Security monitoring system based on multi-feature change identification and working method thereof

A technology of security monitoring and working methods, applied in anti-theft alarms, electric alarms, voice analysis, etc., can solve the problem that monitoring methods cannot meet various monitoring needs, reduce the probability of misleading identification, increase Identify information sources and improve the effect of identification

Inactive Publication Date: 2019-09-10
苏州凸现信息科技有限公司
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

With the development of society, the means of security monitoring are gradually improving,

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security monitoring system based on multi-feature change identification and working method thereof
  • Security monitoring system based on multi-feature change identification and working method thereof
  • Security monitoring system based on multi-feature change identification and working method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0050] refer to figure 1 as an example.

[0051] A security monitoring system based on multiple feature change recognition, including: a pupil recognition module 1 , a speech recognition module 2 , and an analysis module 3 .

[0052] The pupil recognition module 1 includes a feature capture module 11 , a feature extraction module 12 , and a light adjustment module 13 . The feature capture module 11 is used to capture the eye features of the identified person. The feature extraction module 12 is used to extract the pupil feature of the identified person. The light adjustment module 13 changes the light value in the recognition area. The feature extraction module 12 is connected to the analysis module 3 , and the feature extraction module 12 outputs the through-hole features of the identified person to the analysis module 3 .

[0053] The feature capture module 11 can be a camera, which is set in the recognition area, and captures the specific facial position of the person t...

Embodiment 2

[0066] refer to Figure 2-6 as an example.

[0067] A working method of a security monitoring system based on identification of multiple feature changes, comprising the following steps:

[0068] The feature capture module 11 captures the eye features of the recognized person in the recognition area, and outputs the eye features to the feature extraction module 12 .

[0069] The feature extraction module 12 extracts pupil features from the eye features and outputs the pupil features to the analysis module 3 .

[0070] The analysis module 3 acquires the pupil features and compares the pupil features with the features in the feature database 31 .

[0071] The voice acquisition module 21 acquires the voice information of the recognized person in the recognition area, and outputs the voice information to the voiceprint extraction module 22 .

[0072] The voiceprint extraction module 22 extracts the voiceprint in the speech information, and outputs the voiceprint to the analysis ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a security monitoring system based on multi-feature change identification and a working method thereof. The system comprises a pupil identification module, a voice identification module and an analysis module; the pupil identification module comprises a feature shooting module, a feature extraction module and a light ray adjustment module; the voice identification module comprises a voice acquisition module, a voiceprint extraction module and an environmental sound processing module; the voiceprint extraction module is connected with the analysis module and outputs theextracted voiceprint of an identified person to the analysis module; the analysis module comprises a feature database, and pupil features and voiceprint features of qualified personnel are stored inthe feature database; and the analysis module compares the features output by the feature extraction module and/or the voiceprint extraction module with the feature database, and if the comparison issuccessful, the current identified person is marked as a qualified person.

Description

technical field [0001] The invention relates to a security monitoring system, in particular to a security monitoring system based on multi-characteristic change identification and a working method thereof. Background technique [0002] The security monitoring system uses optical fiber, coaxial cable or microwave to transmit video signals in its closed loop, and forms an independent and complete system from camera to image display and recording. It can reflect the monitored object in real time, vividly and truly, not only greatly extending the observation distance of the human eye, but also expanding the function of the human eye. It can replace manual monitoring for a long time in harsh environments, allowing people to see Everything that actually happened at the monitored site was recorded by a video recorder. At the same time, the alarm system equipment alarms the illegal intrusion, and the generated alarm signal is input to the alarm host, which triggers the monitoring s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G08B13/196G08B13/24G10L17/02G10L17/22
CPCG08B13/19602G08B13/2491G10L17/02G10L17/22
Inventor 徐亮
Owner 苏州凸现信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products