Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A monitoring method and system for protecting privacy

A privacy protection and monitoring system technology, applied in the field of computer vision, can solve problems such as user privacy leakage, cloud server data leakage, etc., and achieve the effects of strong scalability, small amount of feature data, and fast transmission

Active Publication Date: 2020-08-07
PEKING UNIV +1
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the large amount of audio and video data, it puts a lot of pressure on the cloud server in terms of transmission and storage, and the cloud server itself also has the risk of data leakage, resulting in user privacy leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A monitoring method and system for protecting privacy
  • A monitoring method and system for protecting privacy
  • A monitoring method and system for protecting privacy

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0063] According to the embodiment of the present application, a monitoring method for protecting privacy is proposed, such as figure 1 shown, including:

[0064] S1. Obtain monitoring perception data of a monitoring scene; the monitoring perception data includes at least one of the following data: video data, audio data, smoke detection data, light detection data, and temperature data.

[0065] S2. Extracting the real-time feature stream of the monitoring perception data;

[0066] S3. Input the real-time feature stream into the pre-trained deep neural network model to detect abnormal behaviors / events.

[0067] In the following preferred embodiments, the monitoring perception data is selected as video data and / or audio data to illustrate the inventive idea of ​​the present invention.

[0068] In a preferred embodiment of the present application, the video stream data of the surveillance scene will be decomposed into image data according to the frame requirements according to...

Embodiment 2

[0084] According to the implementation mode of the present application, a monitoring system for protecting privacy is also proposed, such as figure 2 As shown, it includes: a monitoring perception module, a feature extraction module and an abnormal behavior / event detection module; a monitoring perception module, which is used to obtain the monitoring perception data of the monitoring scene; a feature extraction module, which is used to extract the real-time feature flow of the monitoring perception data, and Send the real-time feature stream to the abnormal behavior / event detection module; the abnormal behavior / event detection module is used to input the real-time feature stream into the pre-trained deep neural network model to detect abnormal behavior / events. The monitoring perception data includes at least one of the following data: video data, audio data, smoke data, light data, and temperature data.

[0085] The dual-stream camera in the prior art is a camera capable of s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application discloses a monitoring method and system for protecting privacy. The system includes: a monitoring perception module, a feature extraction module, and an abnormal behavior / event detection module; the monitoring perception module is used to obtain monitoring perception data of a monitoring scene; the The feature extraction module is used to extract the real-time feature stream of the monitoring perception data, and sends the real-time feature stream to the abnormal behavior / event detection module; the abnormal behavior / event detection module is used to extract the real-time feature stream Input the pre-trained deep neural network model to detect abnormal behaviors / events. The present invention has the advantages of small amount of feature data and fast transmission, and uses real-time feature stream instead of video, which protects privacy to a certain extent; the camera software of the present invention can be defined, and the model can be updated according to requirements, with wide application range and strong scalability; The feature transformation of the invention can ensure the security of the feature data transmission process, and prevent the cloud from leaking feature data and judgment results; the present invention has cloud computing power.

Description

technical field [0001] The present application relates to the field of computer vision, and in particular to a monitoring method and system for protecting privacy. Background technique [0002] As the most popular direction of computer vision research in recent years, security has a close relationship with video analysis research. In real surveillance video, a common requirement is to automatically identify abnormal events in the video stream, that is, the abnormal event detection task. [0003] Common anomaly detection algorithms learn a common pattern first, and assume that any pattern that violates this common pattern should be abnormal. But in fact, it is difficult and almost impossible for a method to define a so-called normal mode, because the normal mode may contain too many different events and behaviors. Also, it is difficult to define abnormal events, because abnormal events may also include too many types of situations. [0004] Behavior recognition refers to t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04N21/2347H04N5/913G06K9/00G06N3/04G06N3/08
CPCH04N21/2347H04N5/913G06N3/08G06V20/46G06V20/41G06V20/52G06N3/045
Inventor 田永鸿高文陈鼎邢培银
Owner PEKING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products