing method may be a smart phone, a personal computer, a server or other device, which is not limited in this embodiment. In this embodiment, for ease of description, the execution subject is omitted for elaboration.
  • the video surveillance data processing method includes the following steps.
  • Step S10 determining the location information of the perimeter of the security area, wherein the perimeter includes a boundary line or a boundary area of an actual geographical area corresponding to the security area.
  • the security area is an area planned by the user that needs to be protected.
  • the user can deploy video surveillance equipment on the perimeter of the security area and perform security monitoring through the video surveillance equipment to achieve the purpose of security.
  • the perimeter of the security area can be a boundary line or a boundary area of the actual geographical area corresponding to the security area, or the perimeter can also be a combination of a boundary line and a boundary area.
  • the boundary area can be an annular area (also called a boundary ring), that is, it is equivalent to a boundary line with a certain width; the width of the entire boundary ring can be consistent or inconsistent, which is not limited in this embodiment.
  • There are many ways to obtain the location information of the perimeter which is not limited in this embodiment.
  • the boundary ring may include rings of various shapes, such as circular rings, elliptical rings, square rings, polygonal rings, irregular rings, etc. It is understandable that the present invention does not limit the shape of the security area, and therefore does not limit the shape of the boundary ring.
  • the location information of the perimeter drawn by the user on the electronic map can be obtained; it should be noted that even if the perimeter drawn on the map is unreasonable, such as passing through a building, it does not affect the determination of the enclosure result of the perimeter to a certain extent.
  • the enclosure result is a result that can be used to characterize the degree to which the perimeter is covered by the monitoring range of the video surveillance device.
  • the regional location information of the security area planned on the electronic map can be obtained, and the location information of the perimeter can be determined according to the regional location information.
  • the regional location information of the security area refers to the information that can characterize the position of the security area in the electronic map coordinate system or the longitude and latitude coordinate system, which can be specifically expressed by a set of coordinate points or a set of line segments, etc., which is not limited in this embodiment.
  • the method of obtaining the regional location information of the security area is not limited in this embodiment, for example, it can be obtained from other devices, and it can also be obtained by displaying an electronic map, and the regional location information of the security area planned by the user through the interactive peripheral in the displayed electronic map.
  • the user draws a boundary line on the displayed electronic map by dragging the mouse, and the area enclosed by the boundary line is the security area.
  • the regional location information of the security area is obtained.
  • the security area is relative to the map, and the actual geographical area corresponding to the security area is relative to the actual geographical space.
  • the actual geographical area corresponding to the security area may be completely consistent with the security area, that is, when the regional location information of the security area is represented by coordinate points or line segments in the electronic map coordinate system, the regional location information of the security area can be used as the location information of the actual geographical area corresponding to the security area after being converted into the longitude and latitude coordinate system, and when the regional location information of the security area is directly represented by coordinate points or line segments in the longitude and latitude coordinate system, the regional location information of the security area can be directly used as the location information of the actual geographical area corresponding to the security area.
  • the location information of the actual geographical area; or, the security area may be modified according to the needs of the specific application scenario, and the actual geographical area corresponding to the security area is determined based on the modified area.
  • the perimeter can be defined as the boundary line of the actual geographical area
  • the regional location information of the security area can be the location information of the boundary line of the security area in the latitude and longitude coordinate system.
  • the regional location information of the security area can be directly used as the location information of the perimeter.
  • the boundary line of the security area can also be first expanded into a boundary ring of a preset width, and the boundary ring is used as the boundary area, that is, the location information of the boundary ring is used as the location information of the boundary area.
  • Step S20 determining a target video surveillance device whose surveillance range overlaps with the perimeter.
  • the video surveillance equipment may include video surveillance equipment that has been actually deployed and installed, or may also include video surveillance equipment that is planned to be deployed and installed.
  • the target video surveillance equipment is a video surveillance equipment whose monitoring range overlaps with the perimeter among the various video surveillance equipment.
  • the layout data of each video surveillance equipment may be obtained, and based on the layout data and the location information of the perimeter, the target video surveillance equipment whose monitoring range overlaps with the perimeter is selected from the various video surveillance equipment.
  • the layout data of the video surveillance equipment may include the location information of the monitoring range of the video surveillance equipment, or may include some other types of information that can be used to calculate the location information of the monitoring range of the video surveillance equipment, such as the installation location information of the video surveillance equipment.
  • the deployment data includes the location information of the monitoring range of the video surveillance device, it is possible to directly determine whether the monitoring range of the video surveillance device overlaps with the perimeter based on the location information of the monitoring range of the video surveillance device and the location information of the perimeter; when the deployment data includes other types of information that can be used to calculate the location information of the monitoring range of the video surveillance device, it is possible to first calculate the location information of the monitoring range of the video surveillance device based on the deployment data, and then determine whether the monitoring range of the video surveillance device overlaps with the perimeter based on the location information of the monitoring range and the location information of the perimeter.
  • the monitoring range is an area
  • the perimeter is the boundary line and/or boundary area.
  • data calculation means can be used to calculate whether the two overlap. The calculation method is not described in detail in this embodiment.
  • Step S30 determining an overlapping area on the perimeter with the monitoring ranges of each of the target video monitoring devices according to the location information of the perimeter and the location information of the monitoring ranges of the target video monitoring devices.
  • the location information of the perimeter and the location information of the monitoring range of the target video monitoring device can be represented by a set of coordinate points, and the coordinates of the two sets of coordinate points can be calculated. Intersection, the intersection is used as the location information of the overlapping area.
  • Step S40 using each of the overlapping areas and the perimeter, determining an enclosure result of the perimeter, wherein the enclosure result is used to characterize the extent to which the perimeter is covered by the monitoring range of the video surveillance device.
  • the enclosure result is a result that can be used to characterize the extent to which the perimeter is covered by the monitoring range of the video surveillance device.
  • the specific data form of the enclosure result is not limited.
  • an enclosure result that meets the user's needs can be generated.
  • the enclosure result can be an enclosure degree. The larger the enclosure degree, the greater the extent to which the perimeter is covered by the monitoring range of the video surveillance device. The smaller the enclosure degree, the smaller the extent to which the perimeter is covered by the monitoring range of the video surveillance device.
  • the enclosure result can be a display of the perimeter, the overlapping area, and the monitoring range of the target video surveillance device in an electronic map.
  • the enclosure result can include both the enclosure degree and the display of the perimeter, the overlapping area, and the monitoring range of the target video surveillance device in an electronic map.
  • the perimeter is the boundary line or boundary area of the actual geographical area corresponding to the security area; determining the target video surveillance equipment whose monitoring range overlaps with the perimeter; determining the overlapping area between the perimeter and the monitoring range of each target video surveillance equipment according to the location information of the perimeter and the location information of the monitoring range of the target video surveillance equipment; using each overlapping area and the perimeter, determining the enclosure result of the perimeter, wherein the enclosure result is used to characterize the extent to which the perimeter is covered by the monitoring range of the video surveillance equipment.
  • the step S10 includes S101 to S104.
  • Step S101 obtaining the area location information of the security area planned on the electronic map.
  • step S10 As a specific method of obtaining the area location information of the security area, please refer to the corresponding description in step S10, which will not be repeated here.
  • Step S102 acquiring road network data, and determining a target road network area overlapping with the security area from road network areas corresponding to each road network facility based on the road network data and the area location information.
  • the road network data in the process of determining the location information of the perimeter according to the regional location information of the security area, the road network data can be first obtained.
  • the road network data may include the location information of the area (hereinafter referred to as the road network area) corresponding to the road network facilities such as roads, communities, schools, etc.
  • the method for obtaining the road network data is not limited in this embodiment, for example, it can be obtained from the database of the electronic map.
  • the road network area corresponding to the road network facility refers to the geographical area occupied by the road network facility in the actual geographical space
  • the road network area corresponding to a road network facility can be a whole, or it can be divided into multiple pieces, that is, a road network facility can correspond to one road network area or multiple road network areas.
  • a long and narrow road network facility such as a road can be divided into multiple sections, for example, one section every 100 meters, so as to obtain multiple road network areas corresponding to the road.
  • the road network area (hereinafter referred to as the target road network area for distinction) that overlaps with the security area can be determined from the road network areas corresponding to the various road network facilities. It is understandable that, according to the location information of the road network area and the regional location information of the security area, mathematical operations can be used to calculate whether the two overlap.
  • Step S103 correcting the security area according to the target road network area to obtain a corrected actual geographical area corresponding to the corrected security area, wherein the correction includes removing the target road network area from the security area, merging the security area with the target road network area, and shrinking the security area to at least one of the target road network areas.
  • Correcting the security area according to the target road network area specifically refers to correcting the regional location information of the security area according to the location information of the target road network area.
  • the corrected location information (after conversion to the latitude and longitude coordinate system) can be used as the location information of the actual geographical area.
  • Correcting the security area may include removing the target road network area from the security area (hereinafter referred to as the removal operation), merging the security area with the target road network area (hereinafter referred to as the merging operation), and shrinking the security area to the target road network area (hereinafter referred to as the shrinking operation).
  • the removal operation removing the target road network area from the security area
  • merging operation merging the security area with the target road network area
  • shrinking operation shrinking the security area to the target road network area
  • it can be set whether to perform a removal operation, a merging operation, or a shrinking operation according to the needs of a specific application scenario.
  • the triggering conditions for performing the removal operation, the merging operation, and the shrinking operation can be set, and the removal operation is performed when the triggering conditions of the removal operation are met, the merging operation is performed when the triggering conditions of the merging operation are met, and the shrinking operation is performed when the triggering conditions of the shrinking operation are met.
  • the target road network area is completely surrounded by the security area, if the proportion of the area of the target road network area to the area of the security area is greater than a certain threshold, the shrinking operation is performed.
  • the merging operation is performed.
  • the target road network area and the security area have an intersection, if the overlapping area of the target road network area and the security area is less than a certain threshold, a removal operation is performed. If the overlapping area of the target road network area and the security area is greater than or equal to the threshold, the merge operation is performed.
  • it can also be set as needed that when a certain condition is met, none of the three operations are performed, that is, the security area remains unchanged.
  • conditional judgments can be performed for each target road network area, and corresponding operations are performed according to the conditions met, that is, the operations performed for different target road network areas may be different.
  • the road network area corresponding to a certain road has three sections, namely a1, a2 and a3, among which the road network area a2 overlaps with the security area (the dark area shown in the upper figure in FIG2 ), and the road network area a2 is selected as the target road network area.
  • the security area is merged with the road network area a2, and the merged area (the dark area shown in the lower figure in FIG2 ) is used as the actual geographical area corresponding to the security area. That is, the boundary of the original security area passes through the road.
  • This setting is obviously unreasonable in the actual geographical space, so this unreasonable boundary is corrected to the boundary of the road network area a2 corresponding to the road A, so that the enclosed result obtained by subsequent calculation is more reasonable and accurate.
  • the road network area corresponding to cell B is a whole, that is, the road network area B in the figure.
  • the user wants to use cell B as a security area, and simply outlines the outline of cell B on the electronic map (that is, the security area outline in the figure), but the edge includes some areas outside the road network area B.
  • cell B is located in the security area, and cell B is selected as the target road network area. Since the area of cell B accounts for a proportion of the area of the security area that is greater than a certain threshold, a shrinking operation is performed to use cell B as the actual geographical area corresponding to the security area.
  • Step S104 determining the location information of the perimeter according to the corrected location information of the actual geographical area.
  • the location information of the perimeter can be determined based on the location information of the actual geographical area. For example, in one embodiment, when the location information of the actual geographical area is the location information of the boundary line of the area, and the perimeter refers to the boundary line of the actual geographical area, the location information of the actual geographical area can be directly used as the location information of the perimeter.
  • the step S10 when the location information of the actual geographical area is the location information of the boundary line of the actual geographical area, and the perimeter is the boundary area of the actual geographical area corresponding to the security area, the step S10 includes S105 and S106.
  • Step S105 according to the position information of the boundary line of the actual geographical area corresponding to the security area, the boundary line is expanded into a boundary ring of a preset width, and the position information of the boundary ring is obtained.
  • the boundary line is expanded into a boundary ring of a preset width.
  • the preset width can be set in advance according to the needs, and is not limited in this embodiment.
  • the boundary line can be expanded toward the inside of the area, toward the outside of the area, or toward both the outside of the area and the inside of the area.
  • a boundary ring of a preset width obtained by extending the boundary line of the actual geographical area toward and outside the area is drawn as an example.
  • the frame line in the middle of the figure is the boundary line, and the rings formed by the frame lines on both sides of the boundary line are boundary rings.
  • the position information of the boundary ring can be calculated using data calculation means based on the position information of the boundary line, which will not be described in detail here.
  • Step S106 Using the position information of the boundary ring as the position information of the perimeter.
  • the position information of the boundary ring may be used as the position information of the perimeter.
  • the step S20 includes S201 to S204.
  • Step S201 obtaining deployment data of multiple video surveillance devices.
  • the method of obtaining the deployment data of the video surveillance equipment is not limited in this embodiment.
  • it can be directly obtained from the database of other devices, or an input interface for the deployment data of the video surveillance equipment can be provided, and the user can enter the deployment data of each video surveillance device based on the input interface.
  • Step S202 Screen out video surveillance devices whose shortest distance to the perimeter is less than a preset threshold from the plurality of video surveillance devices according to the installation location information in the layout data.
  • the video surveillance devices that are closer to the perimeter may be first screened out from the various video surveillance devices.
  • the shortest distance between the video surveillance device and the perimeter can be calculated based on the installation location information in the layout data of the video surveillance device.
  • the installation location information may include the coordinate value of the installation location point of the video surveillance device in the latitude and longitude coordinate system.
  • the shortest distance between the video surveillance device and the perimeter can be calculated, and the shortest distance among them is selected as the shortest distance between the video surveillance device and the perimeter.
  • a threshold value i.e., a preset threshold value
  • a preset threshold value can be set in advance as needed.
  • the shortest distance between the video surveillance device and the perimeter is greater than or equal to the preset threshold value, it is considered that the monitoring range of the video surveillance device will not overlap with the perimeter.
  • Video surveillance devices whose shortest distance to the perimeter is less than the preset threshold value are selected from various video surveillance devices.
  • each screened video surveillance device it is also possible to determine whether the relative direction of the perimeter relative to the video surveillance device is opposite to the orientation of the video surveillance device. If so, the video surveillance device is filtered out; if not, the process continues to step S203.
  • the relative direction is opposite to the orientation of the video surveillance device. For example, when the video surveillance device is within the perimeter and the orientation of the video surveillance device is away from the perimeter, or when the video surveillance device is outside the perimeter and the orientation of the video surveillance device is When away from the perimeter, it is determined that the relative direction of the perimeter with respect to the video surveillance device is opposite to the direction of the video surveillance device.
  • Step S203 Filter out the video surveillance devices deployed within the building from the screened video surveillance devices according to the installation location information in the deployment data.
  • the video surveillance devices deployed within the building can be filtered out from the video surveillance devices screened in step S202 based on the installation location information in the deployment data.
  • the installation location information may include the coordinate value of the installation location point of the video surveillance device in the latitude and longitude coordinate system.
  • the location information of the building range can be obtained first (such as obtained from a database of an electronic map), and then based on the location information, it is determined whether the installation location point of the video surveillance device is within the building range. If so, the video surveillance device is filtered; if not, the video surveillance device is retained.
  • the installation location information may directly include information indicating whether the video surveillance device is within the building.
  • the video surveillance device deployed within the building may be directly filtered out based on the installation location information without combining the location information of the building.
  • Step S203 is an optional step.
  • the video surveillance devices screened out in step S202 may not include video surveillance devices within the building.
  • the video surveillance devices within the building can provide monitoring of the external environment and therefore do not need to be filtered out.
  • Step S204 selecting a target video surveillance device whose monitoring range overlaps with the perimeter from the screened video surveillance devices according to the location information of the perimeter.
  • step S203 the video surveillance devices filtered out in this step can be used as new filtered video surveillance devices, from which the target video surveillance device is selected.
  • step S203 is not included, the target video surveillance device can be selected from the video surveillance devices filtered out in step S202.
  • the location information of the monitoring range of the video surveillance device can be first calculated based on the installation location information and the device attribute information.
  • the installation location information may include the coordinate value of the installation location point of the video surveillance device in the longitude and latitude coordinate system.
  • the device attribute information may include the visible radius of the video surveillance device, or, in order to more accurately calculate the monitoring range of the video surveillance device, the device attribute information may also include attribute information such as the installation height, orientation, pitch angle, horizontal deflection angle, etc. of the video surveillance device.
  • a circular area can be drawn with the installation location point in the installation location information as the center and the visible radius in the device attribute information as the radius.
  • the circular area is used as the monitoring range of the video surveillance device, and the location information of the monitoring range can be calculated based on the coordinate value of the installation location point and the visible radius.
  • a circular area can be drawn with the installation location point in the installation location information as the center and the visible radius in the device attribute information as the radius. From the circular area, a sector-shaped area with the orientation in the device attribute information as the center line and the horizontal deflection angle in the device attribute information as the center angle is determined. The sector-shaped area is used as the monitoring range of the video surveillance equipment, and the location information of the monitoring range can be calculated based on the coordinate value, visible radius, orientation and horizontal deflection angle of the installation location point.
  • an installation height line perpendicular to the horizontal plane can be made according to the installation height, and the pitch angle is an angle range.
  • the visible radius with an angle with the installation height line as the upper limit angle of the pitch angle is projected onto the horizontal plane to obtain the horizontal maximum visible radius
  • the visible radius with an angle with the installation height line as the lower limit angle of the pitch angle is projected onto the horizontal plane to obtain the horizontal minimum visible radius.
  • a circular area is made with the installation position point as the center of the circle and the horizontal minimum visible radius and the horizontal maximum visible radius as the radius respectively.
  • a fan ring area with the direction as the center line and the horizontal deflection angle as the center angle is determined, and the fan ring area is used as the monitoring range of the video surveillance equipment.
  • the location information of the monitoring range can be calculated based on the coordinate value of the installation position point, the visible radius, the direction, the horizontal deflection angle, the installation height and the pitch angle.
  • the monitoring range determined according to the installation location information and device attribute information of the video surveillance device is schematically drawn, that is, the sector ring area surrounded by the two thick dotted lines and the circle in the top view below the figure; in the figure, a is the lower limit angle of the pitch angle, b is the upper limit angle of the pitch angle, and c is the horizontal deflection angle.
  • the video monitoring device After determining the location information of the monitoring range of the video monitoring device according to any of the above implementations, it is possible to determine whether the monitoring range of the video monitoring device overlaps with the perimeter based on the location information of the perimeter and the location information of the monitoring range of the video monitoring device. If so, the video monitoring device is used as the target video monitoring device; if not, no subsequent processing is performed on the video monitoring device.
  • the step S40 includes S401 to S403.
  • Step S401 calculating the sum of the areas or the sum of the lengths of the overlapping regions.
  • the sum of the areas of the overlapping areas can be calculated based on the location information of the overlapping areas, or the sum of the lengths of the overlapping areas can be calculated. It is understood that when the perimeter is the boundary line of the actual geographical area, the sum of the areas of the overlapping areas can be calculated. The sum of the lengths, when the perimeter is the boundary area of the actual geographic area, calculates the sum of the areas of the overlapping areas.
  • the method of calculating the sum of the areas of the overlapping areas and the sum of the lengths of the overlapping areas is not limited in this embodiment.
  • the overlapping area when the perimeter is the boundary line of the actual geographical area, the overlapping area is actually a line segment.
  • the position information of the overlapping area is represented by a coordinate point set or a vector set
  • the coordinate point set or the vector set is fitted into one or more line segments, and the length of each line segment is calculated to obtain the length of the overlapping area.
  • the overlapping area is actually an irregular graphic area.
  • the coordinate point set or the vector set can be fitted into a boundary line, and then the irregular area enclosed by the boundary line is converted into a combination of basic regular areas (such as rectangles, triangles), and the area of each basic regular area is calculated according to the area calculation formula of the basic regular area, and then the area of the overlapping area is obtained by summing.
  • the areas of each overlapping area are summed.
  • Step S402 Calculate the total area or total length of the perimeter.
  • the total length of the perimeter is calculated, and when the perimeter is the boundary area of the actual geographical area, the total area of the perimeter is calculated.
  • the method for calculating the total area or total length of the perimeter can refer to the above-mentioned calculation method for calculating the sum of the areas or the sum of the lengths of the overlapping areas, which will not be described in detail here.
  • Step S403 Calculate the enclosure degree using the sum of the areas and the total area, or using the sum of the lengths and the total length, and use the enclosure degree as the enclosure result of the perimeter.
  • the method of calculating the enclosure degree may be, but is not limited to, dividing the sum of the areas by the total area to obtain the enclosure degree, or dividing the sum of the lengths by the total length to obtain the enclosure degree.
  • the video surveillance data processing method further includes:
  • Step S50 displaying the area on the perimeter that is not covered by the monitoring range of the target video monitoring device on the electronic map with a first display effect
  • Step S60 displaying each of the overlapping areas on the perimeter on the electronic map with a second display effect, and displaying the monitoring range of each of the target video surveillance devices with a third display effect.
  • the first display effect, the second display effect, and the third display effect are different display effects, so that the user can intuitively see which parts of the perimeter are covered by the monitoring range and which are not covered by the monitoring range, as well as the degree of coverage by the monitoring range of each video surveillance device.
  • the first display effect, the second display effect, and the third display effect can be set as needed and are not limited here.
  • the portion of the perimeter covered by the monitoring range on the electronic map can be displayed with a thick solid line
  • the portion not covered by the monitoring range can be displayed with a thin solid line
  • the monitoring range of the target video surveillance device is displayed with a dotted line, so that the user can more intuitively understand the enclosure of the perimeter by the video surveillance device. Effect.
  • an embodiment of the present invention further provides a video surveillance data processing device, the device comprising:
  • a first determination module is used to determine the location information of the perimeter of the security area, wherein the perimeter includes a boundary line or a boundary area of an actual geographical area corresponding to the security area;
  • a second determination module is used to determine a target video surveillance device whose monitoring range overlaps with the perimeter
  • a third determination module is used to determine the overlapping area between the perimeter and the monitoring range of each of the target video surveillance devices according to the location information of the perimeter and the location information of the monitoring range of the target video surveillance device;
  • the fourth determination module is used to determine the enclosure result of the perimeter by using the position information of each of the overlapping areas and the perimeter, wherein the enclosure result is used to characterize the extent to which the perimeter is covered by the monitoring range of the video surveillance device.
  • the first determining module includes:
  • a first acquisition unit is used to acquire the regional location information of the security area planned on the electronic map
  • a second acquisition unit is used to acquire road network data, and determine a target road network area overlapping with the security area from the road network areas corresponding to each road network facility according to the road network data and the area location information;
  • a correction unit configured to correct the security area according to the target road network area to obtain a corrected actual geographical area corresponding to the corrected security area, wherein the correction includes at least one of removing the target road network area from the security area, merging the security area with the target road network area, and shrinking the security area to the target road network area;
  • a first determining unit configured to determine the location information of the perimeter according to the corrected location information of the actual geographical area
  • the first determining module includes:
  • An expansion unit configured to expand the boundary line into a boundary ring of a preset width according to the location information of the boundary line of the actual geographical area corresponding to the security area, and obtain the location information of the boundary ring;
  • a second determining unit configured to use the position information of the boundary ring as the position information of the perimeter
  • the second determining module includes:
  • a third acquisition unit is used to acquire the layout data of multiple video surveillance devices
  • a screening unit configured to screen out, from the plurality of video surveillance devices, video surveillance devices whose shortest distance to the perimeter is less than a preset threshold value, according to the installation location information in the layout data;
  • a filtering unit configured to filter the video surveillance devices deployed within the building from the screened multiple video surveillance devices according to the installation location information in the deployment data;
  • a selection unit configured to select, from the filtered video surveillance devices, a target video surveillance device whose monitoring range overlaps with the perimeter according to the location information of the perimeter;
  • the fourth determining module includes:
  • a first calculation unit used to calculate the sum of the areas or the sum of the lengths of the overlapping regions
  • a second calculation unit used to calculate the total area or total length of the perimeter
  • the third calculation unit is used to calculate the enclosure degree by using the sum of the areas and the total area, or by using the sum of the lengths and the total length, and use the enclosure degree as the enclosure result of the perimeter.
  • the device further comprises:
  • a first display module used for displaying the area on the perimeter that is not covered by the monitoring range of the target video monitoring device on the electronic map with a first display effect
  • the second display module is used to display each of the overlapping areas on the perimeter on the electronic map with a second display effect, and to display the monitoring range of each of the target video surveillance devices with a third display effect.
  • the embodiment of the present invention also provides a video surveillance data processing device, as shown in Figure 7, which is a schematic diagram of the device structure of the hardware operating environment involved in the embodiment of the present invention.
  • the video surveillance data processing device in the embodiment of the present invention can be a smart phone, a personal computer, a server and other devices, and is not specifically limited here.
  • the video surveillance data processing device may include: a processor 1001, such as a CPU, a network interface 1004, a user interface 1003, a memory 1005, and a communication bus 1002.
  • the communication bus 1002 is used to realize the connection and communication between these components.
  • the user interface 1003 may include a display screen (Display), an input unit such as a keyboard (Keyboard), and the user interface 1003 may also include a standard wired interface and a wireless interface.
  • the network interface 1004 may optionally include a standard wired interface and a wireless interface (such as a WI-FI interface).
  • the memory 1005 may be a high-speed RAM memory, or a stable memory (non-volatile memory), such as a disk memory.
  • the memory 1005 may also be a storage device independent of the aforementioned processor 1001.
  • FIG. 7 does not constitute a limitation on the video surveillance data processing device, and may include more or fewer components than shown in the figure, or a combination of certain components, or a different arrangement of components.
  • the memory 1005 as a computer storage medium may include an operating system, a network communication module, a user interface module, and a video surveillance data processing program.
  • the operating system is a program that manages and controls the hardware and software resources of the device, and supports the operation of the video surveillance data processing program and other software or programs.
  • the user interface 1003 is mainly used for data communication with the client;
  • the network interface 1004 is mainly used for establishing a communication connection with the server;
  • the processor 1001 can be used to call the video stored in the memory 1005. Monitors the data processing program and performs the following operations:
  • the location information of each of the overlapping areas and the perimeter is used to determine an enclosure result of the perimeter, wherein the enclosure result is used to characterize the extent to which the perimeter is covered by the monitoring range of the video surveillance device.
  • the operation of determining the location information of the perimeter of the security area includes:
  • the location information of the perimeter is determined according to the corrected location information of the actual geographical area.
  • the operation of determining the location information of the perimeter of the security area includes:
  • the boundary line is expanded into a boundary ring of a preset width, and the position information of the boundary ring is obtained;
  • the position information of the boundary ring is used as the position information of the perimeter.
  • the operation of determining the target video surveillance device whose monitoring range overlaps with the perimeter includes:
  • a target video surveillance device whose monitoring range overlaps with the perimeter is selected from the filtered video surveillance devices.
  • the operation of determining the enclosing result of the perimeter by using the position information of each of the overlapping areas and the perimeter includes:
  • the degree of enclosure is calculated using the sum of the areas and the total area, or the sum of the lengths and the total length, and the degree of enclosure is used as the enclosure result of the perimeter.
  • processor 1001 may also be used to call the video surveillance data processing program stored in the memory 1005 to perform the following operations:
  • the respective overlapping areas on the perimeter are displayed on the electronic map with a second display effect, and the monitoring range of each target video surveillance device is displayed with a third display effect.
  • an embodiment of the present invention further provides a computer-readable storage medium, on which a video surveillance data processing program is stored.
  • a video surveillance data processing program is executed by a processor, the steps of the video surveillance data processing method described below are implemented.
  • the various embodiments of the video surveillance data processing device and the computer-readable storage medium of the present invention can all refer to the various embodiments of the video surveillance data processing method of the present invention, and will not be described in detail here.
  • the technical solution of the present invention can be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, a magnetic disk, or an optical disk), and includes a number of instructions for enabling a terminal device (which can be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to execute the methods described in each embodiment of the present invention.
  • a storage medium such as ROM/RAM, a magnetic disk, or an optical disk
  • a terminal device which can be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Multimedia (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Remote Sensing (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Alarm Systems (AREA)
  • Closed-Circuit Television Systems (AREA)

Abstract

本发明公开了一种视频监控数据处理方法、装置、设备及计算机可读存储介质,方法包括:确定安防区域的周界的位置信息,其中,周界包括安防区域所对应的实际地理区域的边界线或边界区域(S10);确定监控范围与周界有重叠的目标视频监控设备(S20);根据周界的位置信息和目标视频监控设备的监控范围的位置信息,确定周界上与各个目标视频监控设备的监控范围之间的重叠区域(S30);利用各个重叠区域以及周界的位置信息,确定周界的围闭结果,其中,围闭结果用于表征周界被视频监控设备的监控范围所覆盖的程度(S40)。本发明通过提供一种周界围闭结果的生成方案,为用户进行视频监控设备的部署提供了便利。

Description

视频监控数据处理方法、装置、设备及可读存储介质
相关公开的交叉引用
本公开要求于2022年9月30日提交的、申请号为202211209269.1的中国专利公开的优先权,该中国专利公开的全部内容以引用的方式并入本文中。
技术领域
本发明涉及视频安防技术领域,尤其涉及一种视频监控数据处理方法、装置、设备及计算机可读存储介质。
背景技术
随着视频监控技术的发展,在越来越多的应用场景中需要部署视频监控设备来进行安全防范。在一些应用场景中,为保证安防效果,通常会划定一定的安防区域,在安防区域内或安防区域周边部署一些视频监控设备来进行安全防范。目前,在进行视频监控设备的部署时,往往需要技术人员实地考察,以确定视频监控设备的部署是否合理,或确定视频监控设备在哪里部署较为合理,这种方式不仅效率低,而且可能造成不必要的视频监控设备资源的浪费。
发明内容
本发明的主要目的在于提供一种视频监控数据处理方法、装置、设备及计算机可读存储介质,旨在通过生成周界的围闭结果,为用户进行视频监控设备的部署提供便利。
为实现上述目的,本发明提供一种视频监控数据处理方法,所述方法包括以下步骤:
确定安防区域的周界的位置信息,其中,所述周界包括所述安防区域所对应的实际地理区域的边界线或边界区域;
确定监控范围与所述周界有重叠的目标视频监控设备;
根据所述周界的位置信息和所述目标视频监控设备的监控范围的位置信息,确定所述周界上与各个所述目标视频监控设备的监控范围之间的重叠区域;
利用各个所述重叠区域以及所述周界的位置信息,确定所述周界的围闭结果,其中,所述围闭结果用于表征所述周界被视频监控设备的监控范围所覆盖的程度。
可选地,所述确定安防区域的周界的位置信息的步骤包括:
获取在电子地图上规划出的安防区域的区域位置信息;
获取路网数据,并根据所述路网数据和所述区域位置信息从各路网设施对应的路网区域中确定与所述安防区域有重叠的目标路网区域;
根据所述目标路网区域对所述安防区域进行修正,得到所述修正后的安防区域对应的修正后的实际地理区域,其中,所述修正包括从所述安防区域中剔除所述目标路网区域、将所述安防区域与所述目标路网区域合并、将安防区域收缩为所述目标路网区域中的至少之一;
根据所述修正后的实际地理区域的位置信息确定所述周界的位置信息。
可选地,所述确定安防区域的周界的位置信息的步骤包括:
根据所述安防区域所对应的实际地理区域的边界线的位置信息,将所述边界线扩展为预设宽度的边界环,并得到所述边界环的位置信息;
将所述边界环的位置信息作为所述周界的位置信息。
可选地,所述确定监控范围与所述周界有重叠的目标视频监控设备的步骤包括:
获取多个视频监控设备的布设数据;
根据所述布设数据中的安装位置信息,从所述多个视频监控设备中筛选出与所述周界的最短距离小于预设阈值的视频监控设备;
根据所述布设数据中的安装位置信息,从所述筛选出的多个所述视频监控设备中过滤布设于建筑物范围内的视频监控设备;
根据所述周界的位置信息,从所述过滤后的视频监控设备中选取监控范围与所述周界有重叠的目标视频监控设备。
可选地,所述利用各个所述重叠区域以及所述周界的位置信息,确定所述周界的围闭结果的步骤包括:
计算各个所述重叠区域的面积之和;
计算所述周界的总面积;
利用所述面积之和以及所述总面积计算得到围闭度,将所述围闭度作为所述周界的围闭结果。
可选地,所述利用各个所述重叠区域以及所述周界的位置信息,确定所述周界的围闭结果的步骤包括:计算所述各个重叠区域的长度之和;计算所述周界的总长度;利 用所述长度之和以及所述总长度计算得到围闭度,将所述围闭度作为所述周界的围闭结果。
可选地,所述方法还包括:
在电子地图上以第一展示效果展示所述周界上未被所述目标视频监控设备的监控范围覆盖的区域;
在所述电子地图上以第二展示效果展示所述周界上的各个所述重叠区域,并以第三展示效果展示各个所述目标视频监控设备的监控范围。
为实现上述目的,本发明还提供一种视频监控数据处理装置,所述装置包括:
第一确定模块,用于确定安防区域的周界的位置信息,其中,所述周界包括所述安防区域所对应的实际地理区域的边界线或边界区域;
第二确定模块,用于确定监控范围与所述周界有重叠的目标视频监控设备;
第三确定模块,用于根据所述周界的位置信息和所述目标视频监控设备的监控范围的位置信息,确定所述周界上与各个所述目标视频监控设备的监控范围之间的重叠区域;
第四确定模块,用于利用各个所述重叠区域以及所述周界的位置信息,确定所述周界的围闭结果,其中,所述围闭结果用于表征所述周界被视频监控设备的监控范围所覆盖的程度。
可选地,所述第一确定模块包括:
第一获取单元,用于获取在电子地图上规划出的安防区域的区域位置信息;
第二获取单元,用于获取路网数据,并根据所述路网数据和所述区域位置信息从各路网设施对应的路网区域中确定与所述安防区域有重叠的目标路网区域;
修正单元,用于根据所述目标路网区域对所述安防区域进行修正,得到所述修正后的安防区域对应的修正后的实际地理区域,其中,所述修正包括从所述安防区域中剔除所述目标路网区域、将所述安防区域与所述目标路网区域合并、将安防区域收缩为所述目标路网区域中的至少之一;
第一确定单元,用于根据所述修正后的实际地理区域的位置信息确定所述周界的位置信息。
可选地,所述第一确定模块包括:
扩展单元,用于根据所述安防区域所对应的实际地理区域的边界线的位置信息,将所述边界线扩展为预设宽度的边界环,并得到所述边界环的位置信息;
第二确定单元,用于将所述边界环的位置信息作为所述周界的位置信息。
可选地,所述第二确定模块包括:
第三获取单元,用于获取多个视频监控设备的布设数据;
筛选单元,用于根据所述布设数据中的安装位置信息,从所述多个视频监控设备中筛选出与所述周界的最短距离小于预设阈值的视频监控设备;
过滤单元,用于根据所述布设数据中的安装位置信息,从所述筛选出的多个所述视频监控设备中过滤布设于建筑物范围内的视频监控设备;
选取单元,用于根据所述周界的位置信息,从所述过滤后的视频监控设备中选取监控范围与所述周界有重叠的目标视频监控设备。
可选地,所述第四确定模块包括:
第一计算单元,用于计算各个所述重叠区域的面积之和或者长度之和;
第二计算单元,用于计算所述周界的总面积或者总长度;
第三计算单元,用于利用所述面积之和以及所述总面积,或者,利用所述长度之和以及所述总长度,计算得到围闭度,将所述围闭度作为所述周界的围闭结果。
可选地,所述装置还包括:
第一展示模块,用于在电子地图上以第一展示效果展示所述周界上未被所述目标视频监控设备的监控范围覆盖的区域;
第二展示模块,用于在所述电子地图上以第二展示效果展示所述周界上的各个所述重叠区域,并以第三展示效果展示各个所述目标视频监控设备的监控范围。
为实现上述目的,本发明还提供一种视频监控数据处理设备,所述视频监控数据处理设备包括:存储器、处理器及存储在所述存储器上并可在所述处理器上运行的视频监控数据处理程序,所述视频监控数据处理程序被所述处理器执行时实现如上所述的视频监控数据处理方法的步骤。
此外,为实现上述目的,本发明还提出一种计算机可读存储介质,所述计算机可读 存储介质上存储有视频监控数据处理程序,所述视频监控数据处理程序被处理器执行时实现如上所述的视频监控数据处理方法的步骤。
本发明实施例中,通过确定安防区域的周界的位置信息,其中,周界包括安防区域所对应的实际地理区域的边界线或边界区域;确定监控范围与周界有重叠的目标视频监控设备;根据周界的位置信息和目标视频监控设备的监控范围的位置信息,确定周界上与各个目标视频监控设备的监控范围之间的重叠区域;利用各个重叠区域以及周界的位置信息,确定周界的围闭结果,其中,围闭结果用于表征周界被视频监控设备的监控范围所覆盖的程度。相比于目前用户通过实地考察的方式来确定安防区域边界的视频监控设备的安装是否合理,在本发明实施例中,通过提供一种周界围闭结果的生成方案,为用户了解安防区域边界的视频监控设备的安装是否合理提供了便利,便于用户根据所生成的围闭结果更快速地做出合理的视频监控设备部署方案。
附图说明
图1为本发明视频监控数据处理方法一实施例的流程示意图;
图2为本发明实施例涉及的一种安防区域与道路对应的路网区域重叠的示意图;
图3为本发明实施例涉及的一种安防区域与小区对应的路网区域重叠的示意图;
图4为本发明实施例涉及的一种边界环示意图;
图5为本发明实施例涉及的一种监控范围示意图;
图6为本发明实施例涉及的一种周界和监控范围的展示效果示意图;
图7为本发明实施例方案涉及的硬件运行环境的结构示意图。
本发明目的的实现、功能特点及优点将结合实施例,参照附图做进一步说明。
具体实施方式
应当理解,此处所描述的具体实施例仅仅用以解释本发明,并不用于限定本发明。
参照图1,图1为本发明视频监控数据处理方法一实施例的流程示意图。
本发明实施例提供了视频监控数据处理方法的实施例,需要说明的是,虽然在流程图中示出了逻辑顺序,但是在某些情况下,可以以不同于此处的顺序执行所示出或描述的步骤。在本实施例中,视频监控数据处理方法的执行主体可以是智能手机、个人电脑、服务器等设备,在本实施例中并不做限制。在本实施例中,为便于表述,省略执行主体进行阐述。在本实施例中,所述视频监控数据处理方法包括以下步骤。
步骤S10,确定安防区域的周界的位置信息,其中,所述周界包括所述安防区域所对应的实际地理区域的边界线或边界区域。
安防区域是用户规划的需要进行安全防范的区域,用户可以在安防区域的周界上部署视频监控设备,通过视频监控设备进行安全监控,以达到安防目的。安防区域的周界可以是安防区域所对应的实际地理区域的边界线或边界区域,或者,周界也可以为边界线、边界区域的组合。其中,边界区域可以是环形的区域(也称为边界环),也即,相当于是有一定宽度的边界线;边界环全段的宽度可以是一致的,也可以是不一致的,在本实施例中不做限制。获取周界的位置信息的方式有很多种,在本实施例中并不做限制。
需要说明的是,在本文中,边界环可以包括各种形状的环,如圆形环,椭圆形环,方形环,多边形环,不规则形状的环等等。可以理解的是,本发明不限制安防区域的形状,因此也不限制边界环的形状。
例如,在一实施方式中,可以获取用户在电子地图上划定的周界的位置信息;需要说明的是,即使地图上划定的周界不合理,比如穿越建筑物,但一定程度上并不影响周界的围闭结果的确定。其中,围闭结果是能够用于表征周界被视频监控设备的监控范围所覆盖的程度的结果。
又如,在另一实施方式中,可以获取在电子地图上规划出的安防区域的区域位置信息,根据该区域位置信息确定周界的位置信息。其中,安防区域的区域位置信息是指能够表征安防区域在电子地图坐标系统或经纬度坐标系统中的位置的信息,具体可以采用坐标点集合或线段集合等方法来表示,在本实施例中并不做限制。获取安防区域的区域位置信息的方式在本实施例中并不做限制,例如可以是从其他设备中获取,又如可以是通过展示电子地图,获取用户通过交互外设在所展示的电子地图中规划出的安防区域的区域位置信息。示例性地,用户在所展示的电子地图上通过拖动鼠标画出一条边界线,由该边界线所围合的区域即为安防区域,通过记录该边界线在电子地图坐标系统或经纬度坐标系统中的位置信息,得到该安防区域的区域位置信息。安防区域是相对于地图而言的,安防区域对应的实际地理区域则是相对于实际地理空间而言的。在具体实施方式中,安防区域对应的实际地理区域可以是与安防区域完全一致的,也即,当安防区域的区域位置信息是采用电子地图坐标系统中的坐标点或线段来表示时,将安防区域的区域位置信息转换到经纬度坐标系统后,即可作为安防区域对应的实际地理区域的位置信息,而当安防区域的区域位置信息是直接采用经纬度坐标系统中的坐标点或线段来表示时,安防区域的区域位置信息即可直接作为安防区域对应的 实际地理区域的位置信息;或者,也可以是根据具体应用场景的需求,对安防区域进行一定的修正,基于修正后的区域确定安防区域所对应的实际地理区域。
根据安防区域的区域位置信息确定周界的位置信息的方式在本实施例中并不做限制。例如,根据具体应用场景的需求可以将周界定义为是实际地理区域的边界线,安防区域的区域位置信息可以是安防区域的边界线在经纬度坐标系统中的位置信息。基于此,在一实施方式中,可以直接将安防区域的区域位置信息作为周界的位置信息。在另一实施方式中,还可以先将安防区域的边界线扩展为预设宽度的边界环,将边界环作为边界区域,也即将边界环的位置信息作为边界区域的位置信息。
步骤S20,确定监控范围与所述周界有重叠的目标视频监控设备。
视频监控设备可以包括已经实际部署安装的视频监控设备,或者也还可以包括计划要部署安装的视频监控设备。目标视频监控设备是各个视频监控设备中监控范围与周界有重叠的视频监控设备。在本实施例中,对确定目标视频监控设备的方式并不做限制。例如,在一实施方式中,可以获取各个视频监控设备的布设数据,并根据布设数据和周界的位置信息,从各个视频监控设备中选取监控范围与周界有重叠的目标视频监控设备。视频监控设备的布设数据可以包括该视频监控设备的监控范围的位置信息,或者可以包括能够用于计算出该视频监控设备监控范围的位置信息的一些其他类型的信息,例如,视频监控设备的安装位置信息。具体实施方式中,当布设数据包括视频监控设备的监控范围的位置信息时,可以直接根据该视频监控设备的监控范围的位置信息和周界的位置信息来确定该视频监控设备的监控范围与周界是否有重叠;当布设数据包括的是能够用于计算出视频监控设备的监控范围的位置信息的其他类型的信息时,可以先根据布设数据计算得到该视频监控设备的监控范围的位置信息,再根据监控范围的位置信息和周界的位置信息来确定该视频监控设备的监控范围与周界是否有重叠。
可以理解的是,监控范围是一个区域,周界是边界线和/或边界区域,根据两者的位置信息,可以采用数据运算手段,计算得出两者是否有重叠,在本实施例中对计算方法不做展开叙述。
步骤S30,根据所述周界的位置信息和所述目标视频监控设备的监控范围的位置信息,确定所述周界上与各个所述目标视频监控设备的监控范围之间的重叠区域。
确定周界上与各个目标视频监控设备的监控范围之间的重叠区域的方式有很多种,在本实施例中并不做限制。例如,在一实施方式中,周界的位置信息和目标视频监控设备的监控范围的位置信息可以采用坐标点集合来表示,通过计算两个坐标点集合的 交集,将交集作为重叠区域的位置信息。
步骤S40,利用各个所述重叠区域,以及所述周界,确定所述周界的围闭结果,其中,所述围闭结果用于表征所述周界被视频监控设备的监控范围所覆盖的程度。
围闭结果是能够用于表征周界被视频监控设备的监控范围所覆盖的程度的结果,在本实施例中,并不限制围闭结果的具体数据形式。在具体应用场景中,可以生成符合用户需求的围闭结果。例如,在一实施方式中,围闭结果可以是围闭度,围闭度越大,表示周界被视频监控设备的监控范围所覆盖的程度越大,围闭度越小,表示周界被视频监控设备的监控范围所覆盖的程度越小。又如,在另一实施方式中,围闭结果可以是在电子地图中展示出周界、重叠区域和目标视频监控设备的监控范围,可以理解的是,用户通过所展示的内容,能够较为直观地了解到周界被视频监控设备的监控范围所覆盖的程度。再如,在另一实施方式中,围闭结果可以既包括围闭度,又包括在电子地图中展示出周界、重叠区域和目标视频监控设备的监控范围。
在本实施例中,通过确定安防区域的周界的位置信息,其中,周界为安防区域所对应的实际地理区域的边界线或边界区域;确定监控范围与周界有重叠的目标视频监控设备;根据周界的位置信息和目标视频监控设备的监控范围的位置信息,确定周界上与各个目标视频监控设备的监控范围之间的重叠区域;利用各个重叠区域,以及周界,确定周界的围闭结果,其中,围闭结果用于表征周界被视频监控设备的监控范围所覆盖的程度。相比于目前用户通过实地考察的方式来确定安防区域边界的视频监控设备的安装是否合理,在本实施例中,通过提供一种周界围闭结果的生成方案,为用户了解安防区域边界的视频监控设备的安装是否合理提供了便利,便于用户根据所生成的围闭结果更快速地做出合理的视频监控设备部署方案。
进一步地,基于上述实施例,提出本发明视频监控数据处理方法另一实施例,在本实施例中,所述步骤S10包括S101到S104。
步骤S101,获取在电子地图上规划出的安防区域的区域位置信息。
关于获取安防区域的区域位置信息的具体方式,可以参照步骤S10处的相应描述,此处不再赘述。
步骤S102,获取路网数据,并根据所述路网数据和所述区域位置信息从各路网设施对应的路网区域中确定与所述安防区域有重叠的目标路网区域。
在具体应用场景中,用户在电子地图上规划安防区域时,可能未考虑到实际的路网情况,导致所规划的安防区域与其在实际地理空间中便于规划/允许规划的区域是不一致的;或者,用户只是简单地在电子地图上规划出了大致的安防区域,需要依赖于设 备结合路网数据对所规划的安防区域进行修正。
基于此,在本实施例中,在根据安防区域的区域位置信息确定周界的位置信息的过程中,可以先获取路网数据。路网数据可以包括道路、小区、学校等等路网设施所对应的区域(以下称为路网区域)的位置信息。路网数据的获取方法在本实施例中并不做限制,例如可以从电子地图的数据库中获取。其中,路网设施对应的路网区域是指该路网设施在实际地理空间中所占的地理区域,而一个路网设施对应的路网区域可以是一个整体,或者也可以是划分为多片,也即,一个路网设施可以对应一个路网区域或多个路网区域,例如,道路这种狭长的路网设施,可以将其分为多段,例如每100米一段,从而得到该道路对应的多个路网区域。
根据路网数据和安防区域的区域位置信息,可以从各个路网设施对应的路网区域中确定与安防区域有重叠的路网区域(以下称为目标路网区域以示区分)。可以理解的是,根据路网区域的位置信息和安防区域的区域位置信息,采用数学运算手段,可以计算得到两者是否有重叠。
步骤S103,根据所述目标路网区域对所述安防区域进行修正,得到所述修正后的安防区域对应的修正后的实际地理区域,其中,所述修正包括从所述安防区域中剔除所述目标路网区域、将所述安防区域与所述目标路网区域合并、将安防区域收缩为所述目标路网区域中的至少之一。
根据目标路网区域对安防区域进行修正具体是指根据目标路网区域的位置信息对安防区域的区域位置信息进行修正。修正后的位置信息(转换到经纬度坐标系统后)即可作为实际地理区域的位置信息。
对安防区域进行修正可以包括从安防区域中剔除目标路网区域(以下简称剔除操作)、将安防区域与目标路网区域合并(以下简称合并操作)、将安防区域收缩为目标路网区域(以下简称为收缩操作)中的至少之一。在具体实施方式中,可以根据具体应用场景的需求,设置具体是执行剔除操作、合并操作还是收缩操作。或者,可以根据具体应用场景的需求,设置执行剔除操作、合并操作和收缩操作的触发条件,当满足剔除操作的触发条件时执行剔除操作,当满足合并操作的触发条件时执行合并操作,当满足收缩操作的触发条件时执行收缩操作。例如,当目标路网区域完全被安防区域所包围时,若目标路网区域的面积占安防区域的面积的比例大于一定阈值,则执行收缩操作。当安防区域完全被目标路网区域包围时,若安防区域的面积占目标路网区域的面积的比例大于一定阈值,则执行合并操作。当目标路网区域与安防区域存在交集时,若目标路网区域与安防区域的重叠面积小于一定阈值则执行剔除操作,若目 标路网区域与安防区域的重叠面积大于或等于该阈值则执行合并操作。在一些实施方式中,也可以根据需要设置当满足某种条件时,三种操作均不执行,也即保持安防区域不变。在一些实施方式中,当目标路网区域有多个时,也可以针对每个目标路网区域,分别进行条件判断,根据满足的条件执行相应的操作,也即,针对不同的目标路网区域所执行的操作可能是不同的。
示例性地,如图2所示,某一道路对应的路网区域有a1、a2和a3三段,其中,路网区域a2与安防区域(图2中上面图中所示深色区域)有重叠,路网区域a2被选出作为目标路网区域,在根据具体应用场景的需求,执行合并操作时,将安防区域与路网区域a2合并,将合并后的区域(图2中下面图中所示深色区域)作为安防区域对应的实际地理区域,也即,原本安防区域的边界穿过了道路,在实际地理空间中该设置显然是不合理的,故将该段不合理的边界修正为道路A对应的路网区域a2的边界,以使得后续计算得到的围闭结果更加合理准确。
示例性地,如图3所示,小区B对应的路网区域为一个整体,也即,图中的路网区域B,用户想要将小区B作为安防区域,在电子地图上简单地勾画出了小区B的轮廓(即图中的安防区域轮廓),但是边缘会包括一些路网区域B以外的区域。此种情况下,小区B位于安防区域内,小区B被选出作为目标路网区域,由于小区B的面积占安防区域的面积的比例大于一定阈值,执行收缩操作,以将小区B作为安防区域对应的实际地理区域。
步骤S104,根据所述修正后的实际地理区域的位置信息确定所述周界的位置信息。
在确定实际地理区域后,也即确定实际地理区域的位置信息后,即可根据该实际地理区域的位置信息来确定周界的位置信息。例如,在一实施方式中,当实际地理区域的位置信息为该区域的边界线的位置信息,周界是指实际地理区域的边界线时,可以直接将实际地理区域的位置信息作为周界的位置信息。
又如,在另一实施方式中,当实际地理区域的位置信息为实际地理区域的边界线的位置信息,周界为安防区域所对应的实际地理区域的边界区域时,所述步骤S10包括S105和S106。
步骤S105,根据所述安防区域所对应的实际地理区域的边界线的位置信息,将所述边界线扩展为预设宽度的边界环,并得到所述边界环的位置信息。
根据实际地理区域的边界线的位置信息,将该边界线扩展为预设宽度的边界环。其中,预设宽度可以预先根据需要进行设置,在本实施方式中并不做限制。将边界线进行扩展可以是朝区域内部扩展,也可以是朝区域外部扩展,也可以是同时朝区域外和 区域内扩展。如图4所示,示例性地画出了将实际地理区域的边界线朝区域内和区域外进行扩展后得到的预设宽度的边界环,图中中间的框线是边界线,边界线两边的框线构成的环是边界环。
可以理解的是,可以根据边界线的位置信息采用数据运算手段计算得到边界环的位置信息,在此不做展开叙述。
步骤S106,将所述边界环的位置信息作为所述周界的位置信息。
在得到边界环的位置信息后,可以将边界环的位置信息作为周界的位置信息。
进一步地,基于上述各实施例,提出本发明视频监控数据处理方法另一实施例,在本实施例中,所述步骤S20包括S201至S204。
步骤S201,获取多个视频监控设备的布设数据。
获取视频监控设备的布设数据的方式在本实施方式中并不做限制,例如可以从其他设备的数据库中直接获取,或者可以提供视频监控设备的布设数据的录入接口,用户基于该录入接口录入各个视频监控设备的布设数据。
步骤S202,根据所述布设数据中的安装位置信息,从多个所述视频监控设备中筛选出与所述周界的最短距离小于预设阈值的视频监控设备。
在本实施方式中,为提高选出目标视频监控设备的效率,可以先从各个视频监控设备中筛选出与周界距离较近的视频监控设备。
具体地,可以先根据视频监控设备的布设数据中的安装位置信息,计算视频监控设备与周界的最短距离。其中,安装位置信息可以包括视频监控设备的安装位置点在经纬度坐标系统中的坐标值。计算视频监控设备与周界之间的最短距离的方式有很多种,在本实施方式中并不做限制。例如,当周界采用坐标点集合来表示时,可以计算视频监控设备的安装位置点到该坐标点集合中各个坐标点的距离,选取其中最短的距离,作为视频监控设备与周界的最短距离。
预先可以根据需要设置一个阈值,也即预设阈值,当视频监控设备与周界的最短距离大于或等于该预设阈值时,认为该视频监控设备的监控范围一定不会与周界有重叠。从各个视频监控设备中筛选出与周界的最短距离小于该预设阈值的视频监控设备。
可选地,还可以针对筛选出的每个视频监控设备,确定周界相对于该视频监控设备的相对方向与该视频监控设备的朝向是否相反,如果相反,则过滤掉该视频监控设备;如果不相反,则继续步骤S203。在本实施方式中,确定相对方向与该视频监控设备的朝向是否相反的方式有很多种,例如,当该视频监控设备在周界内且该视频监控设备的朝向为远离周界时,或当该视频监控设备在周界外且该视频监控设备的朝向为 远离周界时,则确定周界相对于该视频监控设备的相对方向与该视频监控设备的朝向相反。
步骤S203,根据所述布设数据中的安装位置信息,从所述筛选出的各个所述视频监控设备中过滤掉布设于建筑物范围内的视频监控设备。
在本实施方式中,考虑到一些布设于建筑物范围内的视频监控设备因被建筑物遮挡而无法监控到外部环境,为提高生成的周界围闭结果的准确度,可以根据布设数据中的安装位置信息,在步骤S202所筛选出的视频监控设备中,将布设于建筑物范围内的视频监控设备过滤掉。
在一实施方式中,安装位置信息可以包括视频监控设备的安装位置点在经纬度坐标系统中的坐标值,可以先获取到建筑物范围的位置信息(如从电子地图的数据库中获取),然后根据该位置信息,确定视频监控设备的安装位置点是否在建筑物范围内,若是,则过滤该视频监控设备,若否,则保留该视频监控设备。
在另一实施方式中,安装位置信息可以是直接包括表示该视频监控设备是否在建筑物范围内的信息,此时,可以直接根据安装位置信息将布设于建筑物范围内的视频监控设备过滤掉,而无需结合建筑物范围的位置信息。
步骤S203是可选步骤。在一些示例中,步骤S202筛选出的视频监控设备可能不包括建筑物范围内的视频监控设备。在一些示例中,建筑物范围内的视频监控设备可以提供对外部环境的监控,因此不用被过滤掉。
步骤S204,根据所述周界的位置信息,从所述筛选出的视频监控设备中选取监控范围与所述周界有重叠的目标视频监控设备。
在包括步骤S203时,可以将该步骤过滤出的视频监控设备作为新的筛选出的视频监控设备,从中选取目标视频监控设备,而在不包括步骤S203时,可以从步骤S202筛选出的视频监控设备中选取目标视频监控设备。
在一实施方式中,当获取到的布设数据中包括视频监控设备的安装位置信息和设备属性信息时,可以根据安装位置信息和设备属性信息先计算得到视频监控设备的监控范围的位置信息。其中,安装位置信息可以包括视频监控设备的安装位置点在经纬度坐标系统中的坐标值。设备属性信息可以包括视频监控设备的可视半径,或者,为更精确地计算视频监控设备的监控范围,设备属性信息中还可以包括视频监控设备的安装高度、朝向、俯仰角、水平偏转角等属性信息。
在具体实施方式中,根据安装位置信息和设备属性信息计算监控范围的位置信息的方式有很多种,有精确度低的,也有精确度高的,可以根据具体应用场景的需求来 选取采用何种方式。
例如,在一实施方式中,可以以安装位置信息中安装位置点为圆心,以设备属性信息中的可视半径为半径作出一个圆形区域,将该圆形区域作为视频监控设备的监控范围,而根据该安装位置点的坐标值和可视半径即可计算得到该监控范围的位置信息。
又如,在一实施方式中,考虑到视频监控设备在安装时是有朝向的,朝不同方向安装时,其监控范围也是不同的,故可以以安装位置信息中安装位置点为圆心,以设备属性信息中的可视半径为半径作出一个圆形区域后,从该圆形区域中确定以设备属性信息中的朝向为中心线,以设备属性信息中的水平偏转角为圆心角的扇形区域,将该扇形区域作为视频监控设备的监控范围,而根据该安装位置点的坐标值、可视半径、朝向和水平偏转角即可计算得到该监控范围的位置信息。
再如,在一实施方式中,考虑到视频监控设备的安装高度和俯仰角也会给监控范围带来影响,可以根据安装高度作出与水平面垂直的安装高度线,俯仰角是一个角度范围,将与安装高度线夹角为俯仰角上限角度的可视半径投影到水平面上,得到水平最大可视半径,将与安装高度线夹角为俯仰角下限角度的可视半径投影到水平面上,得到水平最小可视半径,以安装位置点为圆心,水平最小可视半径和水平最大可视半径为半径分别做出一个圆形区域,在两个圆形区域所形成的圆环区域中,确定以朝向为中心线,以水平偏转角为圆心角的扇环区域,将该扇环区域作为视频监控设备的监控范围,而根据该安装位置点的坐标值、可视半径、朝向、水平偏转角、安装高度和俯仰角,即可计算得到该监控范围的位置信息。如图5所示,示意性地画出了根据视频监控设备的安装位置信息和设备属性信息确定的监控范围,即图中下方俯视图中的两条粗虚线与圆环围成的扇环区域;图中a为俯仰角下限角度,b为俯仰角上限角度,c为水平偏转角。
在依据上述任一实施方式确定视频监控设备的监控范围的位置信息后,可以根据周界的位置信息、视频监控设备的监控范围的位置信息,确定视频监控设备的监控范围与周界是否重叠。如果重叠,则将该视频监控设备作为目标视频监控设备;如果没有重叠,则不对该视频监控设备进行后续处理。
进一步地,基于上述各实施例,提出本发明视频监控数据处理方法另一实施例,在本实施例中,所述步骤S40包括S401至S403。
步骤S401,计算各个所述重叠区域的面积之和或者长度之和。
可以根据重叠区域的位置信息,计算出重叠区域的面积之和,或者计算出重叠区域的长度之和。可以理解的是,当周界是实际地理区域的边界线时,计算重叠区域的 长度之和,当周界是实际地理区域的边界区域时,计算重叠区域的面积之和。
计算重叠区域的面积之和,以及计算重叠区域的长度之和的方式在本实施例中并不做限制。例如,在一实施方式中,当周界是实际地理区域的边界线时,重叠区域实际上是线段,当重叠区域的位置信息采用坐标点集合或矢量集合表示时,将坐标点集合或矢量集合拟合成一条或多条线段,计算每条线段的长度,即可得到重叠区域的长度。又如,在一实施方式中,当周界是实际地理区域的边界区域时,重叠区域实际上是一个不规则的图形区域。对于每个重叠区域,当重叠区域的位置信息采用重叠区域的边界线上的坐标点集合或矢量集合表示时,可以将坐标点集合或矢量集合拟合成边界线,再将该边界线所围合的不规则区域转换为基本规则区域(例如矩形、三角形)的组合,根据基本规则区域的面积计算公式计算出各个基本规则区域的面积,再求和,即可得到重叠区域的面积。当有多个重叠区域时,将各个重叠区域的面积求和。
步骤S402,计算所述周界的总面积或者总长度。
可以理解的是,当周界是实际地理区域的边界线时,计算周界的总长度,当周界是实际地理区域的边界区域时,计算周界的总面积。计算周界的总面积或总长度的方式可以参照上述计算重叠区域的面积之和或长度之和的计算方式,在此不做赘述。
步骤S403,利用所述面积之和以及所述总面积,或者,利用所述长度之和以及所述总长度,计算得到围闭度,将所述围闭度作为所述周界的围闭结果。
计算围闭度的方式可以是但不限于是:将面积之和除以总面积得到围闭度,或将长度之和除以总长度得到围闭度。
在一实施方式中,所述视频监控数据处理方法还包括:
步骤S50,在电子地图上以第一展示效果展示所述周界上未被所述目标视频监控设备的监控范围覆盖的区域;和/或
步骤S60,在所述电子地图上以第二展示效果展示所述周界上的各个所述重叠区域,并以第三展示效果展示各个所述目标视频监控设备的监控范围。
第一展示效果、第二展示效果和第三展示效果是不同的展示效果,以使得用户可以直观地看出周界上哪些被监控范围覆盖到,哪些没有被监控范围覆盖到,以及被每个视频监控设备的监控范围覆盖分别覆盖的程度。第一展示效果、第二展示效果和第三展示效果可以根据需要进行设置,在此并不做限制。例如,如图6所示,当周界是实际地理区域的边界线时,周界在电子地图上被监控范围所覆盖的部分线段可以采用粗实现展示,未被监控范围覆盖的部分可以采用细实线展示,目标视频监控设备的监控范围采用虚线展示,以使得用户可以更加直观地了解到视频监控设备对周界的围闭 效果。
此外,本发明实施例还提出一种视频监控数据处理装置,所述装置包括:
第一确定模块,用于确定安防区域的周界的位置信息,其中,所述周界包括所述安防区域所对应的实际地理区域的边界线或边界区域;
第二确定模块,用于确定监控范围与所述周界有重叠的目标视频监控设备;
第三确定模块,用于根据所述周界的位置信息和所述目标视频监控设备的监控范围的位置信息,确定所述周界上与各个所述目标视频监控设备的监控范围之间的重叠区域;
第四确定模块,用于利用各个所述重叠区域以及所述周界的位置信息,确定所述周界的围闭结果,其中,所述围闭结果用于表征所述周界被视频监控设备的监控范围所覆盖的程度。
可选地,所述第一确定模块包括:
第一获取单元,用于获取在电子地图上规划出的安防区域的区域位置信息;
第二获取单元,用于获取路网数据,并根据所述路网数据和所述区域位置信息从各路网设施对应的路网区域中确定与所述安防区域有重叠的目标路网区域;
修正单元,用于根据所述目标路网区域对所述安防区域进行修正,得到所述修正后的安防区域对应的修正后的实际地理区域,其中,所述修正包括从所述安防区域中剔除所述目标路网区域、将所述安防区域与所述目标路网区域合并、将安防区域收缩为所述目标路网区域中的至少之一;
第一确定单元,用于根据所述修正后的实际地理区域的位置信息确定所述周界的位置信息;
和/或,所述第一确定模块包括:
扩展单元,用于根据所述安防区域所对应的实际地理区域的边界线的位置信息,将所述边界线扩展为预设宽度的边界环,并得到所述边界环的位置信息;
第二确定单元,用于将所述边界环的位置信息作为所述周界的位置信息;
和/或,所述第二确定模块包括:
第三获取单元,用于获取多个视频监控设备的布设数据;
筛选单元,用于根据所述布设数据中的安装位置信息,从所述多个视频监控设备中筛选出与所述周界的最短距离小于预设阈值的视频监控设备;
过滤单元,用于根据所述布设数据中的安装位置信息,从所述筛选出的多个所述视频监控设备中过滤布设于建筑物范围内的视频监控设备;
选取单元,用于根据所述周界的位置信息,从所述过滤后的视频监控设备中选取监控范围与所述周界有重叠的目标视频监控设备;
和/或,所述第四确定模块包括:
第一计算单元,用于计算各个所述重叠区域的面积之和或者长度之和;
第二计算单元,用于计算所述周界的总面积或者总长度;
第三计算单元,用于利用所述面积之和以及所述总面积,或者,利用所述长度之和以及所述总长度,计算得到围闭度,将所述围闭度作为所述周界的围闭结果。
和/或,所述装置还包括:
第一展示模块,用于在电子地图上以第一展示效果展示所述周界上未被所述目标视频监控设备的监控范围覆盖的区域;
第二展示模块,用于在所述电子地图上以第二展示效果展示所述周界上的各个所述重叠区域,并以第三展示效果展示各个所述目标视频监控设备的监控范围。
此外,本发明实施例还提出一种视频监控数据处理设备,如图7所示,图7是本发明实施例方案涉及的硬件运行环境的设备结构示意图。需要说明的是,本发明实施例视频监控数据处理设备可以是智能手机、个人计算机、服务器等设备,在此不做具体限制。
如图7所示,该视频监控数据处理设备可以包括:处理器1001,例如CPU,网络接口1004,用户接口1003,存储器1005,通信总线1002。其中,通信总线1002用于实现这些组件之间的连接通信。用户接口1003可以包括显示屏(Display)、输入单元比如键盘(Keyboard),可选用户接口1003还可以包括标准的有线接口、无线接口。网络接口1004可选的可以包括标准的有线接口、无线接口(如WI-FI接口)。存储器1005可以是高速RAM存储器,也可以是稳定的存储器(non-volatile memory),例如磁盘存储器。存储器1005可选的还可以是独立于前述处理器1001的存储装置。
本领域技术人员可以理解,图7中示出的设备结构并不构成对视频监控数据处理设备的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。
如图7所示,作为一种计算机存储介质的存储器1005中可以包括操作系统、网络通信模块、用户接口模块以及视频监控数据处理程序。操作系统是管理和控制设备硬件和软件资源的程序,支持视频监控数据处理程序以及其它软件或程序的运行。在图1所示的设备中,用户接口1003主要用于与客户端进行数据通信;网络接口1004主要用于与服务器建立通信连接;而处理器1001可以用于调用存储器1005中存储的视频 监控数据处理程序,并执行以下操作:
确定安防区域的周界的位置信息,其中,所述周界包括所述安防区域所对应的实际地理区域的边界线或边界区域;
确定监控范围与所述周界有重叠的目标视频监控设备;
根据所述周界的位置信息和所述目标视频监控设备的监控范围的位置信息,确定所述周界上与各个所述目标视频监控设备的监控范围之间的重叠区域;
利用各个所述重叠区域以及所述周界的位置信息,确定所述周界的围闭结果,其中,所述围闭结果用于表征所述周界被视频监控设备的监控范围所覆盖的程度。
进一步地,所述确定安防区域的周界的位置信息的操作包括:
获取在电子地图上规划出的安防区域的区域位置信息;
获取路网数据,并根据所述路网数据和所述区域位置信息从各路网设施对应的路网区域中确定与所述安防区域有重叠的目标路网区域;
根据所述目标路网区域对所述安防区域进行修正,得到所述修正后的安防区域对应的修正后的实际地理区域,其中,所述修正包括从所述安防区域中剔除所述目标路网区域、将所述安防区域与所述目标路网区域合并、将安防区域收缩为所述目标路网区域中的至少之一;
根据所述修正后的实际地理区域的位置信息确定所述周界的位置信息。
进一步地,所述确定安防区域的周界的位置信息的操作包括:
根据所述安防区域所对应的实际地理区域的边界线的位置信息,将所述边界线扩展为预设宽度的边界环,并得到所述边界环的位置信息;
将所述边界环的位置信息作为所述周界的位置信息。
进一步地,所述确定监控范围与所述周界有重叠的目标视频监控设备的操作包括:
获取多个视频监控设备的布设数据;
根据所述布设数据中的安装位置信息,从所述多个视频监控设备中筛选出与所述周界的最短距离小于预设阈值的视频监控设备;
根据所述布设数据中的安装位置信息,从所述筛选出的多个所述视频监控设备中过滤布设于建筑物范围内的视频监控设备;
根据所述周界的位置信息,从所述过滤后的视频监控设备中选取监控范围与所述周界有重叠的目标视频监控设备。
进一步地,所述利用各个所述重叠区域以及所述周界的位置信息,确定所述周界的围闭结果的操作包括:
计算各个所述重叠区域的面积之和或者长度之和;
计算所述周界的总面积或者总长度;
利用所述面积之和以及所述总面积,或者,利用所述长度之和以及所述总长度,计算得到围闭度,将所述围闭度作为所述周界的围闭结果。
进一步地,处理器1001还可以用于调用存储器1005中存储的视频监控数据处理程序,执行以下操作:
在电子地图上以第一展示效果展示所述周界上未被所述目标视频监控设备的监控范围覆盖的区域;
在所述电子地图上以第二展示效果展示所述周界上的各个所述重叠区域,并以第三展示效果展示各个所述目标视频监控设备的监控范围。
此外,本发明实施例还提出一种计算机可读存储介质,所述存储介质上存储有视频监控数据处理程序,所述视频监控数据处理程序被处理器执行时实现如下所述的视频监控数据处理方法的步骤。
本发明视频监控数据处理设备和计算机可读存储介质各实施例,均可参照本发明视频监控数据处理方法各个实施例,此处不再赘述。
需要说明的是,在本文中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者装置不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者装置所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、方法、物品或者装置中还存在另外的相同要素。
上述本发明实施例序号仅仅为了描述,不代表实施例的优劣。
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到上述实施例方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端设备(可以是手机,计算机,服务器,空调器,或者网络设备等)执行本发明各个实施例所述的方法。
以上仅为本发明的优选实施例,并非因此限制本发明的专利范围,凡是利用本发明说明书及附图内容所作的等效结构或等效流程变换,或直接或间接运用在其他相关 的技术领域,均同理包括在本发明的专利保护范围内。

Claims (15)

  1. 一种视频监控数据处理方法,其特征在于,所述方法包括以下步骤:
    确定安防区域的周界的位置信息,其中,所述周界包括所述安防区域所对应的实际地理区域的边界线或边界区域;
    确定监控范围与所述周界有重叠的目标视频监控设备;
    根据所述周界的位置信息和所述目标视频监控设备的监控范围的位置信息,确定所述周界上与各个所述目标视频监控设备的监控范围之间的重叠区域;
    利用各个所述重叠区域以及所述周界的位置信息,确定所述周界的围闭结果,其中,所述围闭结果用于表征所述周界被视频监控设备的监控范围所覆盖的程度。
  2. 如权利要求1所述的视频监控数据处理方法,其特征在于,所述确定安防区域的周界的位置信息包括:
    获取在电子地图上规划出的所述安防区域的区域位置信息;
    获取路网数据,并根据所述路网数据和所述区域位置信息从各路网设施对应的路网区域中确定与所述安防区域有重叠的目标路网区域;
    根据所述目标路网区域对所述安防区域进行修正,得到所述修正后的安防区域对应的修正后的实际地理区域,其中,所述修正包括从所述安防区域中剔除所述目标路网区域、将所述安防区域与所述目标路网区域合并、将所述安防区域收缩为所述目标路网区域中的至少之一;
    根据所述修正后的实际地理区域的位置信息确定所述周界的位置信息。
  3. 如权利要求1所述的视频监控数据处理方法,其特征在于,所述确定安防区域的周界的位置信息包括:
    根据所述安防区域所对应的实际地理区域的边界线的位置信息,将所述边界线扩展为预设宽度的边界环,并得到所述边界环的位置信息;
    将所述边界环的位置信息作为所述周界的位置信息。
  4. 如权利要求1所述的视频监控数据处理方法,其特征在于,所述确定监控范围与所述周界有重叠的目标视频监控设备包括:
    获取多个视频监控设备的布设数据;
    根据所述布设数据中的安装位置信息,从所述多个视频监控设备中筛选出与所述 周界的最短距离小于预设阈值的视频监控设备;
    根据所述布设数据中的安装位置信息,从所述筛选出的多个所述视频监控设备中过滤布设于建筑物范围内的视频监控设备;
    根据所述周界的位置信息,从所述过滤后的视频监控设备中选取监控范围与所述周界有重叠的所述目标视频监控设备。
  5. 如权利要求1至4任一项所述的视频监控数据处理方法,其特征在于,所述利用各个所述重叠区域以及所述周界的位置信息,确定所述周界的围闭结果包括:
    计算所述各个重叠区域的面积之和;
    计算所述周界的总面积;
    利用所述面积之和以及所述总面积计算得到围闭度,将所述围闭度作为所述周界的围闭结果。
  6. 如权利要求1至4任一项所述的视频监控数据处理方法,其特征在于,所述利用各个所述重叠区域以及所述周界的位置信息,确定所述周界的围闭结果包括:
    计算所述各个重叠区域的长度之和;
    计算所述周界的总长度;
    利用所述长度之和以及所述总长度计算得到围闭度,将所述围闭度作为所述周界的围闭结果。
  7. 如权利要求1至6任一项所述的视频监控数据处理方法,其特征在于,所述方法还包括:
    在电子地图上以第一展示效果展示所述周界上未被所述目标视频监控设备的监控范围覆盖的区域;
    在所述电子地图上以第二展示效果展示所述周界上的各个所述重叠区域,并以第三展示效果展示各个所述目标视频监控设备的监控范围。
  8. 一种视频监控数据处理装置,其特征在于,所述装置包括:
    第一确定模块,用于确定安防区域的周界的位置信息,其中,所述周界包括所述安防区域所对应的实际地理区域的边界线或边界区域;
    第二确定模块,用于确定监控范围与所述周界有重叠的目标视频监控设备;
    第三确定模块,用于根据所述周界的位置信息和所述目标视频监控设备的监控范围的位置信息,确定所述周界上与各个所述目标视频监控设备的监控范围之间的重叠区域;
    第四确定模块,用于利用各个所述重叠区域以及所述周界的位置信息,确定所述周界的围闭结果,其中,所述围闭结果用于表征所述周界被视频监控设备的监控范围所覆盖的程度。
  9. 如权利要求8所述的视频监控数据处理装置,其特征在于,所述第一确定模块包括:
    第一获取单元,用于获取在电子地图上规划出的所述安防区域的区域位置信息;
    第二获取单元,用于获取路网数据,并根据所述路网数据和所述区域位置信息从各路网设施对应的路网区域中确定与所述安防区域有重叠的目标路网区域;
    修正单元,用于根据所述目标路网区域对所述安防区域进行修正,得到所述修正后的安防区域对应的修正后的实际地理区域,其中,所述修正包括从所述安防区域中剔除所述目标路网区域、将所述安防区域与所述目标路网区域合并、将所述安防区域收缩为所述目标路网区域中的至少之一;
    第一确定单元,用于根据所述修正后的实际地理区域的位置信息确定所述周界的位置信息。
  10. 如权利要求8所述的视频监控数据处理装置,其特征在于,所述第一确定模块包括:
    扩展单元,用于根据所述安防区域所对应的实际地理区域的边界线的位置信息,将所述边界线扩展为预设宽度的边界环,并得到所述边界环的位置信息;
    第二确定单元,用于将所述边界环的位置信息作为所述周界的位置信息。
  11. 如权利要求8所述的视频监控数据处理装置,其特征在于,所述第二确定模块包括:
    第三获取单元,用于获取多个视频监控设备的布设数据;
    筛选单元,用于根据所述布设数据中的安装位置信息,从所述多个视频监控设备中筛选出与所述周界的最短距离小于预设阈值的视频监控设备;
    过滤单元,用于根据所述布设数据中的安装位置信息,从所述筛选出的多个所述 视频监控设备中过滤布设于建筑物范围内的视频监控设备;
    选取单元,用于根据所述周界的位置信息,从所述过滤后的视频监控设备中选取监控范围与所述周界有重叠的所述目标视频监控设备。
  12. 如权利要求8至11任一项所述的视频监控数据处理装置,其特征在于,所述第四确定模块包括:
    第一计算单元,用于计算各个所述重叠区域的面积之和或者长度之和;
    第二计算单元,用于计算所述周界的总面积或者总长度;
    第三计算单元,用于利用所述面积之和以及所述总面积,或者,利用所述长度之和以及所述总长度,计算得到围闭度,将所述围闭度作为所述周界的围闭结果。
  13. 如权利要求8至12任一项所述的视频监控数据处理装置,其特征在于,所述装置还包括:
    第一展示模块,用于在电子地图上以第一展示效果展示所述周界上未被所述目标视频监控设备的监控范围覆盖的区域;
    第二展示模块,用于在所述电子地图上以第二展示效果展示所述周界上的各个所述重叠区域,并以第三展示效果展示各个所述目标视频监控设备的监控范围。
  14. 一种视频监控数据处理设备,其特征在于,所述视频监控数据处理设备包括:存储器、处理器及存储在所述存储器上并可在所述处理器上运行的视频监控数据处理程序,所述视频监控数据处理程序被所述处理器执行时实现如权利要求1至7中任一项所述的视频监控数据处理方法的步骤。
  15. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质上存储有视频监控数据处理程序,所述视频监控数据处理程序被处理器执行时实现如权利要求1至7中任一项所述的视频监控数据处理方法的步骤。
PCT/CN2023/101121 2022-09-30 2023-06-19 视频监控数据处理方法、装置、设备及可读存储介质 WO2024066501A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202211209269.1 2022-09-30
CN202211209269.1A CN115658823A (zh) 2022-09-30 2022-09-30 视频监控数据处理方法、装置、设备及可读存储介质

Publications (1)

Publication Number Publication Date
WO2024066501A1 true WO2024066501A1 (zh) 2024-04-04

Family

ID=84986264

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/101121 WO2024066501A1 (zh) 2022-09-30 2023-06-19 视频监控数据处理方法、装置、设备及可读存储介质

Country Status (2)

Country Link
CN (1) CN115658823A (zh)
WO (1) WO2024066501A1 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115658823A (zh) * 2022-09-30 2023-01-31 杭州海康威视系统技术有限公司 视频监控数据处理方法、装置、设备及可读存储介质

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104732565A (zh) * 2015-04-21 2015-06-24 南京森林警察学院 一种基于监控范围可视化设计的安防布局绘图方法
CN104780345A (zh) * 2014-11-13 2015-07-15 安徽四创电子股份有限公司 一种基于gis的平安城市监控点布局评价方法
CN106600961A (zh) * 2016-12-22 2017-04-26 南京师范大学 一种监控摄像机路网覆盖优化方法
KR20170055863A (ko) * 2015-11-12 2017-05-22 국방과학연구소 센서노드의 배치위치 결정 방법 및 이를 수행하는 단말기
US20170193307A1 (en) * 2016-01-05 2017-07-06 The Mitre Corporation Camera surveillance planning and tracking system
CN107368656A (zh) * 2017-07-24 2017-11-21 北京芘苜信息技术有限公司 基于bim+安防监控模拟及盲区分析的方法
CN109857826A (zh) * 2019-01-24 2019-06-07 苏州维众数据技术有限公司 一种摄像机可视域标注系统及其标注方法
CN111445574A (zh) * 2020-03-26 2020-07-24 众趣(北京)科技有限公司 一种视频监控设备布控方法、装置及系统
CN112346607A (zh) * 2019-08-07 2021-02-09 中国船舶工业系统工程研究院 一种监控摄像头地图撒点重叠显示优化方法
CN115658823A (zh) * 2022-09-30 2023-01-31 杭州海康威视系统技术有限公司 视频监控数据处理方法、装置、设备及可读存储介质

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104780345A (zh) * 2014-11-13 2015-07-15 安徽四创电子股份有限公司 一种基于gis的平安城市监控点布局评价方法
CN104732565A (zh) * 2015-04-21 2015-06-24 南京森林警察学院 一种基于监控范围可视化设计的安防布局绘图方法
KR20170055863A (ko) * 2015-11-12 2017-05-22 국방과학연구소 센서노드의 배치위치 결정 방법 및 이를 수행하는 단말기
US20170193307A1 (en) * 2016-01-05 2017-07-06 The Mitre Corporation Camera surveillance planning and tracking system
CN106600961A (zh) * 2016-12-22 2017-04-26 南京师范大学 一种监控摄像机路网覆盖优化方法
CN107368656A (zh) * 2017-07-24 2017-11-21 北京芘苜信息技术有限公司 基于bim+安防监控模拟及盲区分析的方法
CN109857826A (zh) * 2019-01-24 2019-06-07 苏州维众数据技术有限公司 一种摄像机可视域标注系统及其标注方法
CN112346607A (zh) * 2019-08-07 2021-02-09 中国船舶工业系统工程研究院 一种监控摄像头地图撒点重叠显示优化方法
CN111445574A (zh) * 2020-03-26 2020-07-24 众趣(北京)科技有限公司 一种视频监控设备布控方法、装置及系统
CN115658823A (zh) * 2022-09-30 2023-01-31 杭州海康威视系统技术有限公司 视频监控数据处理方法、装置、设备及可读存储介质

Also Published As

Publication number Publication date
CN115658823A (zh) 2023-01-31

Similar Documents

Publication Publication Date Title
WO2024066501A1 (zh) 视频监控数据处理方法、装置、设备及可读存储介质
US8482609B1 (en) Methods and apparatus related to surveillance system marketing, planning and/or integration
US9355484B2 (en) System and method of tile management
CN110914870B (zh) 图像网络的注释生成
US20230121659A1 (en) Geospatial asset management
CN110706305A (zh) 地图应用中绘制区域的方法、装置和计算机设备
CN110597940A (zh) 基于微信的自然资源外业核查方法及系统、服务器及介质
CN116628123B (zh) 基于空间数据库的动态切片生成方法和系统
CN111521162B (zh) 一种测站的确定方法、装置、电子设备及存储介质
KR20130080163A (ko) 클라이언트의 전자 지도 표시 방법 및 장치
JP3380457B2 (ja) 地理画像上の影成分の除去方法及び地理画像処理装置、記録媒体
JP2908002B2 (ja) 補助線表示機能を備えた作図装置、及び、その作図装置を用いた作図方法
CN112866631B (zh) 一种区域确定方法、系统、装置及电子设备
CN115033226A (zh) 页面显示方法、装置、终端设备及计算机可读存储介质
US11195255B2 (en) Image processing apparatus and method of controlling the same
CN111797192A (zh) Gis点数据渲染方法、装置、计算机设备和存储介质
JP2019168847A (ja) 情報処理装置、表示システム及びウィンドウ配置プログラム
JP6355909B2 (ja) 検査記録装置及び検査記録評価方法
US10078884B2 (en) System and method for processing geographical information with a central window and frame
JP4285494B2 (ja) 配電線路図の表示方法
CN111290676B (zh) 客户端中指定区域的图片的截取方法、装置及设备
Cătălin A Scanned Georeferencing Maps Using Global Mapper 15 Software
CN116452246B (zh) 电磁设备效能及选址评估方法、装置及电子设备
US20230384122A1 (en) Method and apparatus for generating high definition map for autonomous driving control of vehicle, and recording medium storing computer program therefor
CN115906225A (zh) 构件净高分析方法、装置、计算机设备