Suspicious object detection method and device
A suspicious and detection system technology, applied in the field of image processing, can solve problems such as hidden dangers of suspicious objects and restrictions on the level of urban public security management
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0027] Please refer to figure 2 , figure 2 It is a flowchart of a suspicious object detection method provided by the first embodiment of the present invention. The method is applied to a suspicious object detection system. The system includes a camera and a computer. The following will figure 2 The illustrated process is elaborated, and the method includes:
[0028] Step S110: The computer receives the video information collected by the camera in real time.
[0029] Step S120: Based on the pre-saved background image, a moving target detection algorithm is used to obtain a moving target in each frame of the video information.
[0030] The moving target detection algorithm may be a multi-Gaussian model algorithm, background subtraction method, adjacent frame difference method, optical flow method, etc.
[0031] Taking the background subtraction method as an example, the computer subtracts the difference between each frame image and the pre-saved background image according to the vide...
no. 2 example
[0054] Please refer to image 3 , image 3 It is a flowchart of a suspicious object detection method provided by the second embodiment of the present invention. The method is applied to a suspicious object detection system, and the system includes a camera, a computer, and an alarm device. The following will image 3 The illustrated process is explained, and the method includes:
[0055] Step S210: The computer receives the video information collected by the camera in real time.
[0056] Step S220: Based on the pre-saved background image, a moving target detection algorithm is used to obtain a moving target in each frame of the video information.
[0057] Step S230: Perform image segmentation on the video information based on the moving target tracking algorithm to obtain the sensitive time of the moving target in the monitoring area of the camera, where the sensitive time is the moving target The staying time or disappearing time in the monitoring area of the camera.
[0058] St...
no. 3 example
[0065] Please refer to Figure 4 , Figure 4 It is a flowchart of a suspicious object detection method provided by the third embodiment of the present invention. The method is applied to a suspicious object detection system, and the system includes a camera and a computer. The following will Figure 4 The illustrated process is elaborated, and the method includes:
[0066] Step S300: The computer obtains multiple frames of image information of the surveillance area of the camera in a continuous time.
[0067] Step S301: Perform modeling learning on the multi-frame image information based on the mixed Gaussian distribution background model.
[0068] Step S302: Save a frame of image determined after learning as a background image.
[0069] Due to the fact that in practical applications, there are problems such as day and night alternation, background disturbance, and illumination changes, if the same background image is used all the time, larger errors will be caused. Therefore, the ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


