Invasion and perimeter defense method and invasion and perimeter defense device

A perimeter prevention and intrusion detection technology, applied in the direction of anti-theft alarms, instruments, alarms, etc., can solve the problems of poor real-time performance, long processing time of the whole image, large false alarm rate and difficulty in determining the directionality, so as to improve the detection efficiency. rate, meet real-time requirements, and reduce the effect of false alarm rate

Active Publication Date: 2016-05-11
北京君正集成电路股份有限公司
View PDF7 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to solve the problems in the prior art that the processing time of the whole image is long, the real-time performance is poor, and the false alarm rate is large, and it is difficult to determine the directionality.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Invasion and perimeter defense method and invasion and perimeter defense device
  • Invasion and perimeter defense method and invasion and perimeter defense device
  • Invasion and perimeter defense method and invasion and perimeter defense device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 3

[0078] Correspondingly, the present invention also provides an intrusion and perimeter prevention device, refer to Figure 5 As shown, the present invention provides an embodiment 3 of an intrusion and perimeter prevention device. The device includes: a capture module, a module for formulating an image area of ​​interest, a detection module, a contour extraction module, and a judgment module, wherein the capture module uses It is used to capture real-time video streams under different intrusion environments; the module for formulating an image area of ​​interest is used for formulating an image area of ​​interest for the real-time video stream; The moving object in the image area of ​​interest obtains a foreground image; the contour extraction module is used for contour extraction of the foreground image to determine the contour of each moving object in the current frame; the judging module is used for judging whether the moving object Trigger an alarm.

[0079] Specifically,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Embodiments of the invention disclose an invasion and perimeter defense method and an invasion and perimeter defense device which are applied to the field of security. The invasion and perimeter defense method in the embodiment of the invention comprises the following steps: capturing a real-time video stream under different invasion environments; carrying out discontinuous frame processing of the captured real-time video stream; making an image region of interest for the real-time video stream after discontinuous frame processing; detecting moving objects in the image region of interest through a three-frame differential method to get a foreground image; extracting the contour of the foreground image to determine the contour of each moving object in the current frame; and judging whether the moving objects trigger the alarm, and determining the direction of alarm trigger if the moving objects trigger the alarm. The invasion and perimeter defense method provided by the invention can satisfy the real-timeliness requirement. By using the method, whether an object triggers the alarm and in which direction the alarm is triggered can be determined quickly and effectively, the detection rate is improved, the rate of false alarm is reduced, and the problems existing in the prior art are solved effectively.

Description

technical field [0001] The invention relates to the security field, in particular to an intrusion and perimeter prevention method and device. Background technique [0002] With the development of computer vision, artificial intelligence, pattern recognition and other technologies, perimeter intrusion detection based on network video surveillance has become a research hotspot. Perimeter intrusion detection based on network video surveillance is within the scope of the camera monitoring scene. The alarm area can be set according to the monitoring needs and purposes. The system can automatically detect the moving targets and their behaviors that invade the alert area. If the alert condition is met, an alarm message will be automatically generated, and the target entering the alert area will be marked with an alert frame, and its movement trajectory will be marked at the same time. Its technology has a wide range of application scenarios: including military sites, arsenals, pri...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G08B13/196
Inventor 叶剑英
Owner 北京君正集成电路股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products