Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A real-time identification method for judging someone intruding into a room

An identification method and technology for identifying areas, applied in instruments, anti-theft alarms, alarms, etc., can solve the problems of inability to achieve monitoring effects, inability to perform image matching, and inability to identify real-time alarm situations.

Inactive Publication Date: 2017-11-28
ZHONGBEI UNIV
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The fifth category is to only install a video surveillance system, relying on the on-duty staff to manually check the video images to find out whether someone has invaded the room
However, these systems cannot perform image matching on holidays, nights or situations where people’s faces are blocked, and occasions with average video effects, and cannot recognize real-time alarm situations, so they cannot achieve good monitoring results.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A real-time identification method for judging someone intruding into a room
  • A real-time identification method for judging someone intruding into a room
  • A real-time identification method for judging someone intruding into a room

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0038] Example 1 Indoor monitoring

[0039] (1) Camera installation The cameras of the indoor real-time video surveillance system are generally installed on the opposite wall of the door entering the room or at a higher position on the side, so that all entrances and exits such as doors and windows enter the monitoring range of the camera as much as possible.

[0040] (2) After the camera is turned on, the system collects images in the monitoring area in real time, such as figure 2 shown.

[0041] (3) Preprocessing the collected images, including filtering, binarization, etc.

[0042] (4) Perform region division and block processing on the preprocessed real-time image. Such as image 3 As shown, the image in the monitoring area in the house is divided into the recognition area and the prevention area. The identification area is used to identify the human body characteristics of the intruder entering the room, such as height, body width, and number of people. The area, esp...

Embodiment 2

[0048] Example 2 Corridor Monitoring

[0049] (1) The corridor is generally relatively empty. All the images obtained by the monitoring system can be divided into recognition areas.

[0050] (2) The block method of the recognition area. Same as Example 1

[0051] (3) Compare the intrusion image entering the monitoring area with the previous image to obtain the characteristics and quantity of the intruded human body.

[0052] (4) Send out alarm information and call the police.

Embodiment 3

[0053] Example 3 Area Monitoring

[0054] Different from Embodiment 1 and Embodiment 2, this embodiment adopts the same rules as Embodiment 1 and is completed on the basis of Embodiment 2.

[0055] (1) The personnel and vehicles in the area monitoring may change continuously, and as in implementation 2, all are divided into identification areas.

[0056] (2) Image block processing Determine the reference objects of people, various vehicles, etc., and block the collected real-time images.

[0057] (3) According to the personnel and vehicles entering the monitoring area, identify the height, body width and quantity of personnel; identify the length, width and quantity of vehicles.

[0058] (4) Based on the information in (3) above, make statistics on the characteristic information of various identifiers.

[0059] The identification method of the present invention has the following beneficial effects:

[0060] (1) Without the human body infrared sensor, it can automatically id...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an identification method for judging home invasion in real time, belonging to the security field of video surveillance. The method comprises the steps of: collecting a real-time surveillance video or image and preprocessing the video or the image; and identifying the invasion time, number, body figures and threatening degree of the invaders in the surveillance region by zoning and segmentation processing. According to the method, the problems that the current video or image surveillance system is only used for static forensics and cannot identify a warning condition or give an alarm without the assistance of other sensors are solved; and specific information of the warning condition such as the number, body height, body width and threatening degree of the invaders can be analyzed by the method according to the surveillance video or image, and the surveillance effect and the alarming effect for the surveillance region can be greatly improved.

Description

technical field [0001] The invention relates to an identification method for real-time judging that someone has invaded a room, and belongs to the field of information technology, especially the field of indoor video monitoring. Background technique [0002] An important monitoring object of the security engineering system is the office space of the unit, including public internal places and various office areas. Important security units and departments often install video surveillance systems for security precautions during daily working hours, off-duty or holidays. Especially after get off work or holidays, when the staff are resting, the importance of the monitoring system is self-evident. [0003] Currently common patents or methods for indoor monitoring systems mainly contain five categories. The first category is the basic physical anti-theft method, which is often to modify the anti-theft door and add a sensor or switch (eg: ZL201210164854.4). The second type is a ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G08B13/196
CPCG08B13/19602
Inventor 陈够喜薛泽赟
Owner ZHONGBEI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products