WO2014190851A1 - 一种视频监控方法、装置及系统 - Google Patents
一种视频监控方法、装置及系统 Download PDFInfo
- Publication number
- WO2014190851A1 WO2014190851A1 PCT/CN2014/077115 CN2014077115W WO2014190851A1 WO 2014190851 A1 WO2014190851 A1 WO 2014190851A1 CN 2014077115 W CN2014077115 W CN 2014077115W WO 2014190851 A1 WO2014190851 A1 WO 2014190851A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- alarm
- client
- triggered
- intelligent analysis
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/18—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
- H04N7/183—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a single remote source
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V20/00—Scenes; Scene-specific elements
- G06V20/50—Context or environment of the image
- G06V20/52—Surveillance or monitoring of activities, e.g. for recognising suspicious objects
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING SYSTEMS, e.g. PERSONAL CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19602—Image analysis to detect motion of the intruder, e.g. by frame subtraction
- G08B13/19608—Tracking movement of a target, e.g. by detecting an object predefined as a target, using target direction and or velocity to predict its new position
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING SYSTEMS, e.g. PERSONAL CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19678—User interface
Definitions
- the present invention relates to the field of security, and in particular, to a video monitoring method, apparatus and system. Background technique
- a typical video surveillance system includes a monitoring client, a monitoring platform, and a camera.
- the monitoring client is a graphical user interface that can interact with the user.
- the monitoring platform is a background service component that can be related to monitoring. Real-time browsing, intelligent analysis and other business functions;
- the camera is a front-end video collection device for collecting and analyzing real-time images of the current location.
- the video surveillance system alerts the mobile object that breaks into the perimeter of the pre-configured number by configuring the intelligent analysis rule of the perimeter intrusion, prompting the user to process it.
- the prior art is linked by the gun ball (that is, deploying a fixed gun machine and a high speed ball machine, the gun machine)
- the alarm image is captured and immediately linked to the nearest dome camera, and the moving object is closely tracked by the dome camera to achieve partial magnification of the moving object.
- a typical video surveillance system includes a monitoring client, a monitoring platform, and a camera.
- the monitoring client is a graphical user interface that can interact with the user.
- the monitoring platform is a background service component that can be related to monitoring. Real-time browsing, intelligent analysis and other business functions; camera It is a front-end video collection device for collecting and analyzing real-time images of the current location.
- the video surveillance system provides a warning to the moving object that breaks into the perimeter of the pre-configured number by configuring the intelligent analysis rule of the perimeter intrusion, prompting the user to process.
- the prior art is linked by the gun ball (that is, deploying a fixed gun machine and a high speed ball machine, the gun machine)
- the alarm image is captured and immediately linked to the nearest dome camera, and the moving object is closely tracked by the dome camera to achieve partial magnification of the moving object.
- FIG. 1 is a schematic flowchart of a video monitoring method on a client side according to an embodiment of the present invention
- FIG. 2 is a schematic flowchart of another video monitoring method on a client side according to an embodiment of the present invention
- FIG. 3 is a schematic flowchart of a video monitoring method on a monitoring platform side according to an embodiment of the present invention
- FIG. 4 is a schematic structural diagram of a client according to an embodiment of the present invention.
- FIG. 5 is a schematic structural diagram of another client according to an embodiment of the present invention
- FIG. 6 is a schematic structural diagram of a monitoring platform according to an embodiment of the present invention
- FIG. 7 is a schematic diagram of another embodiment of the present invention.
- FIG. 8 is a schematic structural diagram of a monitoring platform according to another embodiment of the present invention;
- FIG. 9 is a schematic diagram of a video monitoring system according to an embodiment of the present invention.
- An embodiment of the present invention provides a video monitoring method, which can be implemented by a client. As shown in FIG. 1 and FIG. 2, the video monitoring method includes the following steps:
- the client obtains an intelligent analysis alarm and at least one track information that triggers the alarm object, and adjusts a user interface window layout according to the intelligent analysis alarm.
- the foregoing intelligent analysis alarm is triggered when the client or the monitoring platform or the camera determines an intruding object in the monitoring scenario by using an intelligent analysis policy, and the intelligent analysis strategy includes but is not limited to: a perimeter intrusion detection strategy, There are four types of line detection strategies, flaw detection strategies, and sudden detection strategies, just to illustrate them.
- the user before implementing step 101 of the embodiment of the present invention, the user also needs to set a suitable window layout in the client (such as "4+ window layout, the specific layout has a large pane above, and there are four below. Small panes of the same size, four of which are used as anomalous scene monitoring, and a large pane above is used as a tracking alarm object when a perimeter intrusion alarm (ie, intelligent analysis alarm) occurs.
- the user can compare the image of the entire monitoring scene with the image of the moving object at a close distance, thereby better grasping the situation of the monitoring scene, and can process the invading moving object at any time.
- the user also The above window layout can be adjusted at any time according to the actual application scenario.
- the client After the client obtains the intelligent analysis alarm, the client starts to adjust the window in the user interface to an appropriate layout, which triggers the triggering of the intelligent analysis alarm.
- the alarm object is framed by a rectangular frame so that subsequent clients will use a rectangular frame.
- the alarm is triggered enlarged objects.
- the foregoing intelligent analysis alarm may be an alarm triggered when the client performs intelligent analysis to determine an invading object in the monitoring scenario, or may be reported by the monitoring platform or the camera when performing intelligent analysis in the monitoring scenario to determine that there is an invading object. Alarm.
- step 101 includes the following steps:
- the client triggers an intelligent analysis alarm when the intrusion object is determined in the monitoring scenario according to the intelligent analysis policy configured by the user, and records at least one track information that triggers the alarm object.
- the client adjusts the layout of the user interface window according to the intelligent analysis alarm.
- the client first decodes the audio and video stream sent by the camera through the monitoring platform to obtain a real-time video image, and then performs intelligent analysis based on the intelligent analysis strategy based on the decoded real-time video image, if the smart alarm is triggered (ie, when the camera is When there is an intruding moving object in the monitoring scene, an intelligent analysis alarm is generated, and then the client adjusts the window in the user interface to an appropriate layout according to the intelligent analysis alarm, and the triggering alarm object that triggers the intelligent analysis alarm is partially amplified. .
- the intelligent analysis alarm is triggered when the monitoring platform determines that there is an intrusion object in the monitoring scenario by using an intelligent analysis policy, where the smart analysis policy may be a monitoring platform configured by the user, or may be configured by the user to the client.
- the client is configured to the monitoring platform.
- the step 101 includes the following steps:
- the client receiving and monitoring platform determines the intelligent analysis alarm that is reported when there is an intruding object in the monitoring scenario according to the intelligent analysis policy configured by the user.
- the client adjusts the layout of the user interface window according to the intelligent analysis alarm.
- the monitoring platform decodes the audio and video stream sent by the camera to obtain a real-time video image, and then performs intelligent analysis according to the intelligent analysis strategy based on the decoded real-time video image, if the smart alarm is triggered (ie, when the camera is in the monitoring scene range)
- the smart alarm is triggered (ie, when the camera is in the monitoring scene range)
- an intelligent analysis alarm is generated and at least one trajectory information for triggering the alarm object is recorded, and reported to the client together or separately.
- the client analyzes the alarm according to the received intelligent analysis.
- the window is adjusted to a suitable layout, and the triggering alarm object that triggers the intelligent analysis alarm is locally amplified.
- the intelligent analysis alarm when the camera determines that there is an invasive object in the monitoring scenario by using an intelligent analysis strategy, where the intelligent analysis strategy can be used
- the configuration of the user can also be configured by the user to the client, and then the client is configured to the monitoring platform.
- the monitoring platform is used to configure the intelligent analysis policy to the camera.
- the specific process is the same as the intelligent analysis process of the above monitoring platform. I won't go into details here.
- the camera when the camera performs intelligent analysis, the camera can only be a network camera. If the camera does not perform intelligent analysis, it is only used for the collection of video images, that is, only one camera is deployed in the surveillance scene. It realizes close tracking of moving objects in the monitoring scene and reduces the cost.
- the specific camera can be either a network camera or an analog camera.
- the client locally enlarges at least one triggered alarm object according to at least one movement track information of the triggered alarm object.
- step 102 specifically includes the following steps:
- the client acquires at least one location information of the triggered alarm object from the at least one trajectory information that triggers the alarm object.
- the client After acquiring the intelligent analysis alarm, the client starts the triggering alarm object tracking function, and the at least one trajectory information of the triggered alarm object is acquired by the camera in real time, and the client is from at least one trajectory information that triggers the alarm object.
- the location information of the triggered alarm object is extracted.
- the small window of the client may indicate the specific location of the triggered alarm object through a rectangular frame.
- the client acquires the current real-time image, and matches the real-time image with the location information of the at least one triggered alarm object to find the location of the at least one triggered alarm object in the real-time image.
- the client receives the audio and video stream sent by the camera through the monitoring platform, and the client analyzes the audio and video stream to display the real-time image corresponding to the audio and video stream, and matches the real-time image with at least one location information of the triggered alarm object, thereby finding At least one triggers the location of the alerting object in the live image.
- the client locally enlarges at least one triggering alarm object centering on at least one position of the triggering alarm object in the real-time image.
- the method further includes:
- the client locally enlarges the at least one triggered alarm object according to the at least one trajectory information of the triggered alarm object, so that at least one triggered alarm object is always displayed in the center of the video screen corresponding to the user interface window.
- the client decodes the audio and video stream reported by the camera itself or through the monitoring platform to obtain a real-time video image, and then compares at least one location information of the triggered alarm object with the real-time video image, where the real-time video image is compared. Finding a position of the at least one triggering alarm object in the real-time video image, and then locally amplifying the position of the at least one triggering alarm object in the real-time video image. If the "4+1" window layout is applied, the position of the alarm object in the small pane can be represented by a rectangular box, so that the details around the moving object can be seen, and the image in the rectangular frame can be enlarged and displayed. Easy to view in the large pane above.
- the client continues to acquire the track information of the moving object, so that the client can continue to zoom in on the moving object as a center, and display the partially enlarged image in the upper large pane, so that the moving object is always displayed.
- the user can continue to view the entire monitoring scene according to the video in the lower pane.
- the client simultaneously acquires or receives the trajectory information of multiple triggered alarm objects reported by the monitoring platform or the camera, and simultaneously displays the alarm objects by using multiple panes.
- the center performs a partially enlarged image.
- the client adjusts the user interface window layout by using an intelligent analysis alarm triggered by the client itself or the monitoring platform or the camera to determine an invading object in the monitoring scenario according to the intelligent analysis policy, and Obtaining at least one trajectory information for triggering an alarm object, thereby locally amplifying at least one triggering alarm object according to at least one movement trajectory information of the triggering alarm object, the invention only needs to deploy one camera, thereby avoiding deploying two cameras, thereby causing The cost of wastage also increases the efficiency of local amplification of the triggered alarm object.
- An embodiment of the present invention provides a video monitoring method.
- the video monitoring method specifically includes the following steps:
- the monitoring platform determines that the monitoring scenario is determined according to the intelligent analysis policy configured by the user.
- an intelligent analysis alarm is triggered and reported to the client, and at least one track information that triggers the alarm object is recorded.
- the foregoing intelligent analysis strategies include, but are not limited to, perimeter intrusion detection strategy, squall line detection strategy, sputum detection strategy, and sudden occurrence detection strategy, which are merely exemplified herein.
- the intelligent analysis policy may be a monitoring platform configured by the user, or may be configured by the user to the client, and then configured by the client to the monitoring platform.
- the monitoring platform sends the intelligent analysis alarm and the at least one trajectory information of the triggered alarm object to the client, so that the client adjusts the layout of the user interface window according to the intelligent analysis alarm, and triggers at least one trigger by using at least one movement trajectory information that triggers the alarm object.
- the alarm object is partially enlarged.
- the monitoring platform sends the smart analysis alarm triggered by the intrusion object in the monitoring scenario according to the intelligent analysis strategy, and the track information of the at least one triggered alarm object recorded to the client, so as to Adjusting the layout of the user interface window according to the function analysis alarm on the client, and locally amplifying the at least one triggering alarm object according to the movement trajectory information of the at least one triggering alarm object, since the invention only needs to deploy one camera, thereby avoiding deployment of two The cost of the camera, and the waste of the local amplification of the triggering alarm object is also improved.
- the embodiment of the present invention provides a client.
- the client is used to implement the video monitoring method.
- the client 3 includes: an information acquiring module 31, an interface adjusting module 32, and A partial amplification module 33, wherein:
- the information obtaining module 31 is configured to acquire an intelligent analysis alarm and at least one trajectory information of the triggered alarm object, where the intelligent analysis alarm is triggered by the client or the monitoring platform or the camera determining the invading object in the monitoring scenario through the intelligent analysis strategy. .
- the interface adjustment module 32 is configured to adjust a user interface window layout according to the intelligent analysis alarm acquired by the information acquisition module 31.
- the partial amplification module 33 is configured to perform partial amplification on the at least one triggered alarm object according to the movement trajectory information of the at least one triggering alarm object acquired by the information acquisition module 31.
- the information acquiring module 31 is further configured to continue to acquire at least one track information that triggers the alarm object after the at least one triggered alarm object moves.
- the partial amplification module 33 is further configured to acquire at least one touch according to the information acquisition module 31.
- the trajectory information of the alarm object is partially amplified by the at least one triggering alarm object, so that at least one triggering alarm object is always displayed at the center of the video screen of the corresponding window of the user interface.
- the partial amplification module 33 includes: an information acquisition unit 331 and a partial amplification unit 332, where:
- the information obtaining unit 331 is configured to obtain at least one location information of the triggered alarm object from the trajectory information of the at least one triggered alarm object.
- the information acquiring unit 331 is further configured to acquire a current real-time image, and match the real-time image with the location information of the at least one triggered alarm object to find a location of the at least one triggered alarm object in the real-time image.
- the local amplifying unit 332 is configured to locally enlarge the at least one triggering alarm object centering on the position of the at least one triggering alarm object in the real-time image.
- the intrusion object is triggered.
- the information obtaining module 31 is specifically configured to: when the intrusion object is determined in the monitoring scenario according to the intelligent analysis policy configured by the user, trigger an intelligent analysis alarm, and record at least one trajectory information of the triggered alarm object, so that the interface adjustment module 32 performs the intelligent analysis.
- the alarm adjusts the layout of the user interface window.
- the intrusion object is triggered.
- the information obtaining module 31 is specifically configured to: when the receiving monitoring platform determines, according to the intelligent analysis policy configured by the user, the intelligent analysis alarm that is reported when there is an intrusion object in the monitoring scenario; and the at least one triggered alarm object acquired by the receiving monitoring platform after generating the intelligent analysis alarm
- the trajectory information is used to facilitate the interface adjustment module 32 to adjust the user interface window layout according to the intelligent analysis alarm.
- the client provided by the embodiment of the present invention adjusts the layout of the user interface window according to the intelligent analysis alarm triggered by the client itself or the monitoring platform or the camera according to the intelligent analysis policy, when the intrusion object is determined in the monitoring scenario, and obtains At least one trajectory information that triggers an alarm object, thereby locally amplifying at least one triggering alarm object according to at least one movement trajectory information of the triggering alarm object, and the invention only needs to deploy one The camera, thereby avoiding the cost of deploying two cameras, also increases the efficiency of local amplification of the triggered alarm object.
- the embodiment of the present invention provides a monitoring platform.
- the monitoring platform is used to implement the video monitoring method.
- the monitoring platform 4 includes: an information acquiring module 41 and an information sending module 42, where:
- the information obtaining module 41 is configured to trigger an intelligent analysis alarm when the intrusion object is determined in the monitoring scenario according to the intelligent analysis policy configured by the user, and record at least one track information that triggers the alarm object.
- the information sending module 42 is configured to send the smart analysis alarm acquired by the information acquiring module 41 and the at least one track information of the triggered alarm object to the client, so that the client adjusts the user interface window layout according to the intelligent analysis alarm, and passes at least one triggered alarm.
- the movement trajectory information of the object locally enlarges at least one of the triggering alarm objects.
- the monitoring platform provided by the embodiment of the present invention, the monitoring platform sends the intelligent analysis alarm triggered by the intrusion object in the monitoring scenario according to the intelligent analysis strategy, and the track information of the at least one triggered alarm object recorded to the client is sent to the client, so as to facilitate
- the client adjusts the layout of the user interface window according to the function analysis alarm, and locally enlarges at least one triggering alarm object according to the movement trajectory information of the at least one triggering alarm object. Since the present invention only needs to deploy one camera, thereby avoiding deploying two The cost of the camera, which is also wasted, also increases the efficiency of local amplification of the object that triggers the alarm.
- the client provided by the embodiment of the present invention, as shown in FIG. 7, the client 5 includes: a processor 51 and a receiver 52, wherein:
- the processor 51 is configured to acquire an intelligent analysis alarm and at least one trajectory information of the triggered alarm object, and adjust a user interface window layout according to the intelligent analysis alarm, where the intelligent analysis alarm is monitored by the client or the monitoring platform or the camera through an intelligent analysis strategy. Triggered when an invading object is determined in the scene.
- the processor 51 is further configured to perform partial amplification on the at least one triggered alarm object according to the movement trajectory information of the at least one triggered alarm object.
- the processor 51 is further configured to: after the at least one triggered alarm object moves, obtain at least one trajectory information that triggers the alarm object; and configured to perform, according to the trajectory information of the at least one triggered alarm object, the at least one triggered alarm object. Partial magnification, so that One less triggered alarm object is always displayed in the center of the video screen corresponding to the user interface window.
- the processor 51 is specifically configured to: acquire at least one location information of the triggered alarm object from the trajectory information of the at least one triggered alarm object; acquire the current real-time image, and obtain the real-time image and the location information of the at least one triggered alarm object Performing a match to find a position of at least one triggering alarm object in the real-time image; and locally amplifying at least one triggering alarm object centering on at least one position of the triggering alarm object in the real-time image.
- the intrusion object is triggered.
- the processor 51 is further configured to: when the intrusion object is determined in the monitoring scenario according to the intelligent analysis policy configured by the user, trigger an intelligent analysis alarm, and record at least one track information that triggers the alarm object.
- the processor 51 is further configured to adjust a user interface window layout according to the intelligent analysis alarm.
- the intelligent analysis alarm is triggered by the monitoring platform in the monitoring scene through the intelligent analysis strategy, the intrusion object is triggered.
- the receiver 52 is configured to receive, by the monitoring platform, an intelligent analysis alarm that is reported when there is an intruding object in the monitoring scenario according to an intelligent analysis policy configured by the user.
- the receiver 52 is further configured to receive, by the monitoring platform, at least one trajectory information of the triggered alarm object acquired after the smart analysis alarm is generated.
- the processor 51 is further configured to adjust a user interface window layout according to the intelligent analysis alarm intelligent analysis alarm.
- the client provided by the embodiment of the present invention adjusts the layout of the user interface window according to the intelligent analysis alarm triggered by the client itself or the monitoring platform or the camera according to the intelligent analysis policy, when the intrusion object is determined in the monitoring scenario, and obtains At least one trajectory information for triggering an alarm object, thereby locally amplifying at least one triggering alarm object according to at least one movement trajectory information of the triggering alarm object, the invention only needs to deploy one camera, thereby avoiding deployment of two cameras, thereby causing Cost waste also increases the efficiency of local amplification of the triggered alarm object.
- the monitoring platform 6 includes: a transmitter 61 and a processor 62, where: The processor 62 is configured to trigger an intelligent analysis alarm when the intrusion object is determined in the monitoring scenario according to the intelligent analysis policy configured by the user, and record at least one track information that triggers the alarm object.
- the transmitter 61 is configured to send the smart analysis alarm and the at least one trajectory information of the triggered alarm object to the client, so that the client adjusts the user interface window layout according to the intelligent analysis alarm, and at least one movement trajectory information that triggers the alarm object is at least A triggering alarm object is locally amplified.
- the monitoring platform provided by the embodiment of the present invention, the monitoring platform sends the intelligent analysis alarm triggered by the intrusion object in the monitoring scenario according to the intelligent analysis strategy, and the track information of the at least one triggered alarm object recorded to the client is sent to the client, so as to facilitate
- the client adjusts the layout of the user interface window according to the intelligent analysis alarm, and locally enlarges at least one triggered alarm object according to the movement trajectory information of the at least one triggered alarm object. Since the present invention only needs to deploy one camera, thereby avoiding deployment of two The cost of the camera, which is also wasted, also increases the efficiency of local amplification of the object that triggers the alarm.
- the video surveillance system 7 includes: a client 71, a monitoring platform 72, and a camera 73.
- the client 71 is any of the clients described above, and the monitoring is performed.
- the platform 72 is any of the above monitoring platforms, and the camera 73 is any of the above cameras.
- the video surveillance system is divided into three parts: a client, a monitoring platform, and a camera.
- the client and the monitoring platform may be considered for integration.
- the client adjusts the user interface window layout by using an intelligent analysis alarm triggered by the client itself or the monitoring platform or the camera to determine an invading object in the monitoring scenario according to the intelligent analysis policy, and Obtaining at least one trajectory information for triggering an alarm object, thereby locally amplifying at least one triggering alarm object according to at least one trajectory information of the triggering alarm object, since the invention only needs to deploy one camera, thereby avoiding deploying two cameras, The resulting cost waste also increases the efficiency of local amplification of the triggered alarm object.
- the foregoing storage medium includes: a medium that can store program codes, such as a ROM, a RAM, a magnetic disk, or an optical disk.
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Theoretical Computer Science (AREA)
- Human Computer Interaction (AREA)
- Signal Processing (AREA)
- Closed-Circuit Television Systems (AREA)
- Alarm Systems (AREA)
- Burglar Alarm Systems (AREA)
- Emergency Alarm Devices (AREA)
Abstract
Description
Claims
Priority Applications (4)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| JP2016515623A JP6240968B2 (ja) | 2013-05-28 | 2014-05-09 | ビデオ監視方法、ビデオ監視装置、およびビデオ監視システム |
| KR1020157032449A KR101743386B1 (ko) | 2013-05-28 | 2014-05-09 | 비디오 모니터링 방법, 장치 및 시스템 |
| EP14803365.7A EP2966852B1 (en) | 2013-05-28 | 2014-05-09 | Video monitoring method, device and system |
| US14/943,468 US10412345B2 (en) | 2013-05-28 | 2015-11-17 | Video surveillance method, apparatus and system |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201310203846.0 | 2013-05-28 | ||
| CN201310203846.0A CN104184986B (zh) | 2013-05-28 | 2013-05-28 | 一种视频监控方法、装置及系统 |
Related Child Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US14/943,468 Continuation US10412345B2 (en) | 2013-05-28 | 2015-11-17 | Video surveillance method, apparatus and system |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2014190851A1 true WO2014190851A1 (zh) | 2014-12-04 |
Family
ID=51965686
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2014/077115 Ceased WO2014190851A1 (zh) | 2013-05-28 | 2014-05-09 | 一种视频监控方法、装置及系统 |
Country Status (6)
| Country | Link |
|---|---|
| US (1) | US10412345B2 (zh) |
| EP (1) | EP2966852B1 (zh) |
| JP (1) | JP6240968B2 (zh) |
| KR (1) | KR101743386B1 (zh) |
| CN (1) | CN104184986B (zh) |
| WO (1) | WO2014190851A1 (zh) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN109873990A (zh) * | 2019-03-13 | 2019-06-11 | 武汉大学 | 一种基于计算机视觉的矿山非法开采预警方法 |
Families Citing this family (13)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN106170987A (zh) * | 2015-01-30 | 2016-11-30 | 华为技术有限公司 | 视频通信中放大视频图像的方法和终端 |
| CN105611248A (zh) * | 2015-12-25 | 2016-05-25 | 北京奇虎科技有限公司 | 基于摄像机的监控方法、装置及系统 |
| CN107580228B (zh) * | 2017-09-15 | 2020-12-22 | 威海元程信息科技有限公司 | 一种监控视频处理方法、装置及设备 |
| CN110798654B (zh) * | 2018-08-01 | 2021-12-10 | 华为技术有限公司 | 软件定义摄像机的方法、系统及摄像机 |
| US10942267B2 (en) * | 2019-06-17 | 2021-03-09 | Advanced New Technologies Co., Ltd. | Video object processing |
| CN110381293A (zh) * | 2019-06-18 | 2019-10-25 | 平安国际智慧城市科技股份有限公司 | 视频监控方法、装置及计算机可读存储介质 |
| CN110223474A (zh) * | 2019-07-04 | 2019-09-10 | 无锡睿勤科技有限公司 | 一种智能监控报警方法、系统及储存介质 |
| CN110225314A (zh) * | 2019-07-08 | 2019-09-10 | 浙江大华技术股份有限公司 | 一种事件联动的视频显示方法及装置 |
| CN111669652A (zh) * | 2020-06-23 | 2020-09-15 | 深圳创维-Rgb电子有限公司 | 一种视频监控告警方法和电视机 |
| CN112004053B (zh) * | 2020-07-20 | 2022-08-16 | 浙江大华技术股份有限公司 | 监控图像电子放大的方法、装置和计算机设备 |
| CN112907889B (zh) * | 2021-01-29 | 2023-03-31 | 树根互联股份有限公司 | 视频中信息的展示方法、装置、电子设备以及存储介质 |
| CN113612970B (zh) * | 2021-07-30 | 2024-07-05 | 国电汉川发电有限公司 | 一种面向工业监控视频的安全事件智能分析管控平台 |
| CN114666403A (zh) * | 2022-02-18 | 2022-06-24 | 国政通科技有限公司 | 一种基于目标轨迹的警务信息推送系统及方法 |
Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101123722A (zh) * | 2007-09-25 | 2008-02-13 | 北京智安邦科技有限公司 | 全景视频智能监控方法和系统 |
| CN102291569A (zh) * | 2011-07-27 | 2011-12-21 | 上海交通大学 | 双摄像机自动协同多目标鹰眼观测系统及其观测方法 |
Family Cites Families (12)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP4208596B2 (ja) * | 2003-02-14 | 2009-01-14 | キヤノン株式会社 | 操作端末装置、そのカメラ設定方法およびプログラム |
| US7421727B2 (en) * | 2003-02-14 | 2008-09-02 | Canon Kabushiki Kaisha | Motion detecting system, motion detecting method, motion detecting apparatus, and program for implementing the method |
| US20100013917A1 (en) * | 2003-08-12 | 2010-01-21 | Keith Hanna | Method and system for performing surveillance |
| US20050104958A1 (en) * | 2003-11-13 | 2005-05-19 | Geoffrey Egnal | Active camera video-based surveillance systems and methods |
| US20060098729A1 (en) * | 2004-11-09 | 2006-05-11 | Lien-Chieh Shen | Smart image processing CCTV camera device and method for operating same |
| JP4470759B2 (ja) * | 2005-02-28 | 2010-06-02 | ソニー株式会社 | 情報処理システム、情報処理装置および情報処理方法、プログラム、並びに記録媒体 |
| US8284254B2 (en) * | 2005-08-11 | 2012-10-09 | Sightlogix, Inc. | Methods and apparatus for a wide area coordinated surveillance system |
| TWI303938B (en) * | 2005-10-05 | 2008-12-01 | Avermedia Information Inc | Video surveillance system |
| KR100954375B1 (ko) * | 2008-05-06 | 2010-04-26 | (주) 티앤엑스시스템즈 | 지능형 영상 감시 시스템 |
| JP4715909B2 (ja) * | 2008-12-04 | 2011-07-06 | ソニー株式会社 | 画像処理装置及び方法、画像処理システム、並びに、画像処理プログラム |
| US9082278B2 (en) * | 2010-03-19 | 2015-07-14 | University-Industry Cooperation Group Of Kyung Hee University | Surveillance system |
| JP5649429B2 (ja) * | 2010-12-14 | 2015-01-07 | パナソニックIpマネジメント株式会社 | 映像処理装置、カメラ装置および映像処理方法 |
-
2013
- 2013-05-28 CN CN201310203846.0A patent/CN104184986B/zh active Active
-
2014
- 2014-05-09 JP JP2016515623A patent/JP6240968B2/ja active Active
- 2014-05-09 EP EP14803365.7A patent/EP2966852B1/en active Active
- 2014-05-09 WO PCT/CN2014/077115 patent/WO2014190851A1/zh not_active Ceased
- 2014-05-09 KR KR1020157032449A patent/KR101743386B1/ko active Active
-
2015
- 2015-11-17 US US14/943,468 patent/US10412345B2/en active Active
Patent Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101123722A (zh) * | 2007-09-25 | 2008-02-13 | 北京智安邦科技有限公司 | 全景视频智能监控方法和系统 |
| CN102291569A (zh) * | 2011-07-27 | 2011-12-21 | 上海交通大学 | 双摄像机自动协同多目标鹰眼观测系统及其观测方法 |
Non-Patent Citations (1)
| Title |
|---|
| See also references of EP2966852A4 * |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN109873990A (zh) * | 2019-03-13 | 2019-06-11 | 武汉大学 | 一种基于计算机视觉的矿山非法开采预警方法 |
Also Published As
| Publication number | Publication date |
|---|---|
| EP2966852A1 (en) | 2016-01-13 |
| CN104184986A (zh) | 2014-12-03 |
| KR20150143686A (ko) | 2015-12-23 |
| US10412345B2 (en) | 2019-09-10 |
| CN104184986B (zh) | 2018-06-05 |
| JP2016526338A (ja) | 2016-09-01 |
| US20160080703A1 (en) | 2016-03-17 |
| JP6240968B2 (ja) | 2017-12-06 |
| EP2966852B1 (en) | 2017-07-26 |
| KR101743386B1 (ko) | 2017-06-02 |
| EP2966852A4 (en) | 2016-05-25 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| WO2014190851A1 (zh) | 一种视频监控方法、装置及系统 | |
| US20230300466A1 (en) | Video surveillance system and video surveillance method | |
| JP2025124846A (ja) | カメラの撮影範囲を制御するためのプログラム、方法及び装置 | |
| JP4629090B2 (ja) | カメラ・タンパリング検出 | |
| CN101123722B (zh) | 全景视频智能监控方法和系统 | |
| CN100504942C (zh) | 智能视频监控设备模组和系统及其监控方法 | |
| US20100231714A1 (en) | Video pattern recognition for automating emergency service incident awareness and response | |
| CN101615295B (zh) | 图像处理系统和图像处理方法 | |
| US20110128150A1 (en) | System and method for electronic surveillance | |
| US20200175838A1 (en) | Eyeglasses-type wearable terminal, control method thereof, and control program | |
| JP2018508135A (ja) | ビデオトリガ解析 | |
| WO2017161880A1 (zh) | 一种区域监控报警系统及报警方法 | |
| JP6693509B2 (ja) | 画像処理装置、画像処理方法、および画像処理システム | |
| CN107786838B (zh) | 视频监控方法、装置及系统 | |
| KR20170070713A (ko) | 드론을 이용한 감시 시스템 | |
| CN100531372C (zh) | 摄像机的移动侦测报警和数字放大联动方法 | |
| US8627470B2 (en) | System and method for wireless network and physical system integration | |
| KR102421043B1 (ko) | 영상처리장치 및 그 장치의 구동방법 | |
| KR20120068150A (ko) | 객체 추적 시스템 및 그 방법 | |
| JP2013005336A (ja) | 監視装置、警備システム及び監視装置用プログラム | |
| KR20220003779A (ko) | 영상 검색 장치 및 이를 포함하는 네트워크 감시 카메라 시스템 | |
| KR100902275B1 (ko) | 지능형 보안방범을 위한 폐쇄회로티브이 시스템 및 그 방법 | |
| JP2005346545A (ja) | 監視装置及びプログラム | |
| KR101634622B1 (ko) | 위치정보 및 cctv를 이용한 통합관제시스템 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 14803365 Country of ref document: EP Kind code of ref document: A1 |
|
| REEP | Request for entry into the european phase |
Ref document number: 2014803365 Country of ref document: EP |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 2014803365 Country of ref document: EP |
|
| ENP | Entry into the national phase |
Ref document number: 20157032449 Country of ref document: KR Kind code of ref document: A |
|
| ENP | Entry into the national phase |
Ref document number: 2016515623 Country of ref document: JP Kind code of ref document: A |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |