CN106251544A - A kind of intrusion alarm method based on Android intelligent and alarm device - Google Patents

A kind of intrusion alarm method based on Android intelligent and alarm device Download PDF

Info

Publication number
CN106251544A
CN106251544A CN201610638102.5A CN201610638102A CN106251544A CN 106251544 A CN106251544 A CN 106251544A CN 201610638102 A CN201610638102 A CN 201610638102A CN 106251544 A CN106251544 A CN 106251544A
Authority
CN
China
Prior art keywords
image
pixel
value
maximum
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610638102.5A
Other languages
Chinese (zh)
Inventor
陈万忠
魏庭松
兰兰
李晶
黄思慧
李明阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jilin University
Original Assignee
Jilin University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jilin University filed Critical Jilin University
Priority to CN201610638102.5A priority Critical patent/CN106251544A/en
Publication of CN106251544A publication Critical patent/CN106251544A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19602Image analysis to detect motion of the intruder, e.g. by frame subtraction
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/01Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
    • G08B25/08Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using communication transmission lines

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Image Analysis (AREA)

Abstract

The invention discloses a kind of intrusion alarm method based on Android intelligent and alarm device, device is: web camera, Moving target detection module, power module, DSP, alarm module, gsm module, Ethernet and Android intelligent client, and alarm method is: be transferred to Android intelligent client after the Video Image Processing in monitoring region;Video image in monitoring region is moved target detection, it is judged that whether monitoring region has object to invade;Characteristics of human body is identified, it may be judged whether need to report to the police;Detection is found to have human body and invades then device startup alarm module and gsm module, and to invasion, personnel frighten;Send note simultaneously and mail reminds user in time to Android intelligent client;Video image in monitoring region is carried out recording preservation and reporting to the police by user by Android intelligent client;This apparatus structure is simple, low cost, and method is simple to operate, warning accuracy rate high, is suitable to popularize.

Description

A kind of intrusion alarm method based on Android intelligent and alarm device
Technical field
The invention belongs to smart mobile phone technical field of safety protection, relate to a kind of invasion based on Android intelligent Alarm method and alarm device.
Background technology
In recent years, along with the development of mobile communication technology, mobile communication network has had coverage rate widely, intelligence hands Machine have also been obtained universal.And along with living standard constantly improves, the security protection consciousness of people is stronger, wherein family's peace Anti-concept is increasingly accepted by people.But traditional video monitoring system realizes long-range monitoring and mainly uses wired side Method, including laying the method for special line, utilizing the method etc. of telephone wire, playback terminal is PC.Although these methods can be real Existing monitoring remote video, but there are some problems, special line deployment cost is high, and supervisor is limited to position, and telephone wire passes Defeated speed is slow, is almost difficult to real-time video monitoring, and video monitoring system based on PC, its video compress and solution Pressure uses video frequency collection card based on PC so that the collection of video signal, compress with communicate complex, stability and reliably Property is the highest, and hardware investment cost is the biggest.And PC operation complexity, need personal management, also there is no the function of automatic alarm, property Valency ratio is extremely low, is not suitable for household safety-protection.It is thus desirable to relate to a kind of simple in construction, cost is relatively low, transmission is convenient, carry report The monitoring and alarming system of the functions such as police.
It addition, in terms of mobile target body detection algorithm, most monitoring technology only simple have employed currently Image and background image do difference process, consider less to the situation of background change, and fail to considering that in family, house pet is to regarding The interference in screen monitoring region so that system has the highest rate of false alarm.
Summary of the invention
The technical problem to be solved is to overcome conventional art to have that portability is poor, cost performance is low, is unfavorable for The problem that intrusion alarm is extensively applied and existing mobile target body detection method is not enough, it is provided that a kind of based on Android The intrusion alarm method of smart mobile phone and alarm device, the method and device portability is strong, cost performance is high, can be under indoor environment Effectively detect invasion human body target, and can well process owing to background light drastic change and house pet are to monitoring region detection band The interference come.
For solving above-mentioned technical problem, the present invention adopts the following technical scheme that realization:
A kind of intrusion alarm method based on Android intelligent, it is characterised in that step is as follows:
Step one, web camera are by the video image acquisition in monitoring region to DSP and right Video image in the monitoring region being collected carries out video image compression process, and the video image after compression is passed through Ethernet It is transferred to Android intelligent client;
In step 2, DSP, step one collection is monitored in region by Moving target detection module Video image moves target detection, and the change using Three image difference to calculate the video image in monitoring region judges prison Whether control region has object to invade;
Moving target detection module in step 3, DSP, according to monitoring regarding in region in step 2 Frequently the change of image, by being identified characteristics of human body, it may be judged whether needs to report to the police;If be detected that have human body to invade, then Alarm module is started by DSP;Without detecting that human body is invaded, then DSP Alarm module will not be started, and continuation is carried out video acquisition to monitoring region by web camera;
If step 4 is found to have human body by the detection of Moving target detection module and invades, then device starts alarm module And gsm module;Invasion personnel will be frightened by alarm module by audible-visual annunciator and voice broadcast module;Start warning mould While block, transmission note and mail are reminded user to Android intelligent client by gsm module in time;User receives After information and mail reminder, by the monitoring region that monitoring client web camera is gathered by Android intelligent client Video image information carry out record preserve and report to the police.
Further technical scheme includes:
Described in step one to be collected monitoring region in video image carry out video image compression process, select Video image after compression, as the compression standard of video data, is transferred to Android intelligence by Ethernet by MPEG-4 standard RTP/RTCP protocol stack can be used to realize by cell-phone customer terminal.
The detailed process whether judging described in step 2 monitors region and have object to invade is:
(1) use Three image difference that the mobile target entering monitoring region is monitored, take three two field pictures continuously, by phase Two adjacent two field pictures are the poorest, then by do the image of after the recovery respectively through gaussian filtering, maximum between-cluster variance threshold method, patrol Volume computing and morphology operations obtain the bianry image of mobile target neighbor frame difference;
If Ak-1、Ak、Ak+1It is respectively this monitoring system video image in the monitoring region collected the obtained The continuous picture of k-1, k, k+1 frame, it is thus achieved that adjacent image do difference, then:
Bk=| Ak-Ak-1|
Bk+1=| Ak+1-Ak|
For reducing noise to image B derived abovekWith image Bk+1Impact, by respectively to image BkWith image Bk+1Adopt Gaussian filtering process is carried out by 3*3 template, i.e. by by each pixel in a 3*3 template scanogram, true by template In fixed neighborhood, the weighted average gray value of pixel goes the value of alternate template central pixel point, thus the noise that is eliminated is smooth Image CkAnd Ck+1, the neighborhood definition of the most each pixel is a circle centered by the coordinate figure of described each pixel The set of point on inside or border;
If threshold value TkBy image CkBeing divided into prospect i.e. target, and background two class, wherein prospect is image CkMiddle pixel value is big In equal to threshold value TkPixel, background is image CkMiddle pixel value is less than threshold value TkPixel, even image CkAt coordinate (x, y) the pixel C at placek(Kx,Ky)≥Tk, then Ck(Kx,Ky) it is prospect, if image CkAt coordinate (x, y) the pixel C at placek (Kx,Ky)<Tk, then Ck(Kx,Ky) it is background, and threshold value TkMake the variance between this two class of foreground and background maximum;If threshold value Tk+1By image Ck+1Being divided into prospect i.e. target, and background two class, wherein prospect is image Ck+1Middle pixel value is more than or equal to threshold value Tk+1Pixel, background is image Ck+1Middle pixel value is less than threshold value TkPixel, even image Ck+1At coordinate (x, y) place Pixel Ck+1(K+1x,K+1y)≥Tk+1, then Ck+1(K+1x,K+1y) it is prospect, if image Ck+1At coordinate (x, y) picture at place Vegetarian refreshments Ck+1(K+1x,K+1y)<Tk+1, then Ck+1(K+1x,K+1y) it is background, and threshold value Tk+1Make this two class of foreground and background it Between variance maximum;Then Tk、Tk+1It is respectively image Ck、Ck+1Optimal threshold, the calculating process of optimal threshold is as follows:
If image CIFor the I-frame video image in the monitoring region that web camera collects, wherein CIComprise L ash Degree level 0,1 ..., L-1}, gray value be the pixel number of i be ni, then total pixel isGray scale is that the pixel of i goes out Existing probability isEntire image is divided into target M by thresholding t1With background M2Two classes, the then meter of the inter-class variance δ of this two class Calculation formula is:
&delta; I 2 ( t ) = p 0 * p 1 ( u 1 - u 2 ) 2
In formula,WithIt is respectively target M1With background M2The probability that two classes occur; WithIt is respectively target M1With background M2The gray average of two classes, the optimal threshold of segmentation is that inter-class variance calculates public affairs Formula takes thresholding t value during maximum, is designated as TI:
T I = A r g M a x 0 &le; t &le; L - 1 &delta; I 2 ( t )
Image C is tried to achieve by above-mentioned optimal threshold computational methodsk、Ck+1Optimal threshold Tk、Tk+1, then use optimal threshold Value Tk、Tk+1Respectively to image Ck、Ck+1Binaryzation obtains prospect bianry image Dk、Dk+1, it is maximum between-cluster variance threshold method, uses Formula is expressed as follows:
Dk=threshold (| Ck|)
Dk+1=threshold (| Ck+1|)
(2) the prospect bianry image D that will obtaink、Dk+1Carry out logic "and" operation, wherein image DkIn prospect and image Dk+1In prospect carry out AND operation after the foreground image that obtains be image AkThe shape profile of middle moving target, formula table Reach for:
Ek=Dk And Dk+1
Due to effect of noise, image Dk、Dk+1Image E obtained after carrying out logical operationskBorder is the most not perfectly flat Sliding, foreground area has some noise holes, and is studded with some little noise objects on background area, is opened by morphologic Computing, i.e. after excessive erosion reflation thus remove the noise hole in bianry image, obtain the image F after de-noisingk, wherein Expansion is each pixel using structural element G scanogram, and the bianry image covered with it does OR operation;Corrosion is to use Each pixel of structural element G scanogram, and the bianry image covered with it does AND-operation;Fortune is opened in the morphology of image Calculation formula is as follows:
(3) by using connection eight neighborhood rule, it is thus achieved that image FkIn the minimum abscissa value in largest connected region, maximum Abscissa value, minimum ordinate value and maximum ordinate value, thus obtain the mobile target image of red rectangle collimation mark noteReal Existing step is as follows:
1) in two dimensional image, it is assumed that have the pixel that z is adjacent around target pixel points, wherein z≤8, if this pixel In z pixel of gray scale and this, the gray value of some pixel Q is equal, then claim this pixel and Q to have connectedness;Connection eight is adjacent Territory rule is to choose object pixel all of adjacent picture in two-dimensional space, be upper and lower, left and right, upper left, upper right, lower-left, Eight, bottom right neighbor pixel;By using connection eight neighborhood rule to image FkIn each pixel label is set, To image FkThe connected component labeling matrix of pixel, label initial value is all set to 0;If image FkPixel (Kx,Ky), its connection Region labeling is label (Kx,Ky), wherein image FkPixel (Kx,Ky) eight neighborhood coordinate be (Kx-1,Ky)、(Kx+1,Ky)、 (Kx,Ky-1)、(Kx,Ky+1)、(Kx-1,Ky-1)、(Kx-1,Ky+1)、(Kx+1,Ky-1) and (Kx+1,Ky+1);
2) first from image FkThe upper left corner start progressive scan, be i.e. from storage image Fk0 row 0 of the matrix of pixel arranges Starting progressive scan, from top to bottom, every a line scans from left to right;When scanning image FkPixel (Kx,Ky) time, sweep Retouch and complete (Kx,Ky) the adjacent pixel in the top of pixel and the left side, obtain label (Kx-1,Ky)、label (Kx-1,Ky-1)、label(Kx-1,Ky+1) and label (Kx,Ky-1) value;
If image FkCoordinate is (Kx,Ky) place's pixel is foreground pixel point, and the value of its pixel is adjacent pixel It is worth identical, then it is assumed that these pixels are connections, and wherein foreground pixel point is image FkThe pixel of middle composition prospect;If picture Vegetarian refreshments (Kx,Ky) it is adjacent pixel (Kx-1,Ky)、(Kx-1,Ky-1)、(Kx-1,Ky+1) and (Kx,Ky-1) connection, then label (Kx,Ky) value equal to label (Kx-1,Ky)、label(Kx-1,Ky-1)、label(Kx-1,Ky+1) and label (Kx,Ky-1In the middle of) The label that value is minimum, and it is vertical to update the minimum abscissa value of this connected region, maximum abscissa value, minimum ordinate value and maximum Coordinate figure: minimum abscissa value minxnumber, maximum abscissa value maxxnumber, minimum ordinate value minynumberIndulge with maximum Coordinate figure maxynumber, wherein number is the label of this connected region;
If image FkIn be numbered the connected region of number, if the scanning of this connected region is to pixel (Kx,Ky) time, The minimum abscissa value of this connected region recorded, maximum abscissa value, minimum ordinate value and maximum ordinate value: minimum Abscissa value minxnumber, maximum abscissa value maxxnumber, minimum ordinate value minynumberWith maximum ordinate value maxynumber, and pixel (Kx,Ky) be adjacent pixel connection, then update the minimum abscissa value of this connected region, maximum Abscissa value, minimum ordinate value and maximum ordinate value, if now Kx≥maxxnumber, then maxxnumber=KxAnd minxnumberValue keeps constant, if minxnumber<Kx<maxxnumber, then minxnumberAnd maxxnumberValue all keeps constant;If Kx≤minxnumber, then minxnumber=KxAnd maxxnumberValue keeps constant;If now Ky≥maxynumber, then maxynumber =KyAnd minynumberValue keeps constant, if minynumber<Ky<maxynumber, then minynumberAnd maxynumberValue all keeps not Become;If Ky≤minynumber, then minynumber=KyAnd maxynumberValue keeps constant;
If image FkPixel (Kx,Ky) and the pixel (K of its topx-1,Ky)、(Kx-1,Ky-1)、(Kx-1,Ky+1) Pixel (K with the left sidex,Ky-1) do not connect, and image FkAt pixel (Kx,Ky) place is foreground pixel point, then will increase Add a new connected region;I.e. enumerator number '=number+1 is as pixel (Kx,Ky) connection label, i.e. label(Kx,Ky)=number ', and record the minimum abscissa value of this connected region, maximum abscissa value, minimum ordinate value With maximum ordinate value: minimum abscissa value minxnumber′, maximum abscissa value maxxnumber′, minimum ordinate value minynumber′With maximum ordinate value maxynumber′Even, minxnumber′=Kx、maxxnumber′=Kx、minynumber'=Ky And maxynumber'=Ky;If image FkIt is (K at coordinatex,Ky) place's pixel is background pixel point, then continue to scan on the next one Point, wherein background pixel point is image FkThe pixel of middle composition background;
3) according to process 2) described in scanogram FkIn all pixels, if scanned, then perform process 4);
4) from left to right, from top to bottom traversing graph as FkIn all different connected regions, according to record all differences The minimum abscissa value of connected region, maximum abscissa value, minimum ordinate value and maximum ordinate value: minxnumber、 maxxnumber、minynumberAnd maxynumberCalculate the height H of each connected regionnumberWith width Wnumber, it may be assumed that
Hnumber=maxxnumber-minxnumber
Wnumber=maxynumber-minynumber
Will height HnumberWith width WnumberProduct as the similar area i.e. S of each connected regionnumber=Hnumber* Wnumber, by the area S of relatively each connected regionnumber, by area maximum MAX (Snumber) connected region be designated as maximum fortune Dynamic model block, preserves the minimum abscissa value of largest motion module, maximum abscissa value, minimum ordinate value and maximum ordinate Value: MAXS (minxnumber)、MAXS(maxxnumber)、MAXS(minynumber) and MAXS (maxynumber);Due to image FkIn Largest motion module be by above-mentioned steps process image AkObtained by, therefore image AkIn largest motion module and figure As FkIn largest motion module coordinate information identical, with minimum and maximum abscissa column, the minimum of largest motion module It is expert at maximum ordinate and is formed a height of MAXS (maxxnumber)-MAXS(minxnumber), a width of MAXS (maxynumber)- MAXS(minynumber) rectangle frame, i.e. four coordinate points of rectangle frame are (MAXS (minxnumber),MAXS(minynumber)), (MAXS(minxnumber),MAXS(maxynumber)), (MAXS (maxxnumber),MAXS(minynumber)), (MAXS (maxxnumber),MAXS(maxynumber)), the rectangle frame that order obtains is shown in red;With red rectangle frame by image AkIn Largest motion module frame is selected, and then obtains the mobile target image with red rectangle collimation mark noteThen judge that monitoring region has Object is invaded.
Described in step 3 by characteristics of human body's recognition methods judge whether need report to the police detailed process be:
If monitoring region has object to invade, set different threshold decision conditions, it is determined that mobile target imageIn red Whether color rectangle frame meets characteristics of human body, if met, is considered human body, needs to report to the police;If not meeting characteristics of human body, then Can judge whether to report to the police according to initial setting of user;If the mobile target image with red rectangle collimation mark noteIn, mark A length of l of the red rectangle frame of notek, a width of bk, work as bkMore than lk, then it is assumed that intrusion object is upright;To people from uprightly Moving object in distinguish, characteristics of human body can be passed through, characteristics of human body's recognition methods of the present invention is described as follows:
If mobile target imageIn, a length of l of the red rectangle frame of labellingk, a width of bk, then lk/bkCan be approximated to be into Invade the length-width ratio of object, lk*bkCan be approximated to be the area of intrusion object;If lk/bkLess than θkOr more than βk, or lk*bk Less than αkOr more than εkTime, it not the most human body, and if only if θk≤lk/bk≤βkAnd αk≤lk*bk≤εkTime, it is judged that for human body Monitoring instruction region;Wherein, threshold θk、βk、αkAnd εkValue by IP Camera with monitoring region distance determine, if net The distance in network video camera and monitoring region is when H rice distance, and the monitoring range of web camera is long LAk, wide KAk;Therefore lk/bk Lower proportion ratio threshold θkIt is set asUpper limit proportion threshold value βkIt is set as 7;lk*bkLower limit area threshold αkIt is set as current Monitoring image areaUpper limit area threshold εkIt is set as current monitor image area
If having human body to invade by detection, then start alarm module by DSP, without inspection Measure human body invasion, then DSP will not start alarm module, and monitoring region is entered by web camera by continuation Row video acquisition.
A kind of intrusion alarm device based on Android intelligent, it is characterised in that including: web camera, movement Module of target detection, power module, DSP, alarm module, gsm module, Ethernet and Android intelligence Cell-phone customer terminal, web camera video acquisition output port is connected with DSP video acquisition input port, Power module output port of power source is connected with web camera power input port, alarm module, gsm module, power module, shifting Moving-target detection module electrically connects with DSP respectively, gsm module and Android intelligent client without Line communication connects, and the RJ-45 Ethernet interface of web camera is connected with Ethernet by netting twine, Android intelligent visitor The video information that family end can be gathered by ethernet access web camera.
Described alarm module includes the audible-visual annunciator being made up of flash lamp and speaker and can record according to user's request Enter the voice broadcast module of different phonetic;
Compared with prior art the invention has the beneficial effects as follows:
In the present invention, Android intelligent client is responsible for receiving, playing and record monitoring remote video data, compares In traditional long-distance monitoring method, it is not necessary to install independent PC or hardware decoder material, can be by Android intelligent client End unites two into one with intrusion alarm monitoring system, and smart mobile phone is more and more universal, makes average family spend 650 to 1500 yuan i.e. Can realize monitoring instruction, therefore the present invention has feature cheap and easy for installation, is mainly used in family or office etc. Report to the police in place.
Alarm method of the present invention be utilize Android intelligent client to be monitored, monitoring of a recorded programme region Video, and by audible-visual annunciator and voice broadcast module deterrence invader, this illegal invasion card contributing to preserving invader According to.
Android intelligent client is handy to carry about, and therefore user can receive from invasion anywhere or anytime The warning message of monitoring system;When warning system is started working, if having object to move in the region of network shooting machine monitoring Dynamic and system judges it is human body, then can send information and mail by designated telephone and mailbox, thus reaches to report to the police and connect in real time The purpose received, this intrusion alarm method and device has simple to operate, real-time and that warning accuracy rate is high feature.
Accompanying drawing explanation
The present invention is further illustrated below in conjunction with the accompanying drawings:
Fig. 1 is the structural schematic block diagram of a kind of intrusion alarm device based on Android intelligent of the present invention.
Fig. 2 is the flow chart of a kind of intrusion alarm method based on Android intelligent of the present invention.
Fig. 3 is the alarm module signal of a kind of intrusion alarm device based on Android intelligent of the present invention Block diagram.
In figure: 1, user, 2, Android intelligent client, 3, GSM, 4, Ethernet, 5, alarm module, 501, sound Light crossing-signal, 502, voice broadcast module, 6, gsm module, 7, power module, 8, DSP, 9, mobile target Detection module, 10, web camera, 11, invasion personnel.
Detailed description of the invention
In order to make the purpose of the present invention, summary of the invention and advantage clearer, below in conjunction with the accompanying drawings the present invention is made Detailed description.Understand refering to Fig. 1, use intrusion alarm method and device based on Android intelligent, including including net Network video camera 10, Moving target detection module 9, power module 7, DSP 8, alarm module 5, gsm module 6, Ethernet 4 and Android intelligent client 2, web camera 10 video acquisition output port and DSP Digital Signal Processing Device 8 video acquisition input port connects, and power module 7 output port of power source is connected with web camera 10 power input port, Alarm module 5, gsm module 6, power module 7, Moving target detection module 9 electrically connect with DSP 8 respectively, Gsm module 6 is connected with Android intelligent client 2 wireless telecommunications, and the RJ-45 Ethernet interface of web camera 10 leads to Crossing netting twine to be connected with Ethernet 4, Android intelligent client 2 can access what web camera 10 gathered by Ethernet 4 Video information.
Described web camera 10 is by the video image acquisition in monitoring region to DSP 8 Moving target detection module 9, and the video image in the monitoring region being collected is carried out video image compression process, will compression After video image be transferred to Android intelligent client 2 by Ethernet 4;In described DSP 8 Moving target detection module 9 through to monitoring region in vedio data be identified, judge and analyze after, pass through DSP 8 controls gsm module 6 and sends warning message and mail to Android phone client 2, and triggers report Alert module 5 carries out onsite alarming, and the video image in monitoring region is passed by web camera 10 by RTP/RTCP agreement simultaneously Being passed to Ethernet 4, user 1, after receiving warning message, opens Android intelligent client 2 and plays out.Described Alarm module 5 is made up of audible-visual annunciator 501 and voice broadcast module 502, and wherein audible-visual annunciator includes flash lamp and raises one's voice Device;Described Android intelligent client (2) is carried with by user, and user (1) utilizes Ethernet (4) to connect invasion Test side web camera (10), it is achieved the function that monitoring in real time, recording evidence and assistance are reported to the police.
In the implementation case, intrusion detection end web camera model is EasyN FS-613A-M136, and external 5V is straight Stream power supply, is connected with Ethernet by RJ-45 Ethernet interface and realizes data transmission;Gsm module 7 model is Huawei GTM900-B, is inside provided with a SIM, and SIM is for realizing the communication of gsm module 7 and Android intelligent client 2 even Connect;Android intelligent model is Huawei's C199s Android mobile phone, and it is configured to 5.5 inch screen, 2G internal memory, 16G hard disk, The version selecting Android intelligent operating system is Android 4.4, and version number is V100R001C92B263;Voice is broadcast The model that report module uses Hua Bang ISD company to produce is ISD1700 voice broadcast module, running voltage 2.4V-5.5V;Numeral letter Number processor uses C667X DSP.
The video data that Android intelligent client is transmitted through Ethernet by Network Capture web camera, from And reach the purpose monitored, can record non-by touching " starting to record " button in Android intelligent client simultaneously Method invasion video information.
Refering to Fig. 2, Android intelligent client is mainly responsible for receiving, playing and monitoring of a recorded programme end web camera The video of shooting, and receive alarming short message and mail.The tool of intrusion alarm method and device based on Android intelligent It is as follows that body realizes step:
Starting stage, the initialization of equipment to be carried out, user inputs web camera in Android intelligent client IP address;At initial phase, user opens Android intelligent client, enters Android intelligent client Interface, uses the IP address needing to input this IP Camera machine at IP address field first, and the IP address of web camera can quilt Android intelligent client automatically saves, and reuses and Button Login can be selected to be directly entered Android intelligent Client.
Step one, when equipment is by after Initialize installation, and user opens intrusion alarm device, and web camera is by monitored space Video image acquisition in territory is in DSP, and carries out the video image in the monitoring region being collected Video image compression processes, and by Ethernet, the video image after compression is transferred to Android intelligent client;
The monitoring image that in step 2, DSP, step one is gathered by Moving target detection module is carried out Moving target detection, the change using Three image difference to calculate monitoring region judges to monitor the tool whether region has object to invade Body process is:
(1) use Three image difference that the mobile target entering monitoring region is monitored, take three two field pictures continuously, by phase Two adjacent two field pictures are the poorest, then by do the image of after the recovery respectively through gaussian filtering, maximum between-cluster variance threshold method, patrol Volume computing and morphology operations obtain the bianry image of mobile target neighbor frame difference;
If Ak-1、Ak、Ak+1It is respectively this monitoring system video image in the monitoring region collected the obtained The continuous picture of k-1, k, k+1 frame, it is thus achieved that adjacent image do difference, then:
Bk=| Ak-Ak-1|
Bk+1=| Ak+1-Ak|
For reducing noise to image B derived abovekWith image Bk+1Impact, by respectively to image BkWith image Bk+1Adopt Gaussian filtering process is carried out by 3*3 template, i.e. by by each pixel in a 3*3 template scanogram, true by template In fixed neighborhood, the weighted average gray value of pixel goes the value of alternate template central pixel point, thus the noise that is eliminated is smooth Image CkAnd Ck+1, the neighborhood definition of the most each pixel is a circle centered by the coordinate figure of described each pixel The set of point on inside or border;
If threshold value TkBy image CkBeing divided into prospect i.e. target, and background two class, wherein prospect is image CkMiddle pixel value is big In equal to threshold value TkPixel, background is image CkMiddle pixel value is less than threshold value TkPixel, even image CkAt coordinate (x, y) the pixel C at placek(Kx,Ky)≥Tk, then Ck(Kx,Ky) it is prospect, if image CkAt coordinate (x, y) the pixel C at placek (Kx,Ky)<Tk, then Ck(Kx,Ky) it is background, and threshold value TkMake the variance between this two class of foreground and background maximum;If threshold value Tk+1By image Ck+1Being divided into prospect i.e. target, and background two class, wherein prospect is image Ck+1Middle pixel value is more than or equal to threshold value Tk+1Pixel, background is image Ck+1Middle pixel value is less than threshold value TkPixel, even image Ck+1At coordinate (x, y) place Pixel Ck+1(K+1x,K+1y)≥Tk+1, then Ck+1(K+1x,K+1y) it is prospect, if image Ck+1At coordinate (x, y) picture at place Vegetarian refreshments Ck+1(K+1x,K+1y)<Tk+1, then Ck+1(K+1x,K+1y) it is background, and threshold value Tk+1Make this two class of foreground and background it Between variance maximum;Then Tk、Tk+1It is respectively image Ck、Ck+1Optimal threshold, the calculating process of optimal threshold is as follows:
If image CIFor the I-frame video image in the monitoring region that web camera collects, wherein CIComprise L ash Degree level 0,1 ..., L-1}, gray value be the pixel number of i be ni, then total pixel isGray scale is that the pixel of i goes out Existing probability isEntire image is divided into target M by thresholding t1With background M2Two classes, the then meter of the inter-class variance δ of this two class Calculation formula is:
&delta; I 2 ( t ) = p 0 * p 1 ( u 1 - u 2 ) 2
In formula,WithIt is respectively target M1With background M2The probability that two classes occur; WithIt is respectively target M1With background M2The gray average of two classes, the optimal threshold of segmentation is that inter-class variance calculates public affairs Formula takes thresholding t value during maximum, is designated as TI:
T I = A r g M a x 0 &le; t &le; L - 1 &delta; I 2 ( t )
Image C is tried to achieve by above-mentioned optimal threshold computational methodsk、Ck+1Optimal threshold Tk、Tk+1, then use optimal threshold Value Tk、Tk+1Respectively to image Ck、Ck+1Binaryzation obtains prospect bianry image Dk、Dk+1, it is maximum between-cluster variance threshold method, uses Formula is expressed as follows:
Dk=threshold (| Ck|)
Dk+1=threshold (| Ck+1|)
(2) the prospect bianry image D that will obtaink、Dk+1Carry out logic "and" operation, wherein image DkIn prospect and image Dk+1In prospect carry out AND operation after obtain the image of prospect and be image AkThe shape profile of middle moving target, formula table Reach for:
Ek=Dk And Dk+1
Due to effect of noise, image Dk、Dk+1Image E obtained after carrying out logical operationskBorder is the most not perfectly flat Sliding, foreground area has some noise holes, and is studded with some little noise objects on background area, is opened by morphologic Computing, i.e. after excessive erosion reflation thus remove the noise hole in bianry image, obtain the image F after de-noisingk, wherein Expansion is each pixel using structural element G scanogram, and the bianry image covered with it does OR operation;Corrosion is to use Each pixel of structural element G scanogram, and the bianry image covered with it does AND-operation;Fortune is opened in the morphology of image Calculation formula is as follows:
(3) by using connection eight neighborhood rule, it is thus achieved that image FkIn the minimum abscissa value in largest connected region, maximum Abscissa value, minimum ordinate value and maximum ordinate value, thus obtain the mobile target image of red rectangle collimation mark noteReal Existing step is as follows:
1) in two dimensional image, it is assumed that have the pixel that z is adjacent around target pixel points, wherein z≤8, if this pixel In z pixel of gray scale and this, the gray value of some pixel Q is equal, then claim this pixel and Q to have connectedness;Connection eight is adjacent Territory rule is to choose object pixel all of adjacent picture in two-dimensional space, be upper and lower, left and right, upper left, upper right, lower-left, Eight, bottom right neighbor pixel;By using connection eight neighborhood rule to image FkIn each pixel label is set, To image FkThe connected component labeling matrix of pixel, label initial value is all set to 0;If image FkPixel (Kx,Ky), its connection Region labeling is label (Kx,Ky), wherein image FkPixel (Kx,Ky) eight neighborhood coordinate be (Kx-1,Ky)、(Kx+1,Ky)、 (Kx,Ky-1)、(Kx,Ky+1)、(Kx-1,Ky-1)、(Kx-1,Ky+1)、(Kx+1,Ky-1) and (Kx+1,Ky+1);
2) first from image FkThe upper left corner start progressive scan, be i.e. from storage image Fk0 row 0 of the matrix of pixel arranges Starting progressive scan, from top to bottom, every a line scans from left to right;When scanning image FkPixel (Kx,Ky) time, sweep Retouch and complete (Kx,Ky) the adjacent pixel in the top of pixel and the left side, obtain label (Kx-1,Ky)、label (Kx-1,Ky-1)、label(Kx-1,Ky+1) and label (Kx,Ky-1) value;
If image FkCoordinate is (Kx,Ky) place's pixel is foreground pixel point, and the value of its pixel is adjacent pixel It is worth identical, then it is assumed that these pixels are connections, and wherein foreground pixel point is image FkThe pixel of middle composition prospect;If picture Vegetarian refreshments (Kx,Ky) it is adjacent pixel (Kx-1,Ky)、(Kx-1,Ky-1)、(Kx-1,Ky+1) and (Kx,Ky-1) connection, then label (Kx,Ky) value equal to label (Kx-1,Ky)、label(Kx-1,Ky-1)、label(Kx-1,Ky+1) and label (Kx,Ky-1In the middle of) The label that value is minimum, and it is vertical to update the minimum abscissa value of this connected region, maximum abscissa value, minimum ordinate value and maximum Coordinate figure: minimum abscissa value minxnumber, maximum abscissa value maxxnumber, minimum ordinate value minynumberIndulge with maximum Coordinate figure maxynumber, wherein number is the label of this connected region;
If image FkIn be numbered the connected region of number, if the scanning of this connected region is to pixel (Kx,Ky) time, The minimum abscissa value of this connected region recorded, maximum abscissa value, minimum ordinate value and maximum ordinate value: minimum Abscissa value minxnumber, maximum abscissa value maxxnumber, minimum ordinate value minynumberWith maximum ordinate value maxynumber, and pixel (Kx,Ky) be adjacent pixel connection, then update the minimum abscissa value of this connected region, maximum Abscissa value, minimum ordinate value and maximum ordinate value, if now Kx≥maxxnumber, then maxxnumber=KxAnd minxnumberValue keeps constant, if minxnumber<Kx<maxxnumber, then minxnumberAnd maxxnumberValue all keeps constant;If Kx≤minxnumber, then minxnumber=KxAnd maxxnumberValue keeps constant;If now Ky≥maxynumber, then maxynumber =KyAnd minynumberValue keeps constant, if minynumber<Ky<maxynumber, then minynumberAnd maxynumberValue all keeps not Become;If Ky≤minynumber, then minynumber=KyAnd maxynumberValue keeps constant;
If image FkPixel (Kx,Ky) and the pixel (K of its topx-1,Ky)、(Kx-1,Ky-1)、(Kx-1,Ky+1) Pixel (K with the left sidex,Ky-1) do not connect, and image FkAt pixel (Kx,Ky) place is foreground pixel point, then will increase Add a new connected region;I.e. enumerator number '=number+1 is as pixel (Kx,Ky) connection label, i.e. label(Kx,Ky)=number ', and record the minimum abscissa value of this connected region, maximum abscissa value, minimum ordinate value With maximum ordinate value: minimum abscissa value minxnumber′, maximum abscissa value maxxnumber′, minimum ordinate value minynumber′With maximum ordinate value maxynumber′Even, minxnumber′=Kx、maxxnumber′=Kx、minynumber'=Ky And maxynumber′=Ky;If image FkIt is (K at coordinatex,Ky) place's pixel is background pixel point, then continue to scan on the next one Point, wherein background pixel point is image FkThe pixel of middle composition background;
3) according to process 2) described in scanogram FkIn all pixels, if scanned, then perform process 4);
4) from left to right, from top to bottom traversing graph as FkIn all different connected regions, according to record all differences The minimum abscissa value of connected region, maximum abscissa value, minimum ordinate value and maximum ordinate value: minxnumber、 maxxnumber、minynumberAnd maxynumberCalculate the height H of each connected regionnumberWith width Wnumber, it may be assumed that
Hnumber=maxxnumber-minxnumber
Wnumber=maxynumber-minynumber
Will height HnumberWith width WnumberProduct as the similar area i.e. S of each connected regionnumber=Hnumber* Wnumber, by the area S of relatively each connected regionnumber, by area maximum MAX (Snumber) connected region be designated as maximum fortune Dynamic model block, preserves the minimum abscissa value of largest motion module, maximum abscissa value, minimum ordinate value and maximum ordinate Value: MAXS (minxnumber)、MAXS(maxxnumber)、MAXS(minynumber) and MAXS (maxynumber);Due to image FkIn Largest motion module be by above-mentioned steps process image AkObtained by, therefore image AkIn largest motion module and figure As FkIn largest motion module coordinate information identical, with minimum and maximum abscissa column, the minimum of largest motion module It is expert at maximum ordinate and is formed a height of MAXS (maxxnumber)-MAXS(minxnumber), a width of MAXS (maxynumber)- MAXS(minynumber) rectangle frame, i.e. four coordinate points of rectangle frame are (MAXS (minxnumber),MAXS(minynumber)), (MAXS(minxnumber),MAXS(maxynumber)), (MAXS (maxxnumber),MAXS(minynumber)), (MAXS (maxxnumber),MAXS(maxynumber)), the rectangle frame that order obtains is shown in red;With red rectangle frame by image AkIn Largest motion module frame is selected, and then obtains the mobile target image with red rectangle collimation mark noteThen judge that monitoring region has Object is invaded.
Moving target detection module in step 3, DSP, according to monitoring regarding in region in step 2 Frequently the change of image, by being identified characteristics of human body, it may be judged whether needs to report to the police;If be detected that have human body to invade, then Alarm module, without detecting that human body is invaded, then DSP is started by DSP Will not start alarm module, continuation is carried out video acquisition to monitoring region by web camera, is wherein identified by characteristics of human body Method judges whether that the detailed process needing to report to the police is:
If monitoring region has object to invade, set different threshold decision conditions, it is determined that mobile target imageIn red Whether color rectangle frame meets characteristics of human body, if met, is considered human body, needs to report to the police;If not meeting characteristics of human body, then Can judge whether to report to the police according to initial setting of user;If the mobile target image with red rectangle collimation mark noteIn, mark A length of l of the red rectangle frame of notek, a width of bk, work as bkMore than lk, then it is assumed that intrusion object is upright;To people from uprightly Moving object in distinguish, characteristics of human body can be passed through, characteristics of human body's recognition methods of the present invention is described as follows:
If mobile target imageIn, a length of l of the red rectangle frame of labellingk, a width of bk, then lk/bkCan be approximated to be into Invade the length-width ratio of object, lk*bkCan be approximated to be the area of intrusion object;If lk/bkLess than θkOr more than βk, or lk*bk Less than αkOr more than εkTime, it not the most human body, and if only if θk≤lk/bk≤βkAnd αk≤lk*bk≤εkTime, it is judged that for human body Monitoring instruction region;Wherein, the height of normal human is between 0.8-2 rice, and width is 0.3-1 rice, does not temporarily consider people here The situation of the abnormal invasion of body;Threshold θk、βk、αkAnd εkValue by IP Camera with monitoring region distance determine, if net The distance in network video camera and monitoring region is when M rice distance, and the monitoring range of web camera is high LAk, wide KAk;Therefore lk/bk Lower proportion ratio threshold θkIt is set asUpper limit proportion threshold value βkIt is set as 7;lk*bkLower limit area threshold αkIt is set as current Monitoring image areaUpper limit area threshold εkIt is set as current monitor image area
If having human body to invade by detection, then start alarm module by DSP, without inspection Measure human body invasion, then DSP will not start alarm module, and monitoring region is entered by web camera by continuation Row video acquisition;
If step 4 is found to have human body by the detection of Moving target detection module and invades, then device starts alarm module And gsm module;Invasion personnel will be frightened by alarm module by audible-visual annunciator and voice broadcast module;Wherein report to the police mould Block includes the audible-visual annunciator being made up of flash lamp and speaker and can be according to the voice broadcast of user's request typing different phonetic Module;While starting alarm module, transmission note and mail are carried in time by gsm module to Android intelligent client Wake up user;After user receives information and mail reminder, by Android intelligent client, monitoring client web camera is adopted Video image information in the monitoring region of collection carries out recording preservation and reporting to the police.User passes through Android intelligent client, Log in the IP address preset, check mobile target image in the monitoring region that web camera shootsInformation, and pass through " starting to record " button in Android intelligent client and Alarm button, record the illegal invasion video of invader And report to the police;When invader leaves monitoring region, touch " terminating to record " button and terminate to record, preserve illegal invasion video letter Cease to mobile phone.
By Android intelligent client, the video image of monitoring client web camera typing is preserved, and Display alarm button, main working process is as follows:
1) note is set by Android phone client and mail reception is reminded, when communication module sends postal to user When part and SMS, Android intelligent receive the report for police service information and mail reception prompting, by Android intelligence hands Input the IP address of map network video camera in machine client, conduct interviews;
2) by touching the recording button above Android intelligent client, start monitored area is carried out video Monitoring and recording, until selecting " terminating to record " button, return Android intelligent client;
3) by touching the alarm button above Android intelligent client, " being confirmed whether to report to the police " prompting occurs Frame asks the user whether to report to the police;If selection "Yes", report to the police the most immediately;If selection "No", then return Android intelligent Client.

Claims (6)

1. an intrusion alarm method based on Android intelligent, it is characterised in that step is as follows:
Step one, web camera (10) by the video image acquisition in monitoring region in DSP (8), And to be collected monitoring region in video image carry out video image compression process, will compression after video image by with Too net (4) is transferred to Android intelligent client (2);
In the monitoring region that in step 2, DSP (8), step one is gathered by Moving target detection module (9) Video image move target detection, the change using Three image difference to calculate the video image in monitoring region judges Whether monitoring region has object to invade;
Moving target detection module (9) in step 3, DSP (8), monitors in region according in step 2 The change of video image, by being identified characteristics of human body, it may be judged whether needs to report to the police;If be detected that there is human body to invade, Then start alarm module (5) by DSP;Without detecting that human body is invaded, then at DSP digital signal Reason device will not start alarm module (5), and continuation is carried out video acquisition to monitoring region by web camera (10);
If step 4 is found to have human body by Moving target detection module (9) detection and invades, then device starts alarm module And gsm module (6) (5);Alarm module (5) will be by audible-visual annunciator (501) and voice broadcast module (502) to invasion personnel Frighten;While starting alarm module (5), gsm module (6) will send note and mail to Android intelligent visitor Family end (2) reminds user (1) in time;After user (1) receives information and mail reminder, by Android intelligent client (2) video image information in the monitoring region gathered monitoring client web camera (10) carries out recording preservation and reporting to the police.
A kind of intrusion alarm method and device based on Android intelligent the most according to claim 1, its feature exists In the video image in the monitoring region being collected being carried out video image compression process described in step one, select MPEG-4 Video image after compression, as the compression standard of video data, is transferred to Android intelligence hands by Ethernet (4) by standard Machine client (2) uses RTP/RTCP protocol stack to realize.
A kind of intrusion alarm method and device based on Android intelligent the most according to claim 2, its feature exists In the judgement detailed process whether monitoring region has object to invade described in step 2 it is:
(1) use Three image difference that the mobile target entering monitoring region is monitored, take three two field pictures continuously, by adjacent Two two field pictures are the poorest, then will do the image of after the recovery respectively through gaussian filtering, maximum between-cluster variance threshold method, logic fortune Calculation and morphology operations obtain the bianry image of mobile target neighbor frame difference;
If Ak-1、Ak、Ak+1Be respectively this monitoring system from collect monitoring region in video image obtain kth-1, k, The continuous picture of k+1 frame, it is thus achieved that adjacent image do difference, then:
Bk=| Ak-Ak-1|
Bk+1=| Ak+1-Ak|
For reducing noise to image B derived abovekWith image Bk+1Impact, by respectively to image BkWith image Bk+1Use 3*3 Template carries out gaussian filtering process, i.e. by with each pixel in a 3*3 template scanogram, the neighbour determined by template In territory, the weighted average gray value of pixel goes the value of alternate template central pixel point, thus the smoothed image C of the noise that is eliminatedk And Ck+1, the neighborhood definition of the most each pixel be centered by the coordinate figure of described each pixel one circle internal or The set of point on border;
If threshold value TkBy image CkBeing divided into prospect i.e. target, and background two class, wherein prospect is image CkMiddle pixel value is more than In threshold value TkPixel, background is image CkMiddle pixel value is less than threshold value TkPixel, even image CkCoordinate (x, y) The pixel C at placek(Kx,Ky)≥Tk, then Ck(Kx,Ky) it is prospect, if image CkAt coordinate (x, y) the pixel C at placek(Kx,Ky)< Tk, then Ck(Kx,Ky) it is background, and threshold value TkMake the variance between this two class of foreground and background maximum;If threshold value Tk+1By image Ck+1Being divided into prospect i.e. target, and background two class, wherein prospect is image Ck+1Middle pixel value is more than or equal to threshold value Tk+1Pixel Point, background is image Ck+1Middle pixel value is less than threshold value TkPixel, even image Ck+1At coordinate (x, y) pixel at place Ck+1(K+1x,K+1y)≥Tk+1, then Ck+1(K+1x,K+1y) it is prospect, if image Ck+1At coordinate (x, y) the pixel C at placek+1(K +1x,K+1y)<Tk+1, then Ck+1(K+1x,K+1y) it is background, and threshold value Tk+1Make the variance between this two class of foreground and background Greatly;Then Tk、Tk+1It is respectively image Ck、Ck+1Optimal threshold, the calculating process of optimal threshold is as follows:
If image CIFor the I-frame video image in the monitoring region that web camera collects, wherein CIComprise L gray level 0,1 ..., L-1}, gray value be the pixel number of i be ni, then total pixel isGray scale is the pixel probability of occurrence of i ForEntire image is divided into target M by thresholding t1With background M2Two classes, the then computing formula of the inter-class variance δ of this two class For:
In formula,WithIt is respectively target M1With background M2The probability that two classes occur;WithIt is respectively target M1With background M2The gray average of two classes, the optimal threshold of segmentation is inter-class variance computing formula In thresholding t value when taking maximum, be designated as TI:
Image C is tried to achieve by above-mentioned optimal threshold computational methodsk、Ck+1Optimal threshold Tk、Tk+1, then use optimal threshold Tk、 Tk+1Respectively to image Ck、Ck+1Binaryzation obtains prospect bianry image Dk、Dk+1, it is maximum between-cluster variance threshold method, uses formula It is expressed as follows:
Dk=threshold (| Ck|)
Dk+1=threshold (| Ck+1|)
(2) the prospect bianry image D that will obtaink、Dk+1Carry out logic "and" operation, wherein image DkIn prospect and image Dk+1 In prospect carry out AND operation after the prospect that obtains be image AkThe shape profile of middle moving target, formula is expressed as:
Ek=Dk And Dk+1
Due to effect of noise, image Dk、Dk+1Image E obtained after carrying out logical operationskBorder generally the most not perfectly flat cunning, front Scene area has some noise holes, and is studded with some little noise objects on background area, by morphologic opening operation, I.e. after excessive erosion reflation thus remove the noise hole in bianry image, obtain the image F after de-noisingk, wherein expand It is each pixel using structural element G scanogram, and the bianry image covered with it does OR operation;Corrosion is to use structure Each pixel of element G scanogram, and the bianry image covered with it does AND-operation;The morphology opening operation of image is public Formula is as follows:
(3) by using connection eight neighborhood rule, it is thus achieved that image FkIn the minimum abscissa value in largest connected region, maximum horizontal seat Scale value, minimum ordinate value and maximum ordinate value, thus obtain the mobile target image of red rectangle collimation mark noteRealize step Rapid as follows:
1) in two dimensional image, it is assumed that have the pixel that z is adjacent around target pixel points, wherein z≤8, if this pixel grey scale Equal with the gray value of some pixel Q in this z pixel, then to claim this pixel and Q to have connectedness;Connection eight neighborhood rule It is then to choose object pixel all of adjacent picture in two-dimensional space, is upper and lower, left and right, upper left, upper right, lower-left, bottom right Eight neighbor pixels;By using connection eight neighborhood rule to image FkIn each pixel label is set, obtain figure As FkThe connected component labeling matrix of pixel, label initial value is all set to 0;If image FkPixel (Kx,Ky), its connected region It is numbered label (Kx,Ky), wherein image FkPixel (Kx,Ky) eight neighborhood coordinate be (Kx-1,Ky)、(Kx+1,Ky)、(Kx, Ky-1)、(Kx,Ky+1)、(Kx-1,Ky-1)、(Kx-1,Ky+1)、(Kx+1,Ky-1) and (Kx+1,Ky+1);
2) first from image FkThe upper left corner start progressive scan, be i.e. from storage image Fk0 row 0 row of the matrix of pixel start Progressive scan, from top to bottom, every a line scans from left to right;When scanning image FkPixel (Kx,Ky) time, scan through Become (Kx,Ky) the adjacent pixel in the top of pixel and the left side, obtain label (Kx-1,Ky)、label(Kx-1, Ky-1)、label(Kx-1,Ky+1) and label (Kx,Ky-1) value;
If image FkCoordinate is (Kx,Ky) place's pixel is foreground pixel point, and the value of its pixel is adjacent pixel point value phase With, then it is assumed that these pixels are connections, and wherein foreground pixel point is image FkThe pixel of middle composition prospect;If pixel (Kx,Ky) it is adjacent pixel (Kx-1,Ky)、(Kx-1,Ky-1)、(Kx-1,Ky+1) and (Kx,Ky-1) connection, then label (Kx, Ky) value equal to label (Kx-1,Ky)、label(Kx-1,Ky-1)、label(Kx-1,Ky+1) and label (Kx,Ky-1) when intermediate value Little label, and update the minimum abscissa value of this connected region, maximum abscissa value, minimum ordinate value and maximum ordinate Value: minimum abscissa value minxnumber, maximum abscissa value maxxnumber, minimum ordinate value minynumberAnd maximum ordinate Value maxynumber, wherein number is the label of this connected region;
If image FkIn be numbered the connected region of number, if the scanning of this connected region is to pixel (Kx,Ky) time, remember The minimum abscissa value of this connected region of record, maximum abscissa value, minimum ordinate value and maximum ordinate value: minimum horizontal seat Scale value minxnumber, maximum abscissa value maxxnumber, minimum ordinate value minynumberWith maximum ordinate value maxynumber, And pixel (Kx,Ky) be adjacent pixel connection, then update the minimum abscissa value of this connected region, maximum abscissa value, Minimum ordinate value and maximum ordinate value, if now Kx≥maxxnumber, then maxxnumber=KxAnd minxnumberValue keeps not Become, if minxnumber<Kx<maxxnumber, then minxnumberAnd maxxnumberValue all keeps constant;If Kx≤minxnumber, then minxnumber=KxAnd maxxnumberValue keeps constant;If now Ky≥maxynumber, then maxynumber=KyAnd minynumberValue Keep constant, if minynumber<Ky<maxynumber, then minynumberAnd maxynumberValue all keeps constant;If Ky≤ minynumber, then minynumber=KyAnd maxynumberValue keeps constant;
If image FkPixel (Kx,Ky) and the pixel (K of its topx-1,Ky)、(Kx-1,Ky-1)、(Kx-1,Ky+1) and the left side Pixel (Kx,Ky-1) do not connect, and image FkAt pixel (Kx,Ky) place is foreground pixel point, then will increase by one New connected region;I.e. enumerator number '=number+1 is as pixel (Kx,Ky) connection label, i.e. label (Kx, Ky)=number ', and it is vertical to record the minimum abscissa value of this connected region, maximum abscissa value, minimum ordinate value and maximum Coordinate figure: minimum abscissa value minxnumber′, maximum abscissa value maxxnumber′, minimum ordinate value minynumber′And maximum Ordinate value maxynumber′Even, minxnumber′=Kx、maxxnumber′=Kx、minynumber′=KyAnd maxynumber′=Ky; If image FkIt is (K at coordinatex,Ky) place's pixel is background pixel point, then continue to scan on next point, wherein background pixel Point is image FkThe pixel of middle composition background;
3) according to process 2) described in scanogram FkIn all pixels, if scanned, then perform process 4);
4) from left to right, from top to bottom traversing graph as FkIn all different connected regions, according to record all different connections The minimum abscissa value in region, maximum abscissa value, minimum ordinate value and maximum ordinate value: minxnumber、maxxnumber、 minynumberAnd maxynumberCalculate the height H of each connected regionnumberWith width Wnumber, it may be assumed that
Hnumber=maxxnumber-minxnumber
Wnumber=maxynumber-minynumber
Will height HnumberWith width WnumberProduct as the similar area i.e. S of each connected regionnumber=Hnumber*Wnumber, Area S by relatively each connected regionnumber, by area maximum MAX (Snumber) connected region be designated as largest motion module, Preserve the minimum abscissa value of largest motion module, maximum abscissa value, minimum ordinate value and maximum ordinate value: MAXS (minxnumber)、MAXS(maxxnumber)、MAXS(minynumber) and MAXS (maxynumber);Due to image FkIn maximum fortune Dynamic model block is to process image A by above-mentioned stepskObtained by, therefore image AkIn largest motion module and image FkIn Largest motion module coordinate information is identical, indulges with minimum and maximum abscissa column, the minimum and maximum of largest motion module Coordinate is expert at and is formed a height of MAXS (maxxnumber)-MAXS(minxnumber), a width of MAXS (maxynumber)-MAXS (minynumber) rectangle frame, i.e. four coordinate points of rectangle frame are (MAXS (minxnumber),MAXS(minynumber)), (MAXS(minxnumber),MAXS(maxynumber)), (MAXS (maxxnumber),MAXS(minynumber)), (MAXS (maxxnumber),MAXS(maxynumber)), the rectangle frame that order obtains is shown in red;With red rectangle frame by image AkIn Largest motion module frame is selected, and then obtains the mobile target image with red rectangle collimation mark noteThen judge that monitoring region has Object is invaded.
A kind of intrusion alarm method and device based on Android intelligent the most according to claim 3, its feature exists In described in step 3 by characteristics of human body's recognition methods judge whether need report to the police detailed process be:
If monitoring region has object to invade, set different threshold decision conditions, it is determined that mobile target imageMiddle red square Whether shape frame meets characteristics of human body, if met, is considered human body, needs to report to the police;If not meeting characteristics of human body, the most permissible Initial setting according to user judges whether to report to the police;If the mobile target image with red rectangle collimation mark noteIn, labelling A length of l of red rectangle framek, a width of bk, work as bkMore than lk, then it is assumed that intrusion object is upright;To people from upright fortune Distinguishing in animal body, can pass through characteristics of human body, characteristics of human body's recognition methods of the present invention is described as follows:
If mobile target imageIn, a length of l of the red rectangle frame of labellingk, a width of bk, then lk/bkCan be approximated to be invader The length-width ratio of body, lk*bkCan be approximated to be the area of intrusion object;If lk/bkLess than θkOr more than βk, or lk*bkIt is less than αkOr more than εkTime, it not the most human body, and if only if θk≤lk/bk≤βkAnd αk≤lk*bk≤εkTime, it is judged that invade for human body Monitoring region;Wherein, threshold θk、βk、αkAnd εkValue by IP Camera with monitoring region distance determine, if network is taken the photograph The distance in camera and monitoring region is when H rice distance, and the monitoring range of web camera is long LAk, wide KAk;Therefore lk/bkUnder Limit proportion threshold value θkIt is set asUpper limit proportion threshold value βkIt is set as 7;lk*bkLower limit area threshold αkIt is set as current monitor Image areaUpper limit area threshold εkIt is set as current monitor image area
If having human body to invade by detection, then start alarm module (5) by DSP (8), without Detect that human body is invaded, then DSP (8) will not start alarm module, and web camera (10) is right by continuation Monitoring region carries out video acquisition.
5. an intrusion alarm device based on Android intelligent, it is characterised in that including: web camera (10), shifting Moving-target detection module (9), power module (7), DSP (8), alarm module (5), gsm module (6), with Too net (4) and Android intelligent client (2), web camera (10) video acquisition output port and DSP digital signal Processor (8) video acquisition input port connects, and power module (7) output port of power source inputs with web camera (10) power supply Port connects, and alarm module (5), gsm module (6), power module (7), Moving target detection module (9) are digital with DSP respectively Signal processor (8) electrically connects, and gsm module (6) is connected with Android intelligent client (2) wireless telecommunications, network shooting The RJ-45 Ethernet interface of machine (10) is connected with Ethernet (4) by netting twine, and Android intelligent client (2) can be passed through Ethernet (4) accesses the video information that web camera (10) gathers.
A kind of intrusion alarm device based on Android intelligent the most according to claim 5, it is characterised in that institute The alarm module (5) stated includes the audible-visual annunciator (501) being made up of flash lamp and speaker and can be according to user's request typing The voice broadcast module (502) of different phonetic.
CN201610638102.5A 2016-08-05 2016-08-05 A kind of intrusion alarm method based on Android intelligent and alarm device Pending CN106251544A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610638102.5A CN106251544A (en) 2016-08-05 2016-08-05 A kind of intrusion alarm method based on Android intelligent and alarm device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610638102.5A CN106251544A (en) 2016-08-05 2016-08-05 A kind of intrusion alarm method based on Android intelligent and alarm device

Publications (1)

Publication Number Publication Date
CN106251544A true CN106251544A (en) 2016-12-21

Family

ID=58077851

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610638102.5A Pending CN106251544A (en) 2016-08-05 2016-08-05 A kind of intrusion alarm method based on Android intelligent and alarm device

Country Status (1)

Country Link
CN (1) CN106251544A (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106657936A (en) * 2017-03-03 2017-05-10 苏州科技大学 Voice warning method and system based on video monitoring of dangerous area
CN107040768A (en) * 2017-05-18 2017-08-11 深圳市海和高新技术有限公司 The monitoring implementation method and system of smart home
CN107134100A (en) * 2017-06-05 2017-09-05 广西荣中科技有限责任公司 A kind of safety-protection system
CN107578422A (en) * 2017-08-01 2018-01-12 中国农业大学 A kind of pedestrian's trace detection system and method
CN107801000A (en) * 2017-10-17 2018-03-13 国网江苏省电力公司盐城供电公司 A kind of transmission line of electricity external force damage prevention intelligent video monitoring system
CN109409243A (en) * 2018-09-29 2019-03-01 江南大学 Human visual detection method in a kind of mobile target
CN109448287A (en) * 2018-10-25 2019-03-08 平安科技(深圳)有限公司 A kind of method for safety monitoring, device, readable storage medium storing program for executing and terminal device
CN109584490A (en) * 2018-12-10 2019-04-05 Tcl通力电子(惠州)有限公司 Safety protection method, intelligent sound box and security system
CN110889334A (en) * 2019-11-06 2020-03-17 江河瑞通(北京)技术有限公司 Personnel intrusion identification method and device
CN111210462A (en) * 2019-12-30 2020-05-29 视联动力信息技术股份有限公司 Alarm method and device
CN112399051A (en) * 2020-10-15 2021-02-23 中标慧安信息技术股份有限公司 Human body detection sound warning camera applied to garbage classification

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004272754A (en) * 2003-03-11 2004-09-30 Matsushita Electric Ind Co Ltd Alarm device, and alarm operating method
CN101119481A (en) * 2007-08-27 2008-02-06 刘文萍 Remote alarm video monitoring system and method
CN203025885U (en) * 2012-12-11 2013-06-26 江苏大学 Anti-theft alarming and calling system of valuable article
CN203086601U (en) * 2012-12-24 2013-07-24 天津市亚安科技股份有限公司 Video monitoring device with acousto-optic warning function
CN203588406U (en) * 2013-12-06 2014-05-07 南开大学 Intelligent security system based on infrared detection and video monitoring

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004272754A (en) * 2003-03-11 2004-09-30 Matsushita Electric Ind Co Ltd Alarm device, and alarm operating method
CN101119481A (en) * 2007-08-27 2008-02-06 刘文萍 Remote alarm video monitoring system and method
CN203025885U (en) * 2012-12-11 2013-06-26 江苏大学 Anti-theft alarming and calling system of valuable article
CN203086601U (en) * 2012-12-24 2013-07-24 天津市亚安科技股份有限公司 Video monitoring device with acousto-optic warning function
CN203588406U (en) * 2013-12-06 2014-05-07 南开大学 Intelligent security system based on infrared detection and video monitoring

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
宋斌: "一种新的图像连通域快速标号算法", 《电子测量技术》 *
张伯虎: "《从零开始学弱电电工技术》", 30 October 2009 *
朱秀昌等: "《数字图像处理与图像通信》", 30 June 2014 *
谢剑斌等: "《视觉感知与智能视频监控》", 31 March 2012 *

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106657936A (en) * 2017-03-03 2017-05-10 苏州科技大学 Voice warning method and system based on video monitoring of dangerous area
CN107040768A (en) * 2017-05-18 2017-08-11 深圳市海和高新技术有限公司 The monitoring implementation method and system of smart home
CN107134100A (en) * 2017-06-05 2017-09-05 广西荣中科技有限责任公司 A kind of safety-protection system
CN107578422A (en) * 2017-08-01 2018-01-12 中国农业大学 A kind of pedestrian's trace detection system and method
CN107578422B (en) * 2017-08-01 2024-04-09 中国农业大学 Pedestrian tracking detection system and method
CN107801000A (en) * 2017-10-17 2018-03-13 国网江苏省电力公司盐城供电公司 A kind of transmission line of electricity external force damage prevention intelligent video monitoring system
CN109409243A (en) * 2018-09-29 2019-03-01 江南大学 Human visual detection method in a kind of mobile target
CN109448287A (en) * 2018-10-25 2019-03-08 平安科技(深圳)有限公司 A kind of method for safety monitoring, device, readable storage medium storing program for executing and terminal device
CN109584490A (en) * 2018-12-10 2019-04-05 Tcl通力电子(惠州)有限公司 Safety protection method, intelligent sound box and security system
CN110889334A (en) * 2019-11-06 2020-03-17 江河瑞通(北京)技术有限公司 Personnel intrusion identification method and device
CN111210462A (en) * 2019-12-30 2020-05-29 视联动力信息技术股份有限公司 Alarm method and device
CN112399051A (en) * 2020-10-15 2021-02-23 中标慧安信息技术股份有限公司 Human body detection sound warning camera applied to garbage classification

Similar Documents

Publication Publication Date Title
CN106251544A (en) A kind of intrusion alarm method based on Android intelligent and alarm device
US11004209B2 (en) Methods and systems for applying complex object detection in a video analytics system
US10282617B2 (en) Methods and systems for performing sleeping object detection and tracking in video analytics
US20190034734A1 (en) Object classification using machine learning and object tracking
US20190130188A1 (en) Object classification in a video analytics system
US20190130583A1 (en) Still and slow object tracking in a hybrid video analytics system
US20190130189A1 (en) Suppressing duplicated bounding boxes from object detection in a video analytics system
JP3872014B2 (en) Method and apparatus for selecting an optimal video frame to be transmitted to a remote station for CCTV-based residential security monitoring
CN103576660B (en) Smart Home method for supervising
US10878578B2 (en) Exclusion zone in video analytics
US20060170769A1 (en) Human and object recognition in digital video
CN106940794A (en) A yard adjoint system is detectd in a kind of target collection
US20190130586A1 (en) Robust sleeping object detection in video analytics
CN109089160A (en) A kind of colleges and universities dining room food processing unlawful practice video analytic system and method
US10360456B2 (en) Methods and systems of maintaining lost object trackers in video analytics
WO2018031096A1 (en) Methods and systems of performing blob filtering in video analytics
WO2018031104A1 (en) Methods and systems of maintaining object trackers in video analytics
CN111767823A (en) Sleeping post detection method, device, system and storage medium
CN101163234A (en) Method of implementing pattern recognition and image monitoring using data processing device
CN107517391B (en) Method and equipment for identifying abnormal live broadcast information in video live broadcast
US10657783B2 (en) Video surveillance method based on object detection and system thereof
CN107231546A (en) The household monitoring system of autonomous tracking moving characteristic based on cloud security service device
CN108540752A (en) The methods, devices and systems that target object in video monitoring is identified
CN101183477A (en) Automatic door bell and implementing method thereof
KR20060003321A (en) The method or device for the object recognition in the security system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20161221