Identification method for judging home invasion in real time

An identification method and area identification technology, applied to instruments, anti-theft alarms, alarms, etc., can solve problems such as inability to perform image matching, inability to identify real-time alarm conditions, and inability to achieve monitoring effects, etc.

Inactive Publication Date: 2016-06-08
ZHONGBEI UNIV
View PDF15 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The fifth category is to only install a video surveillance system, relying on the on-duty staff to manually check the video images to find out whether someone has invaded the room
However, these systems cannot perform image matching on holidays, nights or situations where people’s faces are blocked, and occasions with average video effects, and cannot recognize real-time alarm situations, so they cannot achieve good monitoring results.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identification method for judging home invasion in real time
  • Identification method for judging home invasion in real time
  • Identification method for judging home invasion in real time

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0038] Example 1 Indoor monitoring

[0039] (1) Camera installation The cameras of the indoor real-time video surveillance system are generally installed on the opposite wall of the door entering the room or at a higher position on the side, so that all entrances and exits such as doors and windows enter the monitoring range of the camera as much as possible.

[0040] (2) After the camera is turned on, the system collects images in the monitoring area in real time, such as figure 2 shown.

[0041] (3) Preprocessing the collected images, including filtering, binarization, etc.

[0042] (4) Perform region division and block processing on the preprocessed real-time image. Such as image 3 As shown, the image in the monitoring area in the house is divided into the recognition area and the prevention area. The identification area is used to identify the human body characteristics of the intruder entering the room, such as height, body width, and number of people. The area, esp...

Embodiment 2

[0048] Embodiment 2 corridor monitoring

[0049] (1) The corridor is generally relatively empty. All the images obtained by the monitoring system can be divided into recognition areas.

[0050] (2) The block method of the recognition area. Same as Example 1

[0051] (3) Compare the intrusion image entering the monitoring area with the previous image to obtain the characteristics and quantity of the intruded human body.

[0052] (4) Send out alarm information and call the police.

Embodiment 3

[0053] Example 3 Area Monitoring

[0054] Different from Embodiment 1 and Embodiment 2, this embodiment adopts the same rules as Embodiment 1 and is completed on the basis of Embodiment 2.

[0055] (1) The personnel and vehicles in the area monitoring may change continuously, and as in implementation 2, all are divided into identification areas.

[0056] (2) Image block processing Determine the reference objects of personnel, various vehicles, etc., and perform block processing on the collected real-time images.

[0057] (3) According to the personnel and vehicles entering the monitoring area, identify the height, body width and quantity of personnel; identify the length, width and quantity of vehicles.

[0058] (4) Based on the information in (3) above, make statistics on the characteristic information of various identifiers.

[0059] The identification method of the present invention has the following beneficial effects:

[0060] (1) Without the human body infrared sensor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an identification method for judging home invasion in real time, belonging to the security field of video surveillance. The method comprises the steps of: collecting a real-time surveillance video or image and preprocessing the video or the image; and identifying the invasion time, number, body figures and threatening degree of the invaders in the surveillance region by zoning and segmentation processing. According to the method, the problems that the current video or image surveillance system is only used for static forensics and cannot identify a warning condition or give an alarm without the assistance of other sensors are solved; and specific information of the warning condition such as the number, body height, body width and threatening degree of the invaders can be analyzed by the method according to the surveillance video or image, and the surveillance effect and the alarming effect for the surveillance region can be greatly improved.

Description

technical field [0001] The invention relates to an identification method for real-time judging that someone has invaded a room, and belongs to the field of information technology, especially the field of indoor video monitoring. Background technique [0002] An important monitoring object of the security engineering system is the office space of the unit, including public internal places and various office areas. Important security units and departments often install video surveillance systems for security precautions during daily working hours, off-duty or holidays. Especially after get off work or holidays, when the staff are resting, the importance of the monitoring system is self-evident. [0003] Currently common patents or methods for indoor monitoring systems mainly contain five categories. The first category is the basic physical anti-theft method, which is often to modify the anti-theft door and add a sensor or switch (eg: ZL201210164854.4). The second type is a ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G08B13/196
CPCG08B13/19602
Inventor 陈够喜薛泽赟
Owner ZHONGBEI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products