CN106251544A - A kind of intrusion alarm method based on Android intelligent and alarm device - Google Patents
A kind of intrusion alarm method based on Android intelligent and alarm device Download PDFInfo
- Publication number
- CN106251544A CN106251544A CN201610638102.5A CN201610638102A CN106251544A CN 106251544 A CN106251544 A CN 106251544A CN 201610638102 A CN201610638102 A CN 201610638102A CN 106251544 A CN106251544 A CN 106251544A
- Authority
- CN
- China
- Prior art keywords
- image
- pixel
- value
- maximum
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19602—Image analysis to detect motion of the intruder, e.g. by frame subtraction
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B25/00—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
- G08B25/01—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
- G08B25/08—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using communication transmission lines
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Business, Economics & Management (AREA)
- Emergency Management (AREA)
- Image Analysis (AREA)
Abstract
The invention discloses a kind of intrusion alarm method based on Android intelligent and alarm device, device is: web camera, Moving target detection module, power module, DSP, alarm module, gsm module, Ethernet and Android intelligent client, and alarm method is: be transferred to Android intelligent client after the Video Image Processing in monitoring region;Video image in monitoring region is moved target detection, it is judged that whether monitoring region has object to invade;Characteristics of human body is identified, it may be judged whether need to report to the police;Detection is found to have human body and invades then device startup alarm module and gsm module, and to invasion, personnel frighten;Send note simultaneously and mail reminds user in time to Android intelligent client;Video image in monitoring region is carried out recording preservation and reporting to the police by user by Android intelligent client;This apparatus structure is simple, low cost, and method is simple to operate, warning accuracy rate high, is suitable to popularize.
Description
Technical field
The invention belongs to smart mobile phone technical field of safety protection, relate to a kind of invasion based on Android intelligent
Alarm method and alarm device.
Background technology
In recent years, along with the development of mobile communication technology, mobile communication network has had coverage rate widely, intelligence hands
Machine have also been obtained universal.And along with living standard constantly improves, the security protection consciousness of people is stronger, wherein family's peace
Anti-concept is increasingly accepted by people.But traditional video monitoring system realizes long-range monitoring and mainly uses wired side
Method, including laying the method for special line, utilizing the method etc. of telephone wire, playback terminal is PC.Although these methods can be real
Existing monitoring remote video, but there are some problems, special line deployment cost is high, and supervisor is limited to position, and telephone wire passes
Defeated speed is slow, is almost difficult to real-time video monitoring, and video monitoring system based on PC, its video compress and solution
Pressure uses video frequency collection card based on PC so that the collection of video signal, compress with communicate complex, stability and reliably
Property is the highest, and hardware investment cost is the biggest.And PC operation complexity, need personal management, also there is no the function of automatic alarm, property
Valency ratio is extremely low, is not suitable for household safety-protection.It is thus desirable to relate to a kind of simple in construction, cost is relatively low, transmission is convenient, carry report
The monitoring and alarming system of the functions such as police.
It addition, in terms of mobile target body detection algorithm, most monitoring technology only simple have employed currently
Image and background image do difference process, consider less to the situation of background change, and fail to considering that in family, house pet is to regarding
The interference in screen monitoring region so that system has the highest rate of false alarm.
Summary of the invention
The technical problem to be solved is to overcome conventional art to have that portability is poor, cost performance is low, is unfavorable for
The problem that intrusion alarm is extensively applied and existing mobile target body detection method is not enough, it is provided that a kind of based on Android
The intrusion alarm method of smart mobile phone and alarm device, the method and device portability is strong, cost performance is high, can be under indoor environment
Effectively detect invasion human body target, and can well process owing to background light drastic change and house pet are to monitoring region detection band
The interference come.
For solving above-mentioned technical problem, the present invention adopts the following technical scheme that realization:
A kind of intrusion alarm method based on Android intelligent, it is characterised in that step is as follows:
Step one, web camera are by the video image acquisition in monitoring region to DSP and right
Video image in the monitoring region being collected carries out video image compression process, and the video image after compression is passed through Ethernet
It is transferred to Android intelligent client;
In step 2, DSP, step one collection is monitored in region by Moving target detection module
Video image moves target detection, and the change using Three image difference to calculate the video image in monitoring region judges prison
Whether control region has object to invade;
Moving target detection module in step 3, DSP, according to monitoring regarding in region in step 2
Frequently the change of image, by being identified characteristics of human body, it may be judged whether needs to report to the police;If be detected that have human body to invade, then
Alarm module is started by DSP;Without detecting that human body is invaded, then DSP
Alarm module will not be started, and continuation is carried out video acquisition to monitoring region by web camera;
If step 4 is found to have human body by the detection of Moving target detection module and invades, then device starts alarm module
And gsm module;Invasion personnel will be frightened by alarm module by audible-visual annunciator and voice broadcast module;Start warning mould
While block, transmission note and mail are reminded user to Android intelligent client by gsm module in time;User receives
After information and mail reminder, by the monitoring region that monitoring client web camera is gathered by Android intelligent client
Video image information carry out record preserve and report to the police.
Further technical scheme includes:
Described in step one to be collected monitoring region in video image carry out video image compression process, select
Video image after compression, as the compression standard of video data, is transferred to Android intelligence by Ethernet by MPEG-4 standard
RTP/RTCP protocol stack can be used to realize by cell-phone customer terminal.
The detailed process whether judging described in step 2 monitors region and have object to invade is:
(1) use Three image difference that the mobile target entering monitoring region is monitored, take three two field pictures continuously, by phase
Two adjacent two field pictures are the poorest, then by do the image of after the recovery respectively through gaussian filtering, maximum between-cluster variance threshold method, patrol
Volume computing and morphology operations obtain the bianry image of mobile target neighbor frame difference;
If Ak-1、Ak、Ak+1It is respectively this monitoring system video image in the monitoring region collected the obtained
The continuous picture of k-1, k, k+1 frame, it is thus achieved that adjacent image do difference, then:
Bk=| Ak-Ak-1|
Bk+1=| Ak+1-Ak|
For reducing noise to image B derived abovekWith image Bk+1Impact, by respectively to image BkWith image Bk+1Adopt
Gaussian filtering process is carried out by 3*3 template, i.e. by by each pixel in a 3*3 template scanogram, true by template
In fixed neighborhood, the weighted average gray value of pixel goes the value of alternate template central pixel point, thus the noise that is eliminated is smooth
Image CkAnd Ck+1, the neighborhood definition of the most each pixel is a circle centered by the coordinate figure of described each pixel
The set of point on inside or border;
If threshold value TkBy image CkBeing divided into prospect i.e. target, and background two class, wherein prospect is image CkMiddle pixel value is big
In equal to threshold value TkPixel, background is image CkMiddle pixel value is less than threshold value TkPixel, even image CkAt coordinate
(x, y) the pixel C at placek(Kx,Ky)≥Tk, then Ck(Kx,Ky) it is prospect, if image CkAt coordinate (x, y) the pixel C at placek
(Kx,Ky)<Tk, then Ck(Kx,Ky) it is background, and threshold value TkMake the variance between this two class of foreground and background maximum;If threshold value
Tk+1By image Ck+1Being divided into prospect i.e. target, and background two class, wherein prospect is image Ck+1Middle pixel value is more than or equal to threshold value
Tk+1Pixel, background is image Ck+1Middle pixel value is less than threshold value TkPixel, even image Ck+1At coordinate (x, y) place
Pixel Ck+1(K+1x,K+1y)≥Tk+1, then Ck+1(K+1x,K+1y) it is prospect, if image Ck+1At coordinate (x, y) picture at place
Vegetarian refreshments Ck+1(K+1x,K+1y)<Tk+1, then Ck+1(K+1x,K+1y) it is background, and threshold value Tk+1Make this two class of foreground and background it
Between variance maximum;Then Tk、Tk+1It is respectively image Ck、Ck+1Optimal threshold, the calculating process of optimal threshold is as follows:
If image CIFor the I-frame video image in the monitoring region that web camera collects, wherein CIComprise L ash
Degree level 0,1 ..., L-1}, gray value be the pixel number of i be ni, then total pixel isGray scale is that the pixel of i goes out
Existing probability isEntire image is divided into target M by thresholding t1With background M2Two classes, the then meter of the inter-class variance δ of this two class
Calculation formula is:
In formula,WithIt is respectively target M1With background M2The probability that two classes occur;
WithIt is respectively target M1With background M2The gray average of two classes, the optimal threshold of segmentation is that inter-class variance calculates public affairs
Formula takes thresholding t value during maximum, is designated as TI:
Image C is tried to achieve by above-mentioned optimal threshold computational methodsk、Ck+1Optimal threshold Tk、Tk+1, then use optimal threshold
Value Tk、Tk+1Respectively to image Ck、Ck+1Binaryzation obtains prospect bianry image Dk、Dk+1, it is maximum between-cluster variance threshold method, uses
Formula is expressed as follows:
Dk=threshold (| Ck|)
Dk+1=threshold (| Ck+1|)
(2) the prospect bianry image D that will obtaink、Dk+1Carry out logic "and" operation, wherein image DkIn prospect and image
Dk+1In prospect carry out AND operation after the foreground image that obtains be image AkThe shape profile of middle moving target, formula table
Reach for:
Ek=Dk And Dk+1
Due to effect of noise, image Dk、Dk+1Image E obtained after carrying out logical operationskBorder is the most not perfectly flat
Sliding, foreground area has some noise holes, and is studded with some little noise objects on background area, is opened by morphologic
Computing, i.e. after excessive erosion reflation thus remove the noise hole in bianry image, obtain the image F after de-noisingk, wherein
Expansion is each pixel using structural element G scanogram, and the bianry image covered with it does OR operation;Corrosion is to use
Each pixel of structural element G scanogram, and the bianry image covered with it does AND-operation;Fortune is opened in the morphology of image
Calculation formula is as follows:
(3) by using connection eight neighborhood rule, it is thus achieved that image FkIn the minimum abscissa value in largest connected region, maximum
Abscissa value, minimum ordinate value and maximum ordinate value, thus obtain the mobile target image of red rectangle collimation mark noteReal
Existing step is as follows:
1) in two dimensional image, it is assumed that have the pixel that z is adjacent around target pixel points, wherein z≤8, if this pixel
In z pixel of gray scale and this, the gray value of some pixel Q is equal, then claim this pixel and Q to have connectedness;Connection eight is adjacent
Territory rule is to choose object pixel all of adjacent picture in two-dimensional space, be upper and lower, left and right, upper left, upper right, lower-left,
Eight, bottom right neighbor pixel;By using connection eight neighborhood rule to image FkIn each pixel label is set,
To image FkThe connected component labeling matrix of pixel, label initial value is all set to 0;If image FkPixel (Kx,Ky), its connection
Region labeling is label (Kx,Ky), wherein image FkPixel (Kx,Ky) eight neighborhood coordinate be (Kx-1,Ky)、(Kx+1,Ky)、
(Kx,Ky-1)、(Kx,Ky+1)、(Kx-1,Ky-1)、(Kx-1,Ky+1)、(Kx+1,Ky-1) and (Kx+1,Ky+1);
2) first from image FkThe upper left corner start progressive scan, be i.e. from storage image Fk0 row 0 of the matrix of pixel arranges
Starting progressive scan, from top to bottom, every a line scans from left to right;When scanning image FkPixel (Kx,Ky) time, sweep
Retouch and complete (Kx,Ky) the adjacent pixel in the top of pixel and the left side, obtain label (Kx-1,Ky)、label
(Kx-1,Ky-1)、label(Kx-1,Ky+1) and label (Kx,Ky-1) value;
If image FkCoordinate is (Kx,Ky) place's pixel is foreground pixel point, and the value of its pixel is adjacent pixel
It is worth identical, then it is assumed that these pixels are connections, and wherein foreground pixel point is image FkThe pixel of middle composition prospect;If picture
Vegetarian refreshments (Kx,Ky) it is adjacent pixel (Kx-1,Ky)、(Kx-1,Ky-1)、(Kx-1,Ky+1) and (Kx,Ky-1) connection, then label
(Kx,Ky) value equal to label (Kx-1,Ky)、label(Kx-1,Ky-1)、label(Kx-1,Ky+1) and label (Kx,Ky-1In the middle of)
The label that value is minimum, and it is vertical to update the minimum abscissa value of this connected region, maximum abscissa value, minimum ordinate value and maximum
Coordinate figure: minimum abscissa value minxnumber, maximum abscissa value maxxnumber, minimum ordinate value minynumberIndulge with maximum
Coordinate figure maxynumber, wherein number is the label of this connected region;
If image FkIn be numbered the connected region of number, if the scanning of this connected region is to pixel (Kx,Ky) time,
The minimum abscissa value of this connected region recorded, maximum abscissa value, minimum ordinate value and maximum ordinate value: minimum
Abscissa value minxnumber, maximum abscissa value maxxnumber, minimum ordinate value minynumberWith maximum ordinate value
maxynumber, and pixel (Kx,Ky) be adjacent pixel connection, then update the minimum abscissa value of this connected region, maximum
Abscissa value, minimum ordinate value and maximum ordinate value, if now Kx≥maxxnumber, then maxxnumber=KxAnd
minxnumberValue keeps constant, if minxnumber<Kx<maxxnumber, then minxnumberAnd maxxnumberValue all keeps constant;If
Kx≤minxnumber, then minxnumber=KxAnd maxxnumberValue keeps constant;If now Ky≥maxynumber, then maxynumber
=KyAnd minynumberValue keeps constant, if minynumber<Ky<maxynumber, then minynumberAnd maxynumberValue all keeps not
Become;If Ky≤minynumber, then minynumber=KyAnd maxynumberValue keeps constant;
If image FkPixel (Kx,Ky) and the pixel (K of its topx-1,Ky)、(Kx-1,Ky-1)、(Kx-1,Ky+1)
Pixel (K with the left sidex,Ky-1) do not connect, and image FkAt pixel (Kx,Ky) place is foreground pixel point, then will increase
Add a new connected region;I.e. enumerator number '=number+1 is as pixel (Kx,Ky) connection label, i.e.
label(Kx,Ky)=number ', and record the minimum abscissa value of this connected region, maximum abscissa value, minimum ordinate value
With maximum ordinate value: minimum abscissa value minxnumber′, maximum abscissa value maxxnumber′, minimum ordinate value
minynumber′With maximum ordinate value maxynumber′Even, minxnumber′=Kx、maxxnumber′=Kx、minynumber'=Ky
And maxynumber'=Ky;If image FkIt is (K at coordinatex,Ky) place's pixel is background pixel point, then continue to scan on the next one
Point, wherein background pixel point is image FkThe pixel of middle composition background;
3) according to process 2) described in scanogram FkIn all pixels, if scanned, then perform process 4);
4) from left to right, from top to bottom traversing graph as FkIn all different connected regions, according to record all differences
The minimum abscissa value of connected region, maximum abscissa value, minimum ordinate value and maximum ordinate value: minxnumber、
maxxnumber、minynumberAnd maxynumberCalculate the height H of each connected regionnumberWith width Wnumber, it may be assumed that
Hnumber=maxxnumber-minxnumber
Wnumber=maxynumber-minynumber
Will height HnumberWith width WnumberProduct as the similar area i.e. S of each connected regionnumber=Hnumber*
Wnumber, by the area S of relatively each connected regionnumber, by area maximum MAX (Snumber) connected region be designated as maximum fortune
Dynamic model block, preserves the minimum abscissa value of largest motion module, maximum abscissa value, minimum ordinate value and maximum ordinate
Value: MAXS (minxnumber)、MAXS(maxxnumber)、MAXS(minynumber) and MAXS (maxynumber);Due to image FkIn
Largest motion module be by above-mentioned steps process image AkObtained by, therefore image AkIn largest motion module and figure
As FkIn largest motion module coordinate information identical, with minimum and maximum abscissa column, the minimum of largest motion module
It is expert at maximum ordinate and is formed a height of MAXS (maxxnumber)-MAXS(minxnumber), a width of MAXS (maxynumber)-
MAXS(minynumber) rectangle frame, i.e. four coordinate points of rectangle frame are (MAXS (minxnumber),MAXS(minynumber)),
(MAXS(minxnumber),MAXS(maxynumber)), (MAXS (maxxnumber),MAXS(minynumber)), (MAXS
(maxxnumber),MAXS(maxynumber)), the rectangle frame that order obtains is shown in red;With red rectangle frame by image AkIn
Largest motion module frame is selected, and then obtains the mobile target image with red rectangle collimation mark noteThen judge that monitoring region has
Object is invaded.
Described in step 3 by characteristics of human body's recognition methods judge whether need report to the police detailed process be:
If monitoring region has object to invade, set different threshold decision conditions, it is determined that mobile target imageIn red
Whether color rectangle frame meets characteristics of human body, if met, is considered human body, needs to report to the police;If not meeting characteristics of human body, then
Can judge whether to report to the police according to initial setting of user;If the mobile target image with red rectangle collimation mark noteIn, mark
A length of l of the red rectangle frame of notek, a width of bk, work as bkMore than lk, then it is assumed that intrusion object is upright;To people from uprightly
Moving object in distinguish, characteristics of human body can be passed through, characteristics of human body's recognition methods of the present invention is described as follows:
If mobile target imageIn, a length of l of the red rectangle frame of labellingk, a width of bk, then lk/bkCan be approximated to be into
Invade the length-width ratio of object, lk*bkCan be approximated to be the area of intrusion object;If lk/bkLess than θkOr more than βk, or lk*bk
Less than αkOr more than εkTime, it not the most human body, and if only if θk≤lk/bk≤βkAnd αk≤lk*bk≤εkTime, it is judged that for human body
Monitoring instruction region;Wherein, threshold θk、βk、αkAnd εkValue by IP Camera with monitoring region distance determine, if net
The distance in network video camera and monitoring region is when H rice distance, and the monitoring range of web camera is long LAk, wide KAk;Therefore lk/bk
Lower proportion ratio threshold θkIt is set asUpper limit proportion threshold value βkIt is set as 7;lk*bkLower limit area threshold αkIt is set as current
Monitoring image areaUpper limit area threshold εkIt is set as current monitor image area
If having human body to invade by detection, then start alarm module by DSP, without inspection
Measure human body invasion, then DSP will not start alarm module, and monitoring region is entered by web camera by continuation
Row video acquisition.
A kind of intrusion alarm device based on Android intelligent, it is characterised in that including: web camera, movement
Module of target detection, power module, DSP, alarm module, gsm module, Ethernet and Android intelligence
Cell-phone customer terminal, web camera video acquisition output port is connected with DSP video acquisition input port,
Power module output port of power source is connected with web camera power input port, alarm module, gsm module, power module, shifting
Moving-target detection module electrically connects with DSP respectively, gsm module and Android intelligent client without
Line communication connects, and the RJ-45 Ethernet interface of web camera is connected with Ethernet by netting twine, Android intelligent visitor
The video information that family end can be gathered by ethernet access web camera.
Described alarm module includes the audible-visual annunciator being made up of flash lamp and speaker and can record according to user's request
Enter the voice broadcast module of different phonetic;
Compared with prior art the invention has the beneficial effects as follows:
In the present invention, Android intelligent client is responsible for receiving, playing and record monitoring remote video data, compares
In traditional long-distance monitoring method, it is not necessary to install independent PC or hardware decoder material, can be by Android intelligent client
End unites two into one with intrusion alarm monitoring system, and smart mobile phone is more and more universal, makes average family spend 650 to 1500 yuan i.e.
Can realize monitoring instruction, therefore the present invention has feature cheap and easy for installation, is mainly used in family or office etc.
Report to the police in place.
Alarm method of the present invention be utilize Android intelligent client to be monitored, monitoring of a recorded programme region
Video, and by audible-visual annunciator and voice broadcast module deterrence invader, this illegal invasion card contributing to preserving invader
According to.
Android intelligent client is handy to carry about, and therefore user can receive from invasion anywhere or anytime
The warning message of monitoring system;When warning system is started working, if having object to move in the region of network shooting machine monitoring
Dynamic and system judges it is human body, then can send information and mail by designated telephone and mailbox, thus reaches to report to the police and connect in real time
The purpose received, this intrusion alarm method and device has simple to operate, real-time and that warning accuracy rate is high feature.
Accompanying drawing explanation
The present invention is further illustrated below in conjunction with the accompanying drawings:
Fig. 1 is the structural schematic block diagram of a kind of intrusion alarm device based on Android intelligent of the present invention.
Fig. 2 is the flow chart of a kind of intrusion alarm method based on Android intelligent of the present invention.
Fig. 3 is the alarm module signal of a kind of intrusion alarm device based on Android intelligent of the present invention
Block diagram.
In figure: 1, user, 2, Android intelligent client, 3, GSM, 4, Ethernet, 5, alarm module, 501, sound
Light crossing-signal, 502, voice broadcast module, 6, gsm module, 7, power module, 8, DSP, 9, mobile target
Detection module, 10, web camera, 11, invasion personnel.
Detailed description of the invention
In order to make the purpose of the present invention, summary of the invention and advantage clearer, below in conjunction with the accompanying drawings the present invention is made
Detailed description.Understand refering to Fig. 1, use intrusion alarm method and device based on Android intelligent, including including net
Network video camera 10, Moving target detection module 9, power module 7, DSP 8, alarm module 5, gsm module 6,
Ethernet 4 and Android intelligent client 2, web camera 10 video acquisition output port and DSP Digital Signal Processing
Device 8 video acquisition input port connects, and power module 7 output port of power source is connected with web camera 10 power input port,
Alarm module 5, gsm module 6, power module 7, Moving target detection module 9 electrically connect with DSP 8 respectively,
Gsm module 6 is connected with Android intelligent client 2 wireless telecommunications, and the RJ-45 Ethernet interface of web camera 10 leads to
Crossing netting twine to be connected with Ethernet 4, Android intelligent client 2 can access what web camera 10 gathered by Ethernet 4
Video information.
Described web camera 10 is by the video image acquisition in monitoring region to DSP 8
Moving target detection module 9, and the video image in the monitoring region being collected is carried out video image compression process, will compression
After video image be transferred to Android intelligent client 2 by Ethernet 4;In described DSP 8
Moving target detection module 9 through to monitoring region in vedio data be identified, judge and analyze after, pass through
DSP 8 controls gsm module 6 and sends warning message and mail to Android phone client 2, and triggers report
Alert module 5 carries out onsite alarming, and the video image in monitoring region is passed by web camera 10 by RTP/RTCP agreement simultaneously
Being passed to Ethernet 4, user 1, after receiving warning message, opens Android intelligent client 2 and plays out.Described
Alarm module 5 is made up of audible-visual annunciator 501 and voice broadcast module 502, and wherein audible-visual annunciator includes flash lamp and raises one's voice
Device;Described Android intelligent client (2) is carried with by user, and user (1) utilizes Ethernet (4) to connect invasion
Test side web camera (10), it is achieved the function that monitoring in real time, recording evidence and assistance are reported to the police.
In the implementation case, intrusion detection end web camera model is EasyN FS-613A-M136, and external 5V is straight
Stream power supply, is connected with Ethernet by RJ-45 Ethernet interface and realizes data transmission;Gsm module 7 model is Huawei
GTM900-B, is inside provided with a SIM, and SIM is for realizing the communication of gsm module 7 and Android intelligent client 2 even
Connect;Android intelligent model is Huawei's C199s Android mobile phone, and it is configured to 5.5 inch screen, 2G internal memory, 16G hard disk,
The version selecting Android intelligent operating system is Android 4.4, and version number is V100R001C92B263;Voice is broadcast
The model that report module uses Hua Bang ISD company to produce is ISD1700 voice broadcast module, running voltage 2.4V-5.5V;Numeral letter
Number processor uses C667X DSP.
The video data that Android intelligent client is transmitted through Ethernet by Network Capture web camera, from
And reach the purpose monitored, can record non-by touching " starting to record " button in Android intelligent client simultaneously
Method invasion video information.
Refering to Fig. 2, Android intelligent client is mainly responsible for receiving, playing and monitoring of a recorded programme end web camera
The video of shooting, and receive alarming short message and mail.The tool of intrusion alarm method and device based on Android intelligent
It is as follows that body realizes step:
Starting stage, the initialization of equipment to be carried out, user inputs web camera in Android intelligent client
IP address;At initial phase, user opens Android intelligent client, enters Android intelligent client
Interface, uses the IP address needing to input this IP Camera machine at IP address field first, and the IP address of web camera can quilt
Android intelligent client automatically saves, and reuses and Button Login can be selected to be directly entered Android intelligent
Client.
Step one, when equipment is by after Initialize installation, and user opens intrusion alarm device, and web camera is by monitored space
Video image acquisition in territory is in DSP, and carries out the video image in the monitoring region being collected
Video image compression processes, and by Ethernet, the video image after compression is transferred to Android intelligent client;
The monitoring image that in step 2, DSP, step one is gathered by Moving target detection module is carried out
Moving target detection, the change using Three image difference to calculate monitoring region judges to monitor the tool whether region has object to invade
Body process is:
(1) use Three image difference that the mobile target entering monitoring region is monitored, take three two field pictures continuously, by phase
Two adjacent two field pictures are the poorest, then by do the image of after the recovery respectively through gaussian filtering, maximum between-cluster variance threshold method, patrol
Volume computing and morphology operations obtain the bianry image of mobile target neighbor frame difference;
If Ak-1、Ak、Ak+1It is respectively this monitoring system video image in the monitoring region collected the obtained
The continuous picture of k-1, k, k+1 frame, it is thus achieved that adjacent image do difference, then:
Bk=| Ak-Ak-1|
Bk+1=| Ak+1-Ak|
For reducing noise to image B derived abovekWith image Bk+1Impact, by respectively to image BkWith image Bk+1Adopt
Gaussian filtering process is carried out by 3*3 template, i.e. by by each pixel in a 3*3 template scanogram, true by template
In fixed neighborhood, the weighted average gray value of pixel goes the value of alternate template central pixel point, thus the noise that is eliminated is smooth
Image CkAnd Ck+1, the neighborhood definition of the most each pixel is a circle centered by the coordinate figure of described each pixel
The set of point on inside or border;
If threshold value TkBy image CkBeing divided into prospect i.e. target, and background two class, wherein prospect is image CkMiddle pixel value is big
In equal to threshold value TkPixel, background is image CkMiddle pixel value is less than threshold value TkPixel, even image CkAt coordinate
(x, y) the pixel C at placek(Kx,Ky)≥Tk, then Ck(Kx,Ky) it is prospect, if image CkAt coordinate (x, y) the pixel C at placek
(Kx,Ky)<Tk, then Ck(Kx,Ky) it is background, and threshold value TkMake the variance between this two class of foreground and background maximum;If threshold value
Tk+1By image Ck+1Being divided into prospect i.e. target, and background two class, wherein prospect is image Ck+1Middle pixel value is more than or equal to threshold value
Tk+1Pixel, background is image Ck+1Middle pixel value is less than threshold value TkPixel, even image Ck+1At coordinate (x, y) place
Pixel Ck+1(K+1x,K+1y)≥Tk+1, then Ck+1(K+1x,K+1y) it is prospect, if image Ck+1At coordinate (x, y) picture at place
Vegetarian refreshments Ck+1(K+1x,K+1y)<Tk+1, then Ck+1(K+1x,K+1y) it is background, and threshold value Tk+1Make this two class of foreground and background it
Between variance maximum;Then Tk、Tk+1It is respectively image Ck、Ck+1Optimal threshold, the calculating process of optimal threshold is as follows:
If image CIFor the I-frame video image in the monitoring region that web camera collects, wherein CIComprise L ash
Degree level 0,1 ..., L-1}, gray value be the pixel number of i be ni, then total pixel isGray scale is that the pixel of i goes out
Existing probability isEntire image is divided into target M by thresholding t1With background M2Two classes, the then meter of the inter-class variance δ of this two class
Calculation formula is:
In formula,WithIt is respectively target M1With background M2The probability that two classes occur;
WithIt is respectively target M1With background M2The gray average of two classes, the optimal threshold of segmentation is that inter-class variance calculates public affairs
Formula takes thresholding t value during maximum, is designated as TI:
Image C is tried to achieve by above-mentioned optimal threshold computational methodsk、Ck+1Optimal threshold Tk、Tk+1, then use optimal threshold
Value Tk、Tk+1Respectively to image Ck、Ck+1Binaryzation obtains prospect bianry image Dk、Dk+1, it is maximum between-cluster variance threshold method, uses
Formula is expressed as follows:
Dk=threshold (| Ck|)
Dk+1=threshold (| Ck+1|)
(2) the prospect bianry image D that will obtaink、Dk+1Carry out logic "and" operation, wherein image DkIn prospect and image
Dk+1In prospect carry out AND operation after obtain the image of prospect and be image AkThe shape profile of middle moving target, formula table
Reach for:
Ek=Dk And Dk+1
Due to effect of noise, image Dk、Dk+1Image E obtained after carrying out logical operationskBorder is the most not perfectly flat
Sliding, foreground area has some noise holes, and is studded with some little noise objects on background area, is opened by morphologic
Computing, i.e. after excessive erosion reflation thus remove the noise hole in bianry image, obtain the image F after de-noisingk, wherein
Expansion is each pixel using structural element G scanogram, and the bianry image covered with it does OR operation;Corrosion is to use
Each pixel of structural element G scanogram, and the bianry image covered with it does AND-operation;Fortune is opened in the morphology of image
Calculation formula is as follows:
(3) by using connection eight neighborhood rule, it is thus achieved that image FkIn the minimum abscissa value in largest connected region, maximum
Abscissa value, minimum ordinate value and maximum ordinate value, thus obtain the mobile target image of red rectangle collimation mark noteReal
Existing step is as follows:
1) in two dimensional image, it is assumed that have the pixel that z is adjacent around target pixel points, wherein z≤8, if this pixel
In z pixel of gray scale and this, the gray value of some pixel Q is equal, then claim this pixel and Q to have connectedness;Connection eight is adjacent
Territory rule is to choose object pixel all of adjacent picture in two-dimensional space, be upper and lower, left and right, upper left, upper right, lower-left,
Eight, bottom right neighbor pixel;By using connection eight neighborhood rule to image FkIn each pixel label is set,
To image FkThe connected component labeling matrix of pixel, label initial value is all set to 0;If image FkPixel (Kx,Ky), its connection
Region labeling is label (Kx,Ky), wherein image FkPixel (Kx,Ky) eight neighborhood coordinate be (Kx-1,Ky)、(Kx+1,Ky)、
(Kx,Ky-1)、(Kx,Ky+1)、(Kx-1,Ky-1)、(Kx-1,Ky+1)、(Kx+1,Ky-1) and (Kx+1,Ky+1);
2) first from image FkThe upper left corner start progressive scan, be i.e. from storage image Fk0 row 0 of the matrix of pixel arranges
Starting progressive scan, from top to bottom, every a line scans from left to right;When scanning image FkPixel (Kx,Ky) time, sweep
Retouch and complete (Kx,Ky) the adjacent pixel in the top of pixel and the left side, obtain label (Kx-1,Ky)、label
(Kx-1,Ky-1)、label(Kx-1,Ky+1) and label (Kx,Ky-1) value;
If image FkCoordinate is (Kx,Ky) place's pixel is foreground pixel point, and the value of its pixel is adjacent pixel
It is worth identical, then it is assumed that these pixels are connections, and wherein foreground pixel point is image FkThe pixel of middle composition prospect;If picture
Vegetarian refreshments (Kx,Ky) it is adjacent pixel (Kx-1,Ky)、(Kx-1,Ky-1)、(Kx-1,Ky+1) and (Kx,Ky-1) connection, then label
(Kx,Ky) value equal to label (Kx-1,Ky)、label(Kx-1,Ky-1)、label(Kx-1,Ky+1) and label (Kx,Ky-1In the middle of)
The label that value is minimum, and it is vertical to update the minimum abscissa value of this connected region, maximum abscissa value, minimum ordinate value and maximum
Coordinate figure: minimum abscissa value minxnumber, maximum abscissa value maxxnumber, minimum ordinate value minynumberIndulge with maximum
Coordinate figure maxynumber, wherein number is the label of this connected region;
If image FkIn be numbered the connected region of number, if the scanning of this connected region is to pixel (Kx,Ky) time,
The minimum abscissa value of this connected region recorded, maximum abscissa value, minimum ordinate value and maximum ordinate value: minimum
Abscissa value minxnumber, maximum abscissa value maxxnumber, minimum ordinate value minynumberWith maximum ordinate value
maxynumber, and pixel (Kx,Ky) be adjacent pixel connection, then update the minimum abscissa value of this connected region, maximum
Abscissa value, minimum ordinate value and maximum ordinate value, if now Kx≥maxxnumber, then maxxnumber=KxAnd
minxnumberValue keeps constant, if minxnumber<Kx<maxxnumber, then minxnumberAnd maxxnumberValue all keeps constant;If
Kx≤minxnumber, then minxnumber=KxAnd maxxnumberValue keeps constant;If now Ky≥maxynumber, then maxynumber
=KyAnd minynumberValue keeps constant, if minynumber<Ky<maxynumber, then minynumberAnd maxynumberValue all keeps not
Become;If Ky≤minynumber, then minynumber=KyAnd maxynumberValue keeps constant;
If image FkPixel (Kx,Ky) and the pixel (K of its topx-1,Ky)、(Kx-1,Ky-1)、(Kx-1,Ky+1)
Pixel (K with the left sidex,Ky-1) do not connect, and image FkAt pixel (Kx,Ky) place is foreground pixel point, then will increase
Add a new connected region;I.e. enumerator number '=number+1 is as pixel (Kx,Ky) connection label, i.e.
label(Kx,Ky)=number ', and record the minimum abscissa value of this connected region, maximum abscissa value, minimum ordinate value
With maximum ordinate value: minimum abscissa value minxnumber′, maximum abscissa value maxxnumber′, minimum ordinate value
minynumber′With maximum ordinate value maxynumber′Even, minxnumber′=Kx、maxxnumber′=Kx、minynumber'=Ky
And maxynumber′=Ky;If image FkIt is (K at coordinatex,Ky) place's pixel is background pixel point, then continue to scan on the next one
Point, wherein background pixel point is image FkThe pixel of middle composition background;
3) according to process 2) described in scanogram FkIn all pixels, if scanned, then perform process 4);
4) from left to right, from top to bottom traversing graph as FkIn all different connected regions, according to record all differences
The minimum abscissa value of connected region, maximum abscissa value, minimum ordinate value and maximum ordinate value: minxnumber、
maxxnumber、minynumberAnd maxynumberCalculate the height H of each connected regionnumberWith width Wnumber, it may be assumed that
Hnumber=maxxnumber-minxnumber
Wnumber=maxynumber-minynumber
Will height HnumberWith width WnumberProduct as the similar area i.e. S of each connected regionnumber=Hnumber*
Wnumber, by the area S of relatively each connected regionnumber, by area maximum MAX (Snumber) connected region be designated as maximum fortune
Dynamic model block, preserves the minimum abscissa value of largest motion module, maximum abscissa value, minimum ordinate value and maximum ordinate
Value: MAXS (minxnumber)、MAXS(maxxnumber)、MAXS(minynumber) and MAXS (maxynumber);Due to image FkIn
Largest motion module be by above-mentioned steps process image AkObtained by, therefore image AkIn largest motion module and figure
As FkIn largest motion module coordinate information identical, with minimum and maximum abscissa column, the minimum of largest motion module
It is expert at maximum ordinate and is formed a height of MAXS (maxxnumber)-MAXS(minxnumber), a width of MAXS (maxynumber)-
MAXS(minynumber) rectangle frame, i.e. four coordinate points of rectangle frame are (MAXS (minxnumber),MAXS(minynumber)),
(MAXS(minxnumber),MAXS(maxynumber)), (MAXS (maxxnumber),MAXS(minynumber)), (MAXS
(maxxnumber),MAXS(maxynumber)), the rectangle frame that order obtains is shown in red;With red rectangle frame by image AkIn
Largest motion module frame is selected, and then obtains the mobile target image with red rectangle collimation mark noteThen judge that monitoring region has
Object is invaded.
Moving target detection module in step 3, DSP, according to monitoring regarding in region in step 2
Frequently the change of image, by being identified characteristics of human body, it may be judged whether needs to report to the police;If be detected that have human body to invade, then
Alarm module, without detecting that human body is invaded, then DSP is started by DSP
Will not start alarm module, continuation is carried out video acquisition to monitoring region by web camera, is wherein identified by characteristics of human body
Method judges whether that the detailed process needing to report to the police is:
If monitoring region has object to invade, set different threshold decision conditions, it is determined that mobile target imageIn red
Whether color rectangle frame meets characteristics of human body, if met, is considered human body, needs to report to the police;If not meeting characteristics of human body, then
Can judge whether to report to the police according to initial setting of user;If the mobile target image with red rectangle collimation mark noteIn, mark
A length of l of the red rectangle frame of notek, a width of bk, work as bkMore than lk, then it is assumed that intrusion object is upright;To people from uprightly
Moving object in distinguish, characteristics of human body can be passed through, characteristics of human body's recognition methods of the present invention is described as follows:
If mobile target imageIn, a length of l of the red rectangle frame of labellingk, a width of bk, then lk/bkCan be approximated to be into
Invade the length-width ratio of object, lk*bkCan be approximated to be the area of intrusion object;If lk/bkLess than θkOr more than βk, or lk*bk
Less than αkOr more than εkTime, it not the most human body, and if only if θk≤lk/bk≤βkAnd αk≤lk*bk≤εkTime, it is judged that for human body
Monitoring instruction region;Wherein, the height of normal human is between 0.8-2 rice, and width is 0.3-1 rice, does not temporarily consider people here
The situation of the abnormal invasion of body;Threshold θk、βk、αkAnd εkValue by IP Camera with monitoring region distance determine, if net
The distance in network video camera and monitoring region is when M rice distance, and the monitoring range of web camera is high LAk, wide KAk;Therefore lk/bk
Lower proportion ratio threshold θkIt is set asUpper limit proportion threshold value βkIt is set as 7;lk*bkLower limit area threshold αkIt is set as current
Monitoring image areaUpper limit area threshold εkIt is set as current monitor image area
If having human body to invade by detection, then start alarm module by DSP, without inspection
Measure human body invasion, then DSP will not start alarm module, and monitoring region is entered by web camera by continuation
Row video acquisition;
If step 4 is found to have human body by the detection of Moving target detection module and invades, then device starts alarm module
And gsm module;Invasion personnel will be frightened by alarm module by audible-visual annunciator and voice broadcast module;Wherein report to the police mould
Block includes the audible-visual annunciator being made up of flash lamp and speaker and can be according to the voice broadcast of user's request typing different phonetic
Module;While starting alarm module, transmission note and mail are carried in time by gsm module to Android intelligent client
Wake up user;After user receives information and mail reminder, by Android intelligent client, monitoring client web camera is adopted
Video image information in the monitoring region of collection carries out recording preservation and reporting to the police.User passes through Android intelligent client,
Log in the IP address preset, check mobile target image in the monitoring region that web camera shootsInformation, and pass through
" starting to record " button in Android intelligent client and Alarm button, record the illegal invasion video of invader
And report to the police;When invader leaves monitoring region, touch " terminating to record " button and terminate to record, preserve illegal invasion video letter
Cease to mobile phone.
By Android intelligent client, the video image of monitoring client web camera typing is preserved, and
Display alarm button, main working process is as follows:
1) note is set by Android phone client and mail reception is reminded, when communication module sends postal to user
When part and SMS, Android intelligent receive the report for police service information and mail reception prompting, by Android intelligence hands
Input the IP address of map network video camera in machine client, conduct interviews;
2) by touching the recording button above Android intelligent client, start monitored area is carried out video
Monitoring and recording, until selecting " terminating to record " button, return Android intelligent client;
3) by touching the alarm button above Android intelligent client, " being confirmed whether to report to the police " prompting occurs
Frame asks the user whether to report to the police;If selection "Yes", report to the police the most immediately;If selection "No", then return Android intelligent
Client.
Claims (6)
1. an intrusion alarm method based on Android intelligent, it is characterised in that step is as follows:
Step one, web camera (10) by the video image acquisition in monitoring region in DSP (8),
And to be collected monitoring region in video image carry out video image compression process, will compression after video image by with
Too net (4) is transferred to Android intelligent client (2);
In the monitoring region that in step 2, DSP (8), step one is gathered by Moving target detection module (9)
Video image move target detection, the change using Three image difference to calculate the video image in monitoring region judges
Whether monitoring region has object to invade;
Moving target detection module (9) in step 3, DSP (8), monitors in region according in step 2
The change of video image, by being identified characteristics of human body, it may be judged whether needs to report to the police;If be detected that there is human body to invade,
Then start alarm module (5) by DSP;Without detecting that human body is invaded, then at DSP digital signal
Reason device will not start alarm module (5), and continuation is carried out video acquisition to monitoring region by web camera (10);
If step 4 is found to have human body by Moving target detection module (9) detection and invades, then device starts alarm module
And gsm module (6) (5);Alarm module (5) will be by audible-visual annunciator (501) and voice broadcast module (502) to invasion personnel
Frighten;While starting alarm module (5), gsm module (6) will send note and mail to Android intelligent visitor
Family end (2) reminds user (1) in time;After user (1) receives information and mail reminder, by Android intelligent client
(2) video image information in the monitoring region gathered monitoring client web camera (10) carries out recording preservation and reporting to the police.
A kind of intrusion alarm method and device based on Android intelligent the most according to claim 1, its feature exists
In the video image in the monitoring region being collected being carried out video image compression process described in step one, select MPEG-4
Video image after compression, as the compression standard of video data, is transferred to Android intelligence hands by Ethernet (4) by standard
Machine client (2) uses RTP/RTCP protocol stack to realize.
A kind of intrusion alarm method and device based on Android intelligent the most according to claim 2, its feature exists
In the judgement detailed process whether monitoring region has object to invade described in step 2 it is:
(1) use Three image difference that the mobile target entering monitoring region is monitored, take three two field pictures continuously, by adjacent
Two two field pictures are the poorest, then will do the image of after the recovery respectively through gaussian filtering, maximum between-cluster variance threshold method, logic fortune
Calculation and morphology operations obtain the bianry image of mobile target neighbor frame difference;
If Ak-1、Ak、Ak+1Be respectively this monitoring system from collect monitoring region in video image obtain kth-1, k,
The continuous picture of k+1 frame, it is thus achieved that adjacent image do difference, then:
Bk=| Ak-Ak-1|
Bk+1=| Ak+1-Ak|
For reducing noise to image B derived abovekWith image Bk+1Impact, by respectively to image BkWith image Bk+1Use 3*3
Template carries out gaussian filtering process, i.e. by with each pixel in a 3*3 template scanogram, the neighbour determined by template
In territory, the weighted average gray value of pixel goes the value of alternate template central pixel point, thus the smoothed image C of the noise that is eliminatedk
And Ck+1, the neighborhood definition of the most each pixel be centered by the coordinate figure of described each pixel one circle internal or
The set of point on border;
If threshold value TkBy image CkBeing divided into prospect i.e. target, and background two class, wherein prospect is image CkMiddle pixel value is more than
In threshold value TkPixel, background is image CkMiddle pixel value is less than threshold value TkPixel, even image CkCoordinate (x, y)
The pixel C at placek(Kx,Ky)≥Tk, then Ck(Kx,Ky) it is prospect, if image CkAt coordinate (x, y) the pixel C at placek(Kx,Ky)<
Tk, then Ck(Kx,Ky) it is background, and threshold value TkMake the variance between this two class of foreground and background maximum;If threshold value Tk+1By image
Ck+1Being divided into prospect i.e. target, and background two class, wherein prospect is image Ck+1Middle pixel value is more than or equal to threshold value Tk+1Pixel
Point, background is image Ck+1Middle pixel value is less than threshold value TkPixel, even image Ck+1At coordinate (x, y) pixel at place
Ck+1(K+1x,K+1y)≥Tk+1, then Ck+1(K+1x,K+1y) it is prospect, if image Ck+1At coordinate (x, y) the pixel C at placek+1(K
+1x,K+1y)<Tk+1, then Ck+1(K+1x,K+1y) it is background, and threshold value Tk+1Make the variance between this two class of foreground and background
Greatly;Then Tk、Tk+1It is respectively image Ck、Ck+1Optimal threshold, the calculating process of optimal threshold is as follows:
If image CIFor the I-frame video image in the monitoring region that web camera collects, wherein CIComprise L gray level
0,1 ..., L-1}, gray value be the pixel number of i be ni, then total pixel isGray scale is the pixel probability of occurrence of i
ForEntire image is divided into target M by thresholding t1With background M2Two classes, the then computing formula of the inter-class variance δ of this two class
For:
In formula,WithIt is respectively target M1With background M2The probability that two classes occur;WithIt is respectively target M1With background M2The gray average of two classes, the optimal threshold of segmentation is inter-class variance computing formula
In thresholding t value when taking maximum, be designated as TI:
Image C is tried to achieve by above-mentioned optimal threshold computational methodsk、Ck+1Optimal threshold Tk、Tk+1, then use optimal threshold Tk、
Tk+1Respectively to image Ck、Ck+1Binaryzation obtains prospect bianry image Dk、Dk+1, it is maximum between-cluster variance threshold method, uses formula
It is expressed as follows:
Dk=threshold (| Ck|)
Dk+1=threshold (| Ck+1|)
(2) the prospect bianry image D that will obtaink、Dk+1Carry out logic "and" operation, wherein image DkIn prospect and image Dk+1
In prospect carry out AND operation after the prospect that obtains be image AkThe shape profile of middle moving target, formula is expressed as:
Ek=Dk And Dk+1
Due to effect of noise, image Dk、Dk+1Image E obtained after carrying out logical operationskBorder generally the most not perfectly flat cunning, front
Scene area has some noise holes, and is studded with some little noise objects on background area, by morphologic opening operation,
I.e. after excessive erosion reflation thus remove the noise hole in bianry image, obtain the image F after de-noisingk, wherein expand
It is each pixel using structural element G scanogram, and the bianry image covered with it does OR operation;Corrosion is to use structure
Each pixel of element G scanogram, and the bianry image covered with it does AND-operation;The morphology opening operation of image is public
Formula is as follows:
(3) by using connection eight neighborhood rule, it is thus achieved that image FkIn the minimum abscissa value in largest connected region, maximum horizontal seat
Scale value, minimum ordinate value and maximum ordinate value, thus obtain the mobile target image of red rectangle collimation mark noteRealize step
Rapid as follows:
1) in two dimensional image, it is assumed that have the pixel that z is adjacent around target pixel points, wherein z≤8, if this pixel grey scale
Equal with the gray value of some pixel Q in this z pixel, then to claim this pixel and Q to have connectedness;Connection eight neighborhood rule
It is then to choose object pixel all of adjacent picture in two-dimensional space, is upper and lower, left and right, upper left, upper right, lower-left, bottom right
Eight neighbor pixels;By using connection eight neighborhood rule to image FkIn each pixel label is set, obtain figure
As FkThe connected component labeling matrix of pixel, label initial value is all set to 0;If image FkPixel (Kx,Ky), its connected region
It is numbered label (Kx,Ky), wherein image FkPixel (Kx,Ky) eight neighborhood coordinate be (Kx-1,Ky)、(Kx+1,Ky)、(Kx,
Ky-1)、(Kx,Ky+1)、(Kx-1,Ky-1)、(Kx-1,Ky+1)、(Kx+1,Ky-1) and (Kx+1,Ky+1);
2) first from image FkThe upper left corner start progressive scan, be i.e. from storage image Fk0 row 0 row of the matrix of pixel start
Progressive scan, from top to bottom, every a line scans from left to right;When scanning image FkPixel (Kx,Ky) time, scan through
Become (Kx,Ky) the adjacent pixel in the top of pixel and the left side, obtain label (Kx-1,Ky)、label(Kx-1,
Ky-1)、label(Kx-1,Ky+1) and label (Kx,Ky-1) value;
If image FkCoordinate is (Kx,Ky) place's pixel is foreground pixel point, and the value of its pixel is adjacent pixel point value phase
With, then it is assumed that these pixels are connections, and wherein foreground pixel point is image FkThe pixel of middle composition prospect;If pixel
(Kx,Ky) it is adjacent pixel (Kx-1,Ky)、(Kx-1,Ky-1)、(Kx-1,Ky+1) and (Kx,Ky-1) connection, then label (Kx,
Ky) value equal to label (Kx-1,Ky)、label(Kx-1,Ky-1)、label(Kx-1,Ky+1) and label (Kx,Ky-1) when intermediate value
Little label, and update the minimum abscissa value of this connected region, maximum abscissa value, minimum ordinate value and maximum ordinate
Value: minimum abscissa value minxnumber, maximum abscissa value maxxnumber, minimum ordinate value minynumberAnd maximum ordinate
Value maxynumber, wherein number is the label of this connected region;
If image FkIn be numbered the connected region of number, if the scanning of this connected region is to pixel (Kx,Ky) time, remember
The minimum abscissa value of this connected region of record, maximum abscissa value, minimum ordinate value and maximum ordinate value: minimum horizontal seat
Scale value minxnumber, maximum abscissa value maxxnumber, minimum ordinate value minynumberWith maximum ordinate value maxynumber,
And pixel (Kx,Ky) be adjacent pixel connection, then update the minimum abscissa value of this connected region, maximum abscissa value,
Minimum ordinate value and maximum ordinate value, if now Kx≥maxxnumber, then maxxnumber=KxAnd minxnumberValue keeps not
Become, if minxnumber<Kx<maxxnumber, then minxnumberAnd maxxnumberValue all keeps constant;If Kx≤minxnumber, then
minxnumber=KxAnd maxxnumberValue keeps constant;If now Ky≥maxynumber, then maxynumber=KyAnd minynumberValue
Keep constant, if minynumber<Ky<maxynumber, then minynumberAnd maxynumberValue all keeps constant;If Ky≤
minynumber, then minynumber=KyAnd maxynumberValue keeps constant;
If image FkPixel (Kx,Ky) and the pixel (K of its topx-1,Ky)、(Kx-1,Ky-1)、(Kx-1,Ky+1) and the left side
Pixel (Kx,Ky-1) do not connect, and image FkAt pixel (Kx,Ky) place is foreground pixel point, then will increase by one
New connected region;I.e. enumerator number '=number+1 is as pixel (Kx,Ky) connection label, i.e. label (Kx,
Ky)=number ', and it is vertical to record the minimum abscissa value of this connected region, maximum abscissa value, minimum ordinate value and maximum
Coordinate figure: minimum abscissa value minxnumber′, maximum abscissa value maxxnumber′, minimum ordinate value minynumber′And maximum
Ordinate value maxynumber′Even, minxnumber′=Kx、maxxnumber′=Kx、minynumber′=KyAnd maxynumber′=Ky;
If image FkIt is (K at coordinatex,Ky) place's pixel is background pixel point, then continue to scan on next point, wherein background pixel
Point is image FkThe pixel of middle composition background;
3) according to process 2) described in scanogram FkIn all pixels, if scanned, then perform process 4);
4) from left to right, from top to bottom traversing graph as FkIn all different connected regions, according to record all different connections
The minimum abscissa value in region, maximum abscissa value, minimum ordinate value and maximum ordinate value: minxnumber、maxxnumber、
minynumberAnd maxynumberCalculate the height H of each connected regionnumberWith width Wnumber, it may be assumed that
Hnumber=maxxnumber-minxnumber
Wnumber=maxynumber-minynumber
Will height HnumberWith width WnumberProduct as the similar area i.e. S of each connected regionnumber=Hnumber*Wnumber,
Area S by relatively each connected regionnumber, by area maximum MAX (Snumber) connected region be designated as largest motion module,
Preserve the minimum abscissa value of largest motion module, maximum abscissa value, minimum ordinate value and maximum ordinate value: MAXS
(minxnumber)、MAXS(maxxnumber)、MAXS(minynumber) and MAXS (maxynumber);Due to image FkIn maximum fortune
Dynamic model block is to process image A by above-mentioned stepskObtained by, therefore image AkIn largest motion module and image FkIn
Largest motion module coordinate information is identical, indulges with minimum and maximum abscissa column, the minimum and maximum of largest motion module
Coordinate is expert at and is formed a height of MAXS (maxxnumber)-MAXS(minxnumber), a width of MAXS (maxynumber)-MAXS
(minynumber) rectangle frame, i.e. four coordinate points of rectangle frame are (MAXS (minxnumber),MAXS(minynumber)),
(MAXS(minxnumber),MAXS(maxynumber)), (MAXS (maxxnumber),MAXS(minynumber)), (MAXS
(maxxnumber),MAXS(maxynumber)), the rectangle frame that order obtains is shown in red;With red rectangle frame by image AkIn
Largest motion module frame is selected, and then obtains the mobile target image with red rectangle collimation mark noteThen judge that monitoring region has
Object is invaded.
A kind of intrusion alarm method and device based on Android intelligent the most according to claim 3, its feature exists
In described in step 3 by characteristics of human body's recognition methods judge whether need report to the police detailed process be:
If monitoring region has object to invade, set different threshold decision conditions, it is determined that mobile target imageMiddle red square
Whether shape frame meets characteristics of human body, if met, is considered human body, needs to report to the police;If not meeting characteristics of human body, the most permissible
Initial setting according to user judges whether to report to the police;If the mobile target image with red rectangle collimation mark noteIn, labelling
A length of l of red rectangle framek, a width of bk, work as bkMore than lk, then it is assumed that intrusion object is upright;To people from upright fortune
Distinguishing in animal body, can pass through characteristics of human body, characteristics of human body's recognition methods of the present invention is described as follows:
If mobile target imageIn, a length of l of the red rectangle frame of labellingk, a width of bk, then lk/bkCan be approximated to be invader
The length-width ratio of body, lk*bkCan be approximated to be the area of intrusion object;If lk/bkLess than θkOr more than βk, or lk*bkIt is less than
αkOr more than εkTime, it not the most human body, and if only if θk≤lk/bk≤βkAnd αk≤lk*bk≤εkTime, it is judged that invade for human body
Monitoring region;Wherein, threshold θk、βk、αkAnd εkValue by IP Camera with monitoring region distance determine, if network is taken the photograph
The distance in camera and monitoring region is when H rice distance, and the monitoring range of web camera is long LAk, wide KAk;Therefore lk/bkUnder
Limit proportion threshold value θkIt is set asUpper limit proportion threshold value βkIt is set as 7;lk*bkLower limit area threshold αkIt is set as current monitor
Image areaUpper limit area threshold εkIt is set as current monitor image area
If having human body to invade by detection, then start alarm module (5) by DSP (8), without
Detect that human body is invaded, then DSP (8) will not start alarm module, and web camera (10) is right by continuation
Monitoring region carries out video acquisition.
5. an intrusion alarm device based on Android intelligent, it is characterised in that including: web camera (10), shifting
Moving-target detection module (9), power module (7), DSP (8), alarm module (5), gsm module (6), with
Too net (4) and Android intelligent client (2), web camera (10) video acquisition output port and DSP digital signal
Processor (8) video acquisition input port connects, and power module (7) output port of power source inputs with web camera (10) power supply
Port connects, and alarm module (5), gsm module (6), power module (7), Moving target detection module (9) are digital with DSP respectively
Signal processor (8) electrically connects, and gsm module (6) is connected with Android intelligent client (2) wireless telecommunications, network shooting
The RJ-45 Ethernet interface of machine (10) is connected with Ethernet (4) by netting twine, and Android intelligent client (2) can be passed through
Ethernet (4) accesses the video information that web camera (10) gathers.
A kind of intrusion alarm device based on Android intelligent the most according to claim 5, it is characterised in that institute
The alarm module (5) stated includes the audible-visual annunciator (501) being made up of flash lamp and speaker and can be according to user's request typing
The voice broadcast module (502) of different phonetic.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610638102.5A CN106251544A (en) | 2016-08-05 | 2016-08-05 | A kind of intrusion alarm method based on Android intelligent and alarm device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610638102.5A CN106251544A (en) | 2016-08-05 | 2016-08-05 | A kind of intrusion alarm method based on Android intelligent and alarm device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106251544A true CN106251544A (en) | 2016-12-21 |
Family
ID=58077851
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610638102.5A Pending CN106251544A (en) | 2016-08-05 | 2016-08-05 | A kind of intrusion alarm method based on Android intelligent and alarm device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106251544A (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106657936A (en) * | 2017-03-03 | 2017-05-10 | 苏州科技大学 | Voice warning method and system based on video monitoring of dangerous area |
CN107040768A (en) * | 2017-05-18 | 2017-08-11 | 深圳市海和高新技术有限公司 | The monitoring implementation method and system of smart home |
CN107134100A (en) * | 2017-06-05 | 2017-09-05 | 广西荣中科技有限责任公司 | A kind of safety-protection system |
CN107578422A (en) * | 2017-08-01 | 2018-01-12 | 中国农业大学 | A kind of pedestrian's trace detection system and method |
CN107801000A (en) * | 2017-10-17 | 2018-03-13 | 国网江苏省电力公司盐城供电公司 | A kind of transmission line of electricity external force damage prevention intelligent video monitoring system |
CN109409243A (en) * | 2018-09-29 | 2019-03-01 | 江南大学 | Human visual detection method in a kind of mobile target |
CN109448287A (en) * | 2018-10-25 | 2019-03-08 | 平安科技(深圳)有限公司 | A kind of method for safety monitoring, device, readable storage medium storing program for executing and terminal device |
CN109584490A (en) * | 2018-12-10 | 2019-04-05 | Tcl通力电子(惠州)有限公司 | Safety protection method, intelligent sound box and security system |
CN110889334A (en) * | 2019-11-06 | 2020-03-17 | 江河瑞通(北京)技术有限公司 | Personnel intrusion identification method and device |
CN111210462A (en) * | 2019-12-30 | 2020-05-29 | 视联动力信息技术股份有限公司 | Alarm method and device |
CN112399051A (en) * | 2020-10-15 | 2021-02-23 | 中标慧安信息技术股份有限公司 | Human body detection sound warning camera applied to garbage classification |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2004272754A (en) * | 2003-03-11 | 2004-09-30 | Matsushita Electric Ind Co Ltd | Alarm device, and alarm operating method |
CN101119481A (en) * | 2007-08-27 | 2008-02-06 | 刘文萍 | Remote alarm video monitoring system and method |
CN203025885U (en) * | 2012-12-11 | 2013-06-26 | 江苏大学 | Anti-theft alarming and calling system of valuable article |
CN203086601U (en) * | 2012-12-24 | 2013-07-24 | 天津市亚安科技股份有限公司 | Video monitoring device with acousto-optic warning function |
CN203588406U (en) * | 2013-12-06 | 2014-05-07 | 南开大学 | Intelligent security system based on infrared detection and video monitoring |
-
2016
- 2016-08-05 CN CN201610638102.5A patent/CN106251544A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2004272754A (en) * | 2003-03-11 | 2004-09-30 | Matsushita Electric Ind Co Ltd | Alarm device, and alarm operating method |
CN101119481A (en) * | 2007-08-27 | 2008-02-06 | 刘文萍 | Remote alarm video monitoring system and method |
CN203025885U (en) * | 2012-12-11 | 2013-06-26 | 江苏大学 | Anti-theft alarming and calling system of valuable article |
CN203086601U (en) * | 2012-12-24 | 2013-07-24 | 天津市亚安科技股份有限公司 | Video monitoring device with acousto-optic warning function |
CN203588406U (en) * | 2013-12-06 | 2014-05-07 | 南开大学 | Intelligent security system based on infrared detection and video monitoring |
Non-Patent Citations (4)
Title |
---|
宋斌: "一种新的图像连通域快速标号算法", 《电子测量技术》 * |
张伯虎: "《从零开始学弱电电工技术》", 30 October 2009 * |
朱秀昌等: "《数字图像处理与图像通信》", 30 June 2014 * |
谢剑斌等: "《视觉感知与智能视频监控》", 31 March 2012 * |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106657936A (en) * | 2017-03-03 | 2017-05-10 | 苏州科技大学 | Voice warning method and system based on video monitoring of dangerous area |
CN107040768A (en) * | 2017-05-18 | 2017-08-11 | 深圳市海和高新技术有限公司 | The monitoring implementation method and system of smart home |
CN107134100A (en) * | 2017-06-05 | 2017-09-05 | 广西荣中科技有限责任公司 | A kind of safety-protection system |
CN107578422A (en) * | 2017-08-01 | 2018-01-12 | 中国农业大学 | A kind of pedestrian's trace detection system and method |
CN107578422B (en) * | 2017-08-01 | 2024-04-09 | 中国农业大学 | Pedestrian tracking detection system and method |
CN107801000A (en) * | 2017-10-17 | 2018-03-13 | 国网江苏省电力公司盐城供电公司 | A kind of transmission line of electricity external force damage prevention intelligent video monitoring system |
CN109409243A (en) * | 2018-09-29 | 2019-03-01 | 江南大学 | Human visual detection method in a kind of mobile target |
CN109448287A (en) * | 2018-10-25 | 2019-03-08 | 平安科技(深圳)有限公司 | A kind of method for safety monitoring, device, readable storage medium storing program for executing and terminal device |
CN109584490A (en) * | 2018-12-10 | 2019-04-05 | Tcl通力电子(惠州)有限公司 | Safety protection method, intelligent sound box and security system |
CN110889334A (en) * | 2019-11-06 | 2020-03-17 | 江河瑞通(北京)技术有限公司 | Personnel intrusion identification method and device |
CN111210462A (en) * | 2019-12-30 | 2020-05-29 | 视联动力信息技术股份有限公司 | Alarm method and device |
CN112399051A (en) * | 2020-10-15 | 2021-02-23 | 中标慧安信息技术股份有限公司 | Human body detection sound warning camera applied to garbage classification |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106251544A (en) | A kind of intrusion alarm method based on Android intelligent and alarm device | |
US11004209B2 (en) | Methods and systems for applying complex object detection in a video analytics system | |
US10282617B2 (en) | Methods and systems for performing sleeping object detection and tracking in video analytics | |
US20190034734A1 (en) | Object classification using machine learning and object tracking | |
US20190130188A1 (en) | Object classification in a video analytics system | |
US20190130583A1 (en) | Still and slow object tracking in a hybrid video analytics system | |
US20190130189A1 (en) | Suppressing duplicated bounding boxes from object detection in a video analytics system | |
JP3872014B2 (en) | Method and apparatus for selecting an optimal video frame to be transmitted to a remote station for CCTV-based residential security monitoring | |
CN103576660B (en) | Smart Home method for supervising | |
US10878578B2 (en) | Exclusion zone in video analytics | |
US20060170769A1 (en) | Human and object recognition in digital video | |
CN106940794A (en) | A yard adjoint system is detectd in a kind of target collection | |
US20190130586A1 (en) | Robust sleeping object detection in video analytics | |
CN109089160A (en) | A kind of colleges and universities dining room food processing unlawful practice video analytic system and method | |
US10360456B2 (en) | Methods and systems of maintaining lost object trackers in video analytics | |
WO2018031096A1 (en) | Methods and systems of performing blob filtering in video analytics | |
WO2018031104A1 (en) | Methods and systems of maintaining object trackers in video analytics | |
CN111767823A (en) | Sleeping post detection method, device, system and storage medium | |
CN101163234A (en) | Method of implementing pattern recognition and image monitoring using data processing device | |
CN107517391B (en) | Method and equipment for identifying abnormal live broadcast information in video live broadcast | |
US10657783B2 (en) | Video surveillance method based on object detection and system thereof | |
CN107231546A (en) | The household monitoring system of autonomous tracking moving characteristic based on cloud security service device | |
CN108540752A (en) | The methods, devices and systems that target object in video monitoring is identified | |
CN101183477A (en) | Automatic door bell and implementing method thereof | |
KR20060003321A (en) | The method or device for the object recognition in the security system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20161221 |