Unlock instant, AI-driven research and patent intelligence for your innovation.

Detection method of movable light source and security system of application

A light source and image technology, applied in the field of security systems, can solve the problems of different and insufficient security systems

Inactive Publication Date: 2012-05-02
SHINSOFT
View PDF3 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In view of the current problem that it is difficult to detect intrusion behavior in a specific space at night, when the lights are turned off or only a low-brightness light source is activated, or the relevant security system is insufficient, the present invention specifically proposes a practical and efficient, And it is different from the known mobile light source detection method and application security system for the technology of mobile light source detection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Detection method of movable light source and security system of application
  • Detection method of movable light source and security system of application
  • Detection method of movable light source and security system of application

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0063] One or more monitoring cameras 201, 202 are connected to the security host 21 (or digital monitoring system). The transmitted image data, and the storage medium also stores the program code for implementing the moving light source detection method. During operation, after the data processing unit is loaded with the program code for the moving light source detection method, it can execute the moving light source proposed by the present invention detection method. Therefore, the algorithm proposed by the present invention can be executed in the security host 21 .

Embodiment 2

[0065] In this example, the security system may only have one monitoring camera 201 or 202, and the same reasoning may also be applied to multiple monitoring cameras. The monitoring camera 201 or 202 has a data processing unit and a storage medium for image storage, and the storage medium stores the execution script. The program code of the method for detecting the moving light source is invented. After the data processing unit loads the program code for the method for detecting the moving light source, the method for detecting the moving light source can be executed in the camera body. Wherein the algorithm can be partially or fully implemented in the surveillance cameras 201 , 202 .

[0066] The system has a security host or a digital monitoring system, which is connected to the monitoring camera in this example and connected to a monitoring center.

Embodiment 3

[0068] For the flow of the mobile light source detection method applied to the above-mentioned security system embodiment, please refer to image 3 process shown. exist figure 2 In the security system shown, the security host, the digital monitoring system or the monitoring center can capture a continuous image through a monitoring camera installed in a specific space (step S301).

[0069] In one embodiment, the continuous images can be transmitted to the back-end security host through the network or a specific circuit, and the program for detecting the moving light source of the present invention can be executed through the security host; or in another embodiment, each surveillance camera body can execute a preliminary Image processing, determine the light source, and transfer the trajectory coordinates to the security host.

[0070] The program of moving light source detection then processes the continuous images temporarily stored in the internal memory, including obtain...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a detection method of a movable light source and a security system of application. The detection method and the security system are mainly used for detecting the movable light source by applying image processing and a computer vision algorithm and are also introduced into the security system with a digital monitoring system. According to an embodiment, the method comprises the following steps: firstly, separating the foreground and the background of an input image by utilizing a dynamic background updating algorithm; then, obtaining a position with higher pixel value by using a binaryzation algorithm to calculate a foreground image and regarding the position as the position of a light source; and afterwards, judging whether an invasion event occurs or not according to the movement of the light source so as to send out an alarm. The entire process is recorded and monitored by a back-end security system, and a security mechanism is also started after the condition that the invasion event occurs is judged.

Description

technical field [0001] The present invention relates to a moving light source detection method and an applied security system, in particular to a moving light source detection method using image processing and visual judgment, and a security system using the method. Background technique [0002] Known security systems applied to specific spaces (such as warehouses, stores, and homes) are usually equipped with image monitoring equipment, such as digital surveillance systems (DVR), which use digital cameras to dynamically detect and judge intrusion events. Such known techniques can refer to figure 1 Schematic diagram of the device shown. [0003] Shown in the figure is a security system, wherein the computer system 101 located in the central monitoring center is connected to various monitoring cameras 11, 13, 15 and sensors arranged in different locations through a connection line (including network, dedicated line, general circuit, etc.) 109 12, 14, 16. For example, when t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06T7/20H04N7/18
Inventor 黄俊达李鸿生
Owner SHINSOFT