Intelligent security and protection video monitoring method and system, and monitoring terminal

A video surveillance system, intelligent security technology, applied in CCTV systems, instruments, computing and other directions, can solve the problems of increased transmission bandwidth load, large power consumption, long network delay, etc., to reduce the amount of calculation, reduce communication bandwidth, Reduce the effect of video images

Inactive Publication Date: 2018-11-30
HUAZHONG UNIV OF SCI & TECH
View PDF10 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] However, on the other hand, with the rapid increase in the number of camera monitoring devices connected to the collection network and the improvement of the collection efficiency of a single camera monitoring device, the data generated by this type of device has reached the Zettabyte (ZB) level, resulting in new technical problems
[0007] For example, the transmission of massive data from camera monitoring equipment at the edge of the collection network to the cloud center leads to a sharp increase in the load of transmission bandwidth, resulting in long network delays
Another example is that the edge camera monitoring equipment with limited power consumes a lot of power in the process of transmitting massive data to the cloud center
Also, the linear growth of centralized cloud computing capabilities cannot match the explosive growth of massive edge data, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intelligent security and protection video monitoring method and system, and monitoring terminal
  • Intelligent security and protection video monitoring method and system, and monitoring terminal
  • Intelligent security and protection video monitoring method and system, and monitoring terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0073] In the following description, many technical details are proposed in order to enable readers to better understand the application. However, those skilled in the art can understand that the technical solutions claimed in this application can be realized even without these technical details and various changes and modifications based on the following implementation modes.

[0074] Explanation of terms:

[0075] Target: The object to be monitored.

[0076] Target feature: is the image feature of the target. Can be HOG features. Or it is the feature obtained by performing principal component analysis on the joint feature of the HOG and LBP of the target and reducing the dimension. is a generic feature for pedestrians including faces.

[0077] General characteristics: Refers to the characteristics that a class of objects generally satisfy.

[0078] Target information: information used to describe the target, which can be text or numbers, such as a license plate number, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The application relates to the field of intelligent monitoring, and discloses an intelligent security and protection video monitoring method and system, and a monitoring terminal. The flow of monitoring image uploading and the calculation amount of a cloud server can be greatly reduced without lowering the target recognition accuracy. In the present invention, the monitoring terminal performs filtering based on image recognition analysis on the captured image, filters images which do not include a target feature, and uploads an image containing the target feature to a cloud server; and the cloud server performs target recognition on the filtered image uploaded by the monitoring terminal.

Description

technical field [0001] The present application relates to the technical field of monitoring, in particular to the technical field of intelligent monitoring. Background technique [0002] In recent years, with the continuous improvement of security needs, public places such as airports, subways, stations, and banks are equipped with a large number of monitoring camera equipment. These camera equipment constitute an extremely powerful information collection network. However, in the past, this collection network Most of the edge surveillance camera equipment is limited to shooting and storing surveillance videos, and the relevant responsible personnel often only check the videos after abnormal events occur, which consumes a lot of manpower and time. [0003] With the emergence of intelligent video surveillance technology, this situation has been changed. [0004] Specifically, the system generated by intelligent video surveillance technology collects video information uploaded...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06K9/00G06K9/62H04N7/18
CPCH04N7/18G06V40/168G06V20/10G06V20/625G06F18/2135
Inventor 杨建中谢帅林宋仕杰
Owner HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products