Supercharge Your Innovation With Domain-Expert AI Agents!

Identity recognition method for illegal object based on illegal behavior recognition

An identity recognition and behavior technology, applied in the field of identity recognition, can solve the problems of too large face inclination angle, unable to further realize the face recognition of illegal personnel, unable to further carry out face recognition and so on.

Inactive Publication Date: 2021-08-13
BEIJING RONGLIAN YITONG INFORMATION TECH CO LTD
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, taking the safety helmet detection on the construction site as an example, considering the computing power and performance, the current visual detection scheme is to detect the frame of the surveillance video screen, that is, to extract pictures from the video screen at a certain frequency, and then detect the Whether the personnel wearing helmets, but because it is a frame, it may mean that when a picture without a helmet is recognized, it may not meet the conditions for face recognition (the face is not clear, the face tilt angle is too large) large, face occlusion, etc.), so further face recognition cannot be performed, and the identity of the person cannot be confirmed
The existing technical solutions, because the frame detection is performed at a certain frequency, may not be able to provide a picture of the violator that can identify the identity of the face, and it is impossible to further realize the face recognition of the identity of the violator

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity recognition method for illegal object based on illegal behavior recognition

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0065] This embodiment provides a violation object identification method based on violation behavior identification, including:

[0066] S1: Obtain and cache in real time (real-time caching of historical 60s video clips of monitoring) the monitoring video in the preset scene (the corresponding scene within the monitoring range of the monitoring system);

[0067] S2: Determine whether there is a violation in the preset scene (such as not wearing a safety helmet, etc.);

[0068] S3: When a violation is detected, identify the identities of all target objects (people entering the preset scene) in the preset scene;

[0069] S4: Perform a second judgment on violations of all target objects in the preset scene.

[0070] In this embodiment, the violating object is: after a second judgment of the violating behavior, it is determined that the violating behavior has occurred.

[0071] In this embodiment, the present invention is mainly applied in construction work areas such as factori...

Embodiment 2

[0074] On the basis of the above-mentioned embodiment 1, this embodiment provides a violation object identification method based on violation behavior identification, S1: real-time acquisition and buffering of surveillance video in a preset scene, including:

[0075] Based on the monitoring system, the monitoring video in the preset scene is obtained in real time, and the historical video clips of the preset time period are cached in real time.

[0076] In this embodiment, the real-time caching of historical video clips for a preset time period refers to the real-time caching of historical 60s video clips for monitoring based on the current time point.

[0077] In this embodiment, the monitoring system is connected to the computer cloud terminal in the data center.

[0078] The beneficial effect of the above technical solution is: the monitoring system can transmit the monitoring video in the preset scene to the computer cloud terminal in the data center in real time, realize ...

Embodiment 3

[0080] On the basis of the above-mentioned embodiment 1, this embodiment provides the above-mentioned method for identifying the illegal object based on the identification of violations. S2: Before judging whether there is a violation in the preset scene, it includes:

[0081] extracting frames to be tested (that is, initially extracted frames for frame extraction detection) from the surveillance video according to a preset cycle;

[0082] Judging whether the target object exists in the frame to be tested, if so, obtaining the maximum brightness difference between the pixels contained in the frame to be tested (that is, the maximum brightness difference between all pixels in the frame to be tested) the maximum value of the luminance difference), the maximum gray value difference (that is, the maximum value of the gray value difference between all image points in the frame to be tested), the maximum chromaticity difference value (that is, the maximum value of the The maximum va...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a violation object identity recognition method based on violation behavior recognition, and the method comprises the steps: obtaining and caching a monitoring video in a preset scene in real time, judging whether a violation behavior exists in the preset scene, recognizing the identities of all target objects in the preset scene when the violation behavior is detected, and carrying out illegal behavior secondary judgment on all target objects in the preset scene. The method is used for monitoring whether the illegal behavior exists in the preset scene or not, identifying the identity of the corresponding personnel when the illegal behavior is detected to exist, carrying out secondary judgment on the illegal behavior on the determined personnel identity, and controlling whether to carry out alarm prompting or not according to the judgment result, so that the functions of accurately monitoring whether the illegal behavior exists in the preset scene or not and determining the identity of the corresponding personnel are realized.

Description

technical field [0001] The present invention relates to the technical field of identification methods, in particular to an identification method of an illegal object based on the identification of illegal behaviors. Background technique [0002] At present, taking the safety helmet detection on the construction site as an example, considering the computing power and performance, the current visual detection scheme is to detect the frame of the surveillance video screen, that is, to extract pictures from the video screen at a certain frequency, and then detect the Whether the personnel wearing helmets, but because it is a frame, it may mean that when a picture without a helmet is recognized, it may not meet the conditions for face recognition (the face is not clear, the face tilt angle is too large) Large, face occlusion, etc.), so further face recognition cannot be performed, and the identity of the person cannot be confirmed. In the existing technical solutions, because th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06K9/00G06T7/13G06T7/246G06F16/583
CPCG06T7/246G06T7/13G06F16/583G06T2207/10016G06T2207/30241G06T2207/30196G06T2207/30201G06V40/166G06V40/168G06V40/20G06V20/52
Inventor 任永建师天磊孙昌勋许志强
Owner BEIJING RONGLIAN YITONG INFORMATION TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More