Disclosure of Invention
The invention aims to provide a method and a device for monitoring an interested target, which are used for overcoming the problems of inaccurate target identification, unstable output efficiency and incapability of tracking and monitoring caused by mobile phone exchange in the prior art.
In order to achieve the purpose, the technical scheme of the invention is as follows:
a monitoring method of an interested target is applied to a video monitoring system, the video monitoring system comprises a monitoring camera and a back-end server, and the monitoring method of the interested target comprises the following steps:
the monitoring camera periodically collects video frames and wireless equipment information in a monitoring scene, performs target detection analysis on the collected video frames, and extracts the identity characteristics of a target;
judging whether a suspicious target exists according to the identity characteristics of the target, if so, capturing the suspicious target, binding the captured video frame, the identity characteristics of the target and the wireless equipment information in the monitoring scene into an object packet and sending the object packet to a back-end server;
comparing the identity characteristics of the target and the wireless equipment information in the monitoring scene with a stored interested target list, judging whether the interested target exists or not, if so, capturing the interested target, binding the captured video frame, the identity characteristics of the target and the wireless equipment information comparison result into an object packet and sending the object packet to a back-end server;
and after receiving the object packet reported by the monitoring camera, the back-end server stores the object packet into a storage directory corresponding to the monitoring camera, and repeatedly searches for the wireless equipment information in the object packet stored in the associated monitoring point according to the information contained in the object packet so as to determine the interested target and the wireless equipment information corresponding to the interested target and generate corresponding alarm information.
Further, if the object corresponding to the object packet is a suspicious object, the repeating wireless device information search is performed in the object packet stored by the associated monitoring point according to the information contained in the object packet to determine the object of interest and the wireless device information corresponding to the object of interest, and generate corresponding alarm information, including:
according to the identity characteristics in the object package, searching repeated wireless equipment information in an interested target object package stored in the associated monitoring point, and setting the confidence corresponding to the wireless equipment information according to the repeated times;
and when the confidence of the wireless equipment information in the interested target object packet reaches or exceeds a set threshold, generating alarm information to prompt that the wireless equipment information corresponding to the interested target is detected.
Further, if the object corresponding to the object packet is the interested object, the interested object list includes the identity feature of the interested object, the comparison result of the wireless device information is the wireless device information in the monitoring scene, the repeated wireless device information search is performed in the object packet stored in the associated monitoring point according to the information included in the object packet to determine the interested object and the wireless device information corresponding to the interested object, and generate the corresponding alarm information, including:
according to the identity characteristics in the object packet, repeated wireless equipment information searching is carried out in an interested target object packet or a suspicious target object packet stored in the associated monitoring point, and the confidence corresponding to the wireless equipment information is set according to the repeated times;
and when the confidence of the wireless equipment information in the object packet reaches or exceeds a set threshold, generating alarm information to prompt that the wireless equipment information corresponding to the interested target is bound.
Further, if the target corresponding to the object packet is the target of interest, the target of interest list includes the identity of the target of interest and the wireless device information bound to the target of interest, and the comparison result of the wireless device information is a result of intersecting the wireless device information in the monitoring scene with the wireless device information bound to the target of interest, including:
when the intersection is empty, carrying a mark for detecting the wireless equipment information again in the object packet, packaging all the wireless equipment information in the monitoring scene into the object packet and reporting the object packet to a back-end server;
and when the intersection is not empty, packaging the wireless equipment information in the intersection into an object packet and reporting the wireless equipment information to a back-end server, carrying a matched mark in the object packet when the number of the wireless equipment information in the intersection is equal to that of the wireless equipment information bound by the interested target, and carrying a mark for updating the wireless equipment information of the interested target in the object packet when the number of the wireless equipment information in the intersection is less than that of the wireless equipment information bound by the interested target.
Further, when the object packet carries the wireless device information flag that needs to be re-detected, the repeated wireless device information search is performed in the object packet stored in the associated monitoring point according to the information contained in the object packet to determine the object of interest and the wireless device information corresponding to the object of interest, and generate corresponding alarm information, including:
according to the identity characteristics in the object packet, repeated wireless equipment information searching is carried out in an interested target object packet or a suspicious target object packet stored in the associated monitoring point, and the confidence corresponding to the wireless equipment information is set according to the repeated times;
and when the confidence of the wireless equipment information in the object packet reaches or exceeds a set threshold, generating alarm information to prompt that the wireless equipment information corresponding to the interested target is bound.
Further, when the object packet carries the matched flag, the repeated wireless device information search is performed in the object packet stored in the associated monitoring point according to the information contained in the object packet to determine the interested target and the wireless device information corresponding to the interested target, and generate the corresponding alarm information, including:
and directly generating alarm information to prompt the detection of the interested target.
Further, when the object packet carries information of the wireless device of the object of interest to be updated, according to the information contained in the object packet, the repeated wireless device information search is performed in the object packet stored in the associated monitoring point to determine the object of interest and the wireless device information corresponding to the object of interest, and generate corresponding alarm information, including:
and generating alarm information to prompt that the interested target is detected, updating the wireless equipment information bound in the interested target list, and issuing the information to the monitoring camera.
Further, after receiving the object packet, the back-end server deletes the object packet stored for a time exceeding T.
The invention also provides a monitoring device of the interested target, which is applied to the monitoring camera in the video monitoring system and comprises a processor and a nonvolatile memory which stores a plurality of computer instructions, wherein the computer instructions are executed by the processor to realize the steps executed by the monitoring camera in the method.
The invention also provides a monitoring device of the interested target, which is applied to a back-end server in a video monitoring system and comprises a processor and a nonvolatile memory for storing a plurality of computer instructions, wherein when the computer instructions are executed by the processor, the steps executed by the back-end server in the method are realized.
According to the monitoring method and device for the interested target, the identity characteristics detected visually are compared with the acquired wireless equipment information and the interested target list, different operations are performed according to the comparison result, and the user can be detected and prompted at the first time and is triggered to detect again under the condition that the wireless equipment is frequently replaced. And through the cooperative comparison with the associated monitoring points, the wireless equipment information of the interested target is quickly determined. The invention can acquire the wireless equipment information of the interested target by utilizing the existing monitoring camera without resetting the monitoring point. The method and the device determine the confidence degrees of the interested target and the wireless equipment information thereof based on various identity characteristics, can detect the interested target and search the wireless equipment information as long as the facial characteristics are detected once, and have small influence on people stream density and higher accuracy and stability.
Detailed Description
The technical solutions of the present invention are further described in detail below with reference to the drawings and examples, which should not be construed as limiting the present invention.
The general design idea of the technical scheme is that multiple points are continuously distributed and controlled in the possible traveling direction of personnel at related monitoring points (such as crossroads, subway exit related road sections and the like) by utilizing the fixity of multiple 'identity characteristic' information (such as human face characteristics, clothing characteristics, mobile phone MAC and the like) of an interested target within a specific time range (such as minutes).
As shown in fig. 1, the associated monitoring point is an associated camera on a possible historical travel track of the target, and if the camera 1 is a subway exit camera and the travel direction of the target is determined to be that the target exits from a subway exit, no historical travel track associated camera exists; when camera number 2 detects an object and the direction of travel is from south to north, then cameras number 1, 3, 4, 8, 9, 10, 11, 12, 13 are the associated cameras on their possible historical travel trajectories, defining them as the associated monitoring points for camera number 2. The associated monitoring point may be configured for each monitoring camera by a person, which is not described in detail below.
As shown in fig. 2, a monitoring method for an object of interest in this embodiment includes:
the monitoring camera periodically collects video frames and wireless equipment information in a monitoring scene, performs target detection analysis on the collected video frames, and extracts the identity characteristics of a target;
judging whether a suspicious target exists according to the identity characteristics of the target, if so, capturing the suspicious target, binding the captured video frame, the identity characteristics of the target and the wireless equipment information in the monitoring scene into an object packet and sending the object packet to a back-end server;
comparing the identity characteristics of the target and the wireless equipment information in the monitoring scene with a stored interested target list, judging whether the interested target exists or not, if so, capturing the interested target, binding the captured video frame, the identity characteristics of the target and the wireless equipment information comparison result into an object packet and sending the object packet to a back-end server;
and after receiving the object packet reported by the monitoring camera, the back-end server stores the object packet into a storage directory corresponding to the monitoring camera, and repeatedly searches for the wireless equipment information in the object packet stored in the associated monitoring point according to the information contained in the object packet so as to determine the interested target and the wireless equipment information corresponding to the interested target and generate corresponding alarm information.
Specifically, the surveillance camera acquires video images of a surveillance scene in real time, typically 25 frames per second. The monitoring camera of the embodiment further integrates a WIFI sniffer, and can periodically collect information of the wireless device in the monitoring scene, for example, MAC address information, which is described below by taking a MAC address as an example.
The WIFI sniffer automatically detects wireless signals within a certain range, determines the wireless signal intensity range (without special accuracy) within the range according to the effective range of pedestrian detection and analysis of each monitoring camera in the early stage of installation, takes the range as the filtering condition after subsequent normal operation, collects the MAC address of wireless equipment within the range, and records the detected wireless equipment information meeting the range into an MAC information table.
The surveillance camera itself may also perform target detection analysis on the acquired video frames, and is responsible for identifying and intelligently analyzing the video frames, and returning an analysis result, for example, identifying the facial features, the gender features, the height features, the clothing features and other identity features of the pedestrian, which is not limited to the specific content of the identity features in this embodiment.
Since the facial features are easily not easily detected due to occlusion or facing away from the camera, other assist features (gender features, height features, clothing features) are easily collected and do not change over a period of time, and can be captured multiple times. Therefore, in order to avoid the situation of being unrecognizable due to occlusion, the identity feature at least needs to include two items of content, such as a facial feature and a clothing feature, and further, may further include a gender feature, a height feature, and the like. The embodiment utilizes various identity characteristics to determine the interested target, and adds auxiliary characteristics (such as clothing characteristics, sex characteristics, height characteristics and the like) which do not change in a short time to determine the interested target, so that the information of the subsequent detection wireless device can be quickly converged to the minimum range. For any interested target in the list, the wireless device carrying the wireless device passes through the key monitoring area, the wireless device characteristic information (MAC) most relevant to the interested target can be detected and output in a full-automatic manner, and the complicated and repeated manual intervention operation of inputting time, place and the like for each interested target is avoided.
In this embodiment, the monitoring camera stores information of an interested target list, where the interested target list includes an identity characteristic of an interested target and further includes information of a wireless device corresponding to the interested target. The list of objects of interest includes only the identity feature when the wireless device information has not been bound initially. After the wireless device information is subsequently bound, the interested target list further includes the wireless device information corresponding to the interested target, so that each monitoring point can further converge the range or correct the range conveniently through real-time detection.
For example: a typical list of objects of interest is as follows:
object of interest
|
Facial features
|
Characteristic of clothes
|
Wireless device information
|
Object 1
|
Feature 1, feature 2
|
Feature 3
|
MAC1、MAC2
|
Object |
2
|
Feature 4
|
Feature 5, feature 6
|
MAC3 |
TABLE 1
When the name list of the interested target only comprises the identity characteristics of the interested target, when the identity characteristics are compared, for example, if the face characteristics of the target are found to be consistent with the face characteristics of a certain interested target in the interested list, the target can be judged to be the interested target, at the moment, the target is captured, the captured video frame, the identity characteristics of the target and the wireless equipment information in the monitoring scene are bound to be an object packet and sent to a back-end server, namely, the comparison result of the wireless equipment information is the wireless equipment information in all the monitoring scenes at the moment.
When the interested target list includes the identity of the interested target and the wireless device information corresponding to the interested target, the wireless device information is also compared during comparison, which is as follows.
At this time, the identity characteristics are first compared to determine whether there is an object of interest. For example, if the facial features of the object are found to be consistent with the facial features of an object of interest in the interest list, the object may be determined to be the object of interest. When the target of interest is determined, the following comparison is further made:
the method comprises the steps that intersection is taken between wireless equipment information bound to an interested target and wireless equipment information in a monitoring scene;
when the intersection is empty, carrying a mark for detecting the wireless equipment information again in the object packet, packaging all the wireless equipment information in the monitoring scene into the object packet and reporting the object packet to a back-end server;
and when the intersection is not empty, packaging the wireless equipment information in the intersection into an object packet and reporting the wireless equipment information to a back-end server, carrying a matched mark in the object packet when the number of the wireless equipment information in the intersection is equal to that of the wireless equipment information bound by the interested target, and carrying a mark for updating the wireless equipment information of the interested target in the object packet when the number of the wireless equipment information in the intersection is less than that of the wireless equipment information bound by the interested target.
It should be noted that after comparing with the interested target list and determining that the current target is the interested target, the object package sent to the back-end server is the interested target object package.
For example, for object 1, MAC1 and MAC2 in the intersection set indicate that the wireless device information corresponding to the current object of interest is consistent with the list of objects of interest, and the object packet carries the already matched flag. If the wireless device information in the surveillance scene collected by the surveillance camera for object 1 contains only MAC1, then the intersection MAC1 is packaged into an object package and reported to the back-end server. And because the number of the intersections is less than the number (2) of the wireless device information bound in the interested target list, the object packet carries a mark for updating the interested target wireless device information.
In the embodiment, the matched mark, the wireless device information mark which needs to be re-detected or the wireless device information mark which needs to be updated are carried in the object packet, so that tracking and monitoring can be directly performed after the interested target is matched, a user can be prompted when the condition that the wireless device information of the interested target with certain counterreconnaissance capability is frequently changed is detected at the first time, and re-detection can be automatically triggered according to user configuration.
In this embodiment, a target that is too low in head or cannot capture the front face and cannot be effectively subjected to face recognition is used as a suspicious target. Because the probability of capturing the front face for multiple times is low, sometimes, whether the front face is the target of interest cannot be determined, the suspicious target is also subjected to subsequent detection, the probability that the auxiliary feature can be captured is high, and the output efficiency and the stability of the output efficiency are improved by means of the auxiliary feature and the associated monitoring point. If the suspicious target exists, the suspicious target is captured, and the captured video frame, the identity characteristics of the target and the wireless device information in the monitoring scene are bound into an object packet and sent to a back-end server. And sending the object packet corresponding to the suspicious target to a back-end server, and storing the object packet as the suspicious target object packet.
In this embodiment, after receiving the object packet, the back-end server stores the object packet in the storage directory corresponding to the monitoring camera. Only reserving the object packages within the latest T minutes in the storage directory corresponding to the monitoring camera, and setting T by a user according to the monitoring density (for example, three-level detection, the farthest average walking time consumption from a first-level camera to a third-level camera is taken as T); and deleting the object packet stored for the time exceeding T so as to ensure that the source data of the MAC extraction mechanism uses effective data in the latest time, and avoid the loss of performance or storage resources caused by traversing or storing unnecessary massive source data.
The following describes the processing procedure of the back-end server according to several situations of reporting the object packet by the monitoring camera.
In the first case, the object package corresponding to the suspicious object.
At this time, the object packet does not carry any mark, and for this situation, the back-end server needs to perform comparative analysis with the interested target object packet stored by the associated monitoring point according to the identity characteristics and the wireless device information.
The analysis process comprises the following steps:
after receiving the object packet reported by the monitoring camera, the back-end server stores the object packet into a storage directory corresponding to the monitoring camera, performs repeated wireless equipment information search in an interested target object packet stored in the associated monitoring point according to the identity characteristics in the object packet, and sets the confidence corresponding to the wireless equipment information according to the repeated times;
and when the confidence of the wireless equipment information in the interested target object packet reaches or exceeds a set threshold value, the back-end server generates alarm information to prompt that the wireless equipment information corresponding to the interested target is detected.
For example, the identity of the object 1 includes facial features and clothing features, and the facial features of the identity of the suspicious object are not consistent with the object of interest and do not need to be compared. And comparing the clothes characteristics, if object packets of the interested objects with consistent clothes characteristics are found, further comparing whether the MAC addresses of the wireless device information are repeated, and if so, increasing the confidence of the repeated MAC in the object packets of the interested objects. The confidence increase may be repeated once, adding 1 to the confidence. And when the confidence coefficient reaches or exceeds a set threshold value, the suspicious target is considered to be corresponding to a certain interested target, and warning information is sent out to prompt a user to detect the information of the wireless equipment corresponding to the interested target.
If the associated monitoring point has no object packet of the interested target, or the clothing characteristics are inconsistent, or no repeated MAC exists, the confidence of the wireless device information in the object packet is kept at an initial value, for example, 1, no alarm is generated, which means that the suspicious target does not correspond to any interested target, and the suspicious target is not considered.
The second case is an object bag of the object of interest, but not carrying any markers.
The situation corresponds to a situation that the wireless device information corresponding to the interested target does not exist in the interested target list, and the comparison result of the wireless device information is the wireless device information in all the monitoring scenes and is contained in the object packet.
For such a situation, the backend server needs to perform comparative analysis with the interested target object package or the suspicious target object package stored in the associated monitoring point according to the identity characteristics and the wireless device information. It will be readily appreciated that the comparative analysis with the target object of interest package stored in association with the monitoring point has been described in the first case and will not be described here in detail.
For example, the identity feature of the object 1 includes a facial feature and a clothing feature, and unlike the first case, the repeated wireless device information extraction is performed by first using the facial feature as an index and associating the existing object packet of interest under the monitoring point, and when one object packet with the repeated wireless device information is found, the confidence of the corresponding wireless device information is increased by 1. And if the wireless equipment information of the interested target still cannot be determined through the facial features, repeated wireless equipment information extraction can be continuously carried out with the existing interested target object packet under the associated monitoring point by taking the clothing features as indexes, and when an object packet with repeated wireless equipment information is found, the confidence coefficient of the corresponding wireless equipment information is added by 1.
And when the confidence coefficient reaches or exceeds a set threshold value, generating alarm information to prompt that the corresponding wireless equipment information is bound for the interested target. At this time, the corresponding wireless device information is found for the interested target, and the found wireless device information can be bound to the interested target, put into the interested target list and sent to the monitoring camera.
In the third case, the object packet of the object of interest carries the information tag of the wireless device to be re-detected.
When the intersection corresponding to the situation is empty, the object packet carries a mark for detecting the wireless equipment information again, and the wireless equipment information in the monitoring scene is completely packaged into the object packet and reported to the back-end server.
For such a situation, the back-end server needs to perform comparative analysis with the interested target object packet stored by the associated monitoring point according to the identity characteristics and the wireless device information, and re-detect the wireless device information of the interested target, and the specific detection method is the same as that in the second situation, and is not repeated here.
The fourth case, an object bag of the object of interest, carries the already matched flags.
This situation corresponds to the case where the number of pieces of wireless device information in the intersection is equal to the number of pieces of wireless device information bound to the object of interest when the intersection is not empty. When the matched mark is carried in the object packet, the interested target and the wireless equipment are represented to be bound, and in the interested target list, other operations are not needed, and the alarm information is directly generated to prompt the interested target to be detected.
In the fifth case, the object packet of the object of interest carries the wireless device information flag of the object of interest to be updated.
This situation is the case when the intersection is not empty, and the number of pieces of wireless device information in the intersection is smaller than the number of pieces of wireless device information bound to the object of interest. When the object packet carries the wireless equipment information mark of the target of interest to be updated, the back-end server generates alarm information to prompt that the target of interest is detected, updates the wireless equipment information bound in the list of the target of interest, and sends the wireless equipment information to the monitoring camera.
It is easy to understand that, when the object packet is the object packet of interest, when the object packet corresponds to the object packet being the object packet of interest, the object packet is a, and when the related monitoring point does not have the object packet corresponding to the object of interest that is the same as the object packet a, the related monitoring point performs the comparative analysis with the suspicious object packet, which is not described herein again.
In the above situation, when the MAC confidence in the object packet reaches or exceeds the upper limit level set by the user, the backend server considers that the determination is finished, and may generate an alarm message to prompt the user, so as to facilitate subsequent further tracking and other related operations. The confidence of each piece of wireless device information in the object packet in this embodiment is initially 1, and if only one MAC exists in the wireless device information in the monitoring scene, the confidence is set to the highest level.
It should be noted that there may be a plurality of MACs whose confidence levels reach the upper limit level set by the user, or the wireless terminal may be replaced by a subsequent interested target, in order to solve such problems, this embodiment issues these wireless device information MACs corresponding to the interested target to each monitoring point, and the monitoring point updates the MAC information to the list information of the interested target to be bound with the corresponding target. Therefore, after the interested target is shot, the MAC addresses are compared, different marks are respectively taken, and corresponding operation is carried out according to the marks.
After the rear-end server sends the alarm information, the user can perform subsequent operations aiming at various alarm information, for example, when an interested target is prompted to be detected, track monitoring is started according to the information of the specified wireless equipment, and the like; when the information of the wireless equipment of the interested target is detected, the information of the wireless equipment of the interested target is bound with the interested target, and the information is put into a list of the interested target and is sent to a monitoring camera and the like. The technical scheme is not limited to this, and the user can perform subsequent arrangement according to different alarm information, which is not described herein again.
Correspondingly to the foregoing method, an embodiment of the present technical solution further provides a monitoring apparatus for an object of interest, which is applied to a monitoring camera in a video monitoring system, and includes a processor and a nonvolatile memory storing a plurality of computer instructions, where the computer instructions, when executed by the processor, implement the steps executed by the monitoring camera in the foregoing method.
Correspondingly to the foregoing method, another embodiment of the present technical solution further provides a monitoring apparatus for an object of interest, which is applied to a backend server in a video monitoring system, and includes a processor and a nonvolatile memory storing a plurality of computer instructions, where the computer instructions, when executed by the processor, implement the steps executed by the backend server in the foregoing method.
The non-volatile Memory may be, but is not limited to, a Random Access Memory (RAM), a Read Only Memory (ROM), a Programmable Read-Only Memory (PROM), an Erasable Read-Only Memory (EPROM), an electrically Erasable Read-Only Memory (EEPROM), and the like. Wherein the non-volatile memory is configured to store computer instructions that are executed by the processor.
The processor may be an integrated circuit chip having data processing capabilities. The Processor may be a general-purpose Processor including a Central Processing Unit (CPU), a Network Processor (NP), and the like. The various methods, steps and logic blocks disclosed in embodiments of the present invention may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The above embodiments are only for illustrating the technical solution of the present invention and not for limiting the same, and those skilled in the art can make various corresponding changes and modifications according to the present invention without departing from the spirit and the essence of the present invention, but these corresponding changes and modifications should fall within the protection scope of the appended claims.