Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method for detecting the loss of items in security monitoring

A loss detection and security monitoring technology, applied in image analysis, image enhancement, instruments, etc., can solve the problems of poor background modeling, false positives and false negatives, the time required for the foreground and the uncertainty of the foreground duration, etc., to achieve The effect of overcoming the effect of motion occlusion

Active Publication Date: 2022-05-13
ZHUHAI RAYSHARP TECH
View PDF15 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Aiming at the deficiencies of the prior art, the present invention proposes a method for detecting items left behind and lost in security monitoring. Based on double-background modeling and foreground statistical templates, it can solve the problems caused by poor background modeling in traditional background modeling methods. issues of positives and false negatives and the uncertainty of the time it takes to detect a foreground and the duration of a foreground

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for detecting the loss of items in security monitoring
  • A method for detecting the loss of items in security monitoring
  • A method for detecting the loss of items in security monitoring

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0039] Embodiment: a method for detecting items left behind and lost in security monitoring.

[0040] refer to figure 1 with figure 2 As shown, a method for detecting the loss of items in security monitoring, specifically includes the following steps:

[0041] S1. Obtain video stream data: read in each frame of image I in sequence s , if the image size is large, appropriate scaling can be performed on the premise of meeting the detection accuracy requirements, which will help reduce performance consumption, and then process the image I by using an edge detection operator such as a Sobel operator s Get the gradient map I g , one of the benefits of using a gradient map is that it can avoid the problem of false positives caused by care changes in the scene to a certain extent.

[0042] S2, initialization, use the gradient map I of the first frame g Initialize fast background B f and slow background Bs, ie B f =I g , B s =I g , and at the same time initialize a foregrou...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for detecting the loss of items in security monitoring, which specifically includes: acquiring video stream data, initializing fast background B f , slow background B s and foreground statistics template F m , get fast foreground F f and slow foreground F s , update fast background B f and slow background B s , filter moving targets, update the foreground statistics template F m , Foreground statistical template F m Perform binarization to obtain the final result prospect F result , to the final result prospect F result Perform morphological operations, corrode and expand to obtain complete targets, track complete targets, judge items left and lost, and update the slow background B of the corresponding target area s and foreground statistics template F m and other steps. The detection method for items left behind in security monitoring is based on dual background modeling and foreground statistical templates, which can solve the problem of many false positives and missed negatives caused by poor background modeling in traditional background modeling methods and the need to detect the foreground. The problem of uncertainty in time and prospect duration.

Description

technical field [0001] The invention relates to the technical field of security monitoring, in particular to a method for detecting the loss of items left in security monitoring. Background technique [0002] With the popularization and widespread use of network surveillance cameras, the detection of lost items is widely used in the field of security protection. The detection of lost items is mainly used in public places. It is used to detect whether valuables have been removed and can issue an alarm in time. [0003] The prior art is roughly divided into two types. The first is the method based on background modeling: background modeling is carried out on the monitoring scene through various methods, such as mixed Gaussian model modeling, after background modeling, the foreground is detected, and then the accurate target position is determined through morphological operations. The second is the method of target detection based on convolutional neural network: detect each ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06T7/00G06T7/136G06T7/187G06T5/30
CPCG06T7/0002G06T7/136G06T7/187G06T5/30G06T2207/10016G06T2207/20021
Inventor 刘星唐自兴马梦雪孟涛姚顾肖杨运红杨亮亮江发钦
Owner ZHUHAI RAYSHARP TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products