Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Intelligent security prompting device and method based on behavior characteristic clustering

An intelligent security and clustering technology, applied in the direction of instruments, character and pattern recognition, computer components, etc., can solve the problems of unsatisfactory video analysis accuracy, analysis and alarm prompt load, and complex parameter information acquisition, etc., to achieve parameter acquisition The method is simple and convenient, the parameter information is rich, and the effect of improving the accuracy of the result

Inactive Publication Date: 2019-10-25
TERMINUSBEIJING TECH CO LTD
View PDF12 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, at present, for key areas such as squares and transportation hubs, hundreds of cameras may be deployed. Each camera captures more than 20 frames of security video in real time per second, and sends them to the background for analysis. Thousands or even tens of thousands of frames per second screen, the calculation speed is required to reach several million times per second, which brings a huge load to the analysis and alarm prompts in the background
Therefore, it is hoped to reduce the amount of calculations for security video image analysis as much as possible to reduce the load and hardware costs; the clustering algorithm in the prior art has relatively complicated acquisition of parameter information, is not rich enough, and cannot meet the requirements for the accuracy of video analysis

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intelligent security prompting device and method based on behavior characteristic clustering
  • Intelligent security prompting device and method based on behavior characteristic clustering
  • Intelligent security prompting device and method based on behavior characteristic clustering

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0026] Such as figure 1 As shown, it is a schematic flow diagram of an intelligent security reminder method based on behavioral feature clustering based on behavioral feature clustering provided by the present invention. The method includes:

[0027] 101: Detect each target in each video frame, and mark and track each target with a circumscribed rectangle.

[0028] There may be multiple targets in each frame of video picture, multiple targets in the video pic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an intelligent security prompting device and a method based on behavior characteristic clustering, and the method comprises the steps: detecting each target in each frame of video image, and marking each target through an external rectangle; recording parameter information of each target bounding rectangle in each frame of video picture; intercepting a video frame, respectively calculating the change value of the parameter information of the target circumscribed rectangle of each frame and the target circumscribed rectangle of the same target of the previous frame, and forming a parameter change value array for each target in the video frame; clustering calculation is performed on the obtained multiple arrays, dividing class clusters for targets in the video frame, and selecting the class clusters with the target number smaller than a threshold value; and determining a frame where a target in the selected class cluster is located, and giving a security prompt. According to the security and protection monitoring method, the system operation amount can be reduced, the hardware cost can be reduced, the detection precision can be further improved, and the accuracy of abnormal behavior detection is ensured.

Description

technical field [0001] The invention belongs to the technical field of video monitoring, and in particular relates to an intelligent security prompting device and method based on clustering of behavioral characteristics. Background technique [0002] In smart cities, it is a very important application to conduct video security monitoring for the crowd through cameras widely distributed in the city. Through the analysis of the security video screen in the background, behaviors that endanger public safety and traffic order in the crowd can be found, such as fighting, illegal passing, crowd crowding and stampede, etc., and then give timely alarm reminders, so that the front end can quickly dispatch management personnel or police forces Dispose of to avoid greater impact and hazard. [0003] However, at present, for key areas such as squares and transportation hubs, hundreds of cameras may be deployed. Each camera captures more than 20 frames of security video in real time per ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06K9/00G06K9/62
CPCG06V20/40G06V2201/07G06F18/23
Inventor 董承利
Owner TERMINUSBEIJING TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products