CN107241585B - Video monitoring method and system - Google Patents
Video monitoring method and system Download PDFInfo
- Publication number
- CN107241585B CN107241585B CN201710669125.7A CN201710669125A CN107241585B CN 107241585 B CN107241585 B CN 107241585B CN 201710669125 A CN201710669125 A CN 201710669125A CN 107241585 B CN107241585 B CN 107241585B
- Authority
- CN
- China
- Prior art keywords
- processor
- video
- frequency band
- abstract
- frame
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/18—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
- H04N7/183—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a single remote source
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Closed-Circuit Television Systems (AREA)
Abstract
The present invention provides video monitoring method and systems, are related to field of video monitoring.Video monitoring method provided by the invention, it pre-processes video by first processor, first processor has extracted key frame from the video-frequency band branched away, and has obtained its corresponding first object coding, and then obtained the first abstract of first coding;Then, the first abstract and video-frequency band second processor has been sent to by different communication channels, later, second processor is after having received video-frequency band, when extracting key frame and the second target code, only the second target code and consistent first object coding from video-frequency band in a predetermined manner, just think that video-frequency band is effective, later, video-frequency band is stored in local again by second processor, to complete the transmission of monitor video.To ensure that effective video can only be completed preservation by second processor, remaining invalid video can be ignored.
Description
Technical field
The present invention relates to field of video monitoring, in particular to video monitoring method and system.
Background technique
Video monitoring is the important component of safety and protection system, English Cameras and Surveillance.It passes
The monitoring system of system includes front-end camera, transmission cable, video monitoring platform.Video camera can be divided into network digital camera and
Analog video camera can be used as the acquisition of head end video picture signal.It is a kind of stronger integrated system of prevention ability.Video prison
Control is intuitive with it, accurate, timely abundant with the information content and is widely used in many occasions.In recent years, with computer, network
And the rapid development of image procossing, transmission technology, there has also been significant progresses for Video Supervision Technique.
The main function of video monitoring is the real-time pictures of target area to be transferred to monitor terminal, but send out in real work
Existing, the mode of tradition monitoring image transmission is not reasonable.
Summary of the invention
The purpose of the present invention is to provide video monitoring method and systems, to improve the efficiency of video monitoring.
In a first aspect, the embodiment of the invention provides a kind of video monitoring methods, comprising:
Step 1, the video taken is sent to first processor by WIFI by monitoring camera;
Step 2, video is divided into continuous multiple video-frequency bands by first processor, each video-frequency band when it is 5 minutes a length of;
Step 3, first processor extracts the key frame in video-frequency band;
Step 4, first processor extracts first object coding according to the first acquisition modes from key frame;
Step 5, first processor calculates the first abstract of first object coding using the first digest algorithm obtained in advance;
Step 6, first processor uses the first communication channel, and first is made a summary and is sent to second processor;First communication
Channel is telecommunication channel;
Step 7, newest video-frequency band was packaged by first processor every 5 minutes, to form the first data packet, and
The first data packet is sent to second processor by the second communication channel;Second communication channel is different from the first communication channel
Telecommunication channel;
Step 8, second processor tests the validity of the video-frequency band in the first data packet after receiving video-frequency band
Card;Wherein, if validation verification passes through, second processor is extracted the second target according to the second acquisition modes from key frame and is compiled
Code;If validation verification does not pass through, second processor sends reissue commands to first processor;
Step 9, second processor calculates the second abstract of the second target code using the second digest algorithm obtained in advance;
Step 10, whether the first abstract of second processor verifying and the second abstract are identical;Wherein,
If the first abstract is identical with the second abstract, the corresponding video-frequency band of the second abstract is stored in this by second processor
Ground.
With reference to first aspect, the embodiment of the invention provides the first possible embodiments of first aspect, wherein also
Include:
The significance level of second processor acquisition video-frequency band;
If significance level is more than preset threshold value, second processor obtains video corresponding with significance level and decomposes rule
Then;
Second processor resolves into three parts of local datas according to video decomposition rule, by video-frequency band;In every part of local data
Carry the partial data of each frame image in video-frequency band;
Second processor stores three parts of local datas respectively to the first publicly-owned memory, the second publicly-owned memory and privately owned
In memory.
With reference to first aspect, the embodiment of the invention provides second of possible embodiments of first aspect, wherein
Before step 7, further includes:
First processor encrypts decoded information using the first encryption key;Decoded information is located at the first data packet
In stem, the video data ontology by coding is carried in the data portion of the first data packet;Decoded information is for reading video
Body of data;
Before step 6 further include:
First processor encrypts the first abstract using the second encryption key, and encrypted first is made a summary to the
Two processors are sent;First encryption key and the second encryption key are different;
Before step 9 further include:
Second processor is decrypted encrypted decoded information using the first decruption key, to obtain decoded information;
Second processor is decoded the video data ontology by coding using decoded information;
Second processor is decrypted encrypted first abstract using the second decruption key.
With reference to first aspect, the embodiment of the invention provides the third possible embodiments of first aspect, wherein the
According to video decomposition rule, video-frequency band is resolved into three parts of local datas includes: two processors
Frame image each in video-frequency band is carried out gray processing processing by second processor;
Second processor generates first frame image, the second frame image and the according to the gray value of designated frame image in video-frequency band
Three frame images;The sum of the grayscale values third frame figure of the gray value of first frame image specified pixel point, the second frame image specified pixel point
The sum of gray value as specified pixel point is equal to the gray value that pixel is specified in designated frame image;
First frame image, the second frame image and third frame image are stored in different local datas by second processor respectively
In.
With reference to first aspect, the embodiment of the invention provides the 4th kind of possible embodiments of first aspect, wherein the
One encryption key and the second encryption key are unsymmetrical key.
With reference to first aspect, the embodiment of the invention provides the 5th kind of possible embodiments of first aspect, wherein also
Include:
For the received video-frequency band of second processor, second processor calculates preceding picture frame and rear picture frame in the video-frequency band
Value differences, obtain pixel value difference;
Second processor judges whether pixel value difference is more than preset threshold value;
If being more than, preceding picture frame and rear picture frame are marked second processor, and the preceding picture frame after label is covered
Preceding picture frame described in the video-frequency band is covered, by rear picture frame described in the rear picture frame covering video-frequency band after label.
With reference to first aspect, the embodiment of the invention provides the 6th kind of possible embodiments of first aspect, wherein the
One publicly-owned memory, the second publicly-owned memory are the equipment of publicly-owned cloud storage;Privately owned memory is private cloud storage equipment.
With reference to first aspect, the embodiment of the invention provides the 7th kind of possible embodiments of first aspect, wherein the
One publicly-owned memory, the second publicly-owned memory are the equipment of publicly-owned cloud storage;Privately owned memory is to store equipment under line.
Second aspect, the embodiment of the invention also provides a kind of video monitoring systems, comprising: multiple monitoring cameras,
One processor and second processor;Multiple monitoring cameras are separately positioned in different regions, first processor respectively with it is more
A monitoring camera passes through WIFI connection;First processor is connected with second processor telecommunication;
Monitoring camera, first processor and second processor execute corresponding operation according to the method for such as first aspect.
In conjunction with second aspect, the embodiment of the invention provides the first possible embodiments of second aspect, wherein every
Fluorescent marker note is provided on a monitoring camera.
Video monitoring method provided in an embodiment of the present invention pre-processes video by first processor, the
One processor has extracted key frame from the video-frequency band branched away, and has obtained its corresponding first object coding, and then
The first abstract of first coding is arrived;Then, the first abstract and video-frequency band have been sent to the by different communication channels
Two processors, later, second processor extract key frame after having received video-frequency band from video-frequency band in a predetermined manner
With the second target code, when only the second target code and consistent first object coding, just think video-frequency band be it is effective, it
Afterwards, video-frequency band is stored in local again by second processor, to complete the transmission of monitor video.To ensure that second processor only
Effective video can be saved, remaining invalid video can be ignored.
To enable the above objects, features and advantages of the present invention to be clearer and more comprehensible, preferred embodiment is cited below particularly, and cooperate
Appended attached drawing, is described in detail below.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below will be to needed in the embodiment attached
Figure is briefly described, it should be understood that the following drawings illustrates only certain embodiments of the present invention, therefore is not construed as pair
The restriction of range for those of ordinary skill in the art without creative efforts, can also be according to this
A little attached drawings obtain other relevant attached drawings.
Fig. 1 shows the module frame chart of system corresponding to video monitoring method provided by the embodiment of the present invention;
Fig. 2 shows first details flow charts of video monitoring method provided by the embodiment of the present invention;
Fig. 3 shows second details flow chart of video monitoring method provided by the embodiment of the present invention;
Fig. 4 shows the third details flow chart of video monitoring method provided by the embodiment of the present invention.
Specific embodiment
Below in conjunction with attached drawing in the embodiment of the present invention, technical solution in the embodiment of the present invention carries out clear, complete
Ground description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.Usually exist
The component of the embodiment of the present invention described and illustrated in attached drawing can be arranged and be designed with a variety of different configurations herein.Cause
This, is not intended to limit claimed invention to the detailed description of the embodiment of the present invention provided in the accompanying drawings below
Range, but it is merely representative of selected embodiment of the invention.Based on the embodiment of the present invention, those skilled in the art are not doing
Every other embodiment obtained under the premise of creative work out, shall fall within the protection scope of the present invention.
In the related technology, various video monitoring systems and corresponding method have been had already appeared, but monitoring in the related technology
In system and method, no matter which kind of video data is background devices receive, all video can be stored in local, this is directly resulted in
The problem of memory space inadequate of background devices.
For this kind of problem, this application provides a kind of video monitoring method, this method acts on video monitoring system, depending on
There are three parts to form altogether for frequency monitoring system, as shown in Figure 1, being monitoring camera 101, first processor 102 and second respectively
Processor 103;This method comprises:
Step 1, the video taken is sent to first processor 102 by WIFI by monitoring camera 101;
Step 2, video is divided into continuous multiple video-frequency bands by first processor 102, each video-frequency band when it is 5 points a length of
Clock;
Step 3, first processor 102 extracts the key frame in video-frequency band;
Step 4, first processor 102 extracts first object coding according to the first acquisition modes from key frame;
Step 5, first processor 102 is plucked using first that the first digest algorithm obtained in advance calculates first object coding
It wants;
Step 6, first processor 102 uses the first communication channel, and first is made a summary and is sent to second processor 103;The
One communication channel is telecommunication channel;
Step 7, newest video-frequency band was packaged by first processor 102 every 5 minutes, to form the first data packet,
And the first data packet is sent to second processor 103 by the second communication channel;Second communication channel is communicated with first
The different telecommunication channel in road;
Step 8, second processor 103 is after receiving video-frequency band, to the validity of the video-frequency band in the first data packet into
Row verifying;Wherein, if validation verification passes through, second processor 103 extracts according to the second acquisition modes from key frame
Two target codes;If validation verification does not pass through, second processor 103 sends reissue commands to first processor 102;
Step 9, second processor 103 is plucked using second that the second digest algorithm obtained in advance calculates the second target code
It wants;
Step 10, whether first abstract of the verifying of second processor 103 and the second abstract are identical;Wherein, if first abstract and
Second abstract is identical, then the corresponding video-frequency band of the second abstract is stored in local by second processor 103.
Monitoring camera 101 is usually to be set up directly in specified scene, such as square, cinema place.It is same
The monitoring camera 101 of a small range is connect by way of wifi with first processor 102, in turn, monitoring camera 101
Shooting obtained video can be sent by wifi to first processor 102.
Video is divided into continuous multiple video-frequency bands first after receiving video by first processor 102.Ordinary circumstance
Under, the video that first processor 102 receives is a continuous video, and needs carry out timing while receiving video,
Every timing reaches 5 minutes, and video received in nearest 5 minutes is just formed a video-frequency band.Under normal circumstances, a view
Video in frequency range be shot by the same monitoring camera 101 caused by.
Since video is to be arranged to be formed according to the sequence of time order and function by multiple continuous frame images, then, at first
Manage device 102 can also extract key frame and come out, with the time in subsequent steps from video-frequency band.
There are many modes for extracting key frame, is set forth below two kinds can used as example.The first, the first processing
The A frame image in video-frequency band may be selected as key frame in device 102, and the sum of brightness value of whole pixels of A frame image is higher than view
The sum of the brightness value of whole pixels of an any other frame image in frequency range.Second, the first processing can calculate any
The image difference of one frame image, image difference are obtained by the sum of the first difference and the absolute value of the second difference, and first is poor
Value is the pixel value of current frame image and previous frame image, and the second difference is the pixel of current frame image Yu a later frame image
Value difference value.In turn, key frame images can be simply determined very much in a manner of traversal by both modes.Certainly, true
Before determining key frame images, each frame image in video-frequency band can also be pre-processed, to improve the effect of its comparison.
Later, first processor 102 also needs to extract first object coding from key frame, regional first object coding
There are many kinds of forms, it should be noted that first object coding is that the information of direct basis key frame images obtains, and disobeys
According to external information.For example, first object coding can be and be formed by the quantity of the first row pixel of key frame images;Compare again
Such as, first object coding, which can be to be arranged by the brightness value of the first row pixel of key frame images, forms;For another example, first
Target code can be amount formed more than the pixel of predetermined value by brightness value in key frame images.
After first object coding has been determined, the first digest algorithm can be used to calculate corresponding to first object coding
First abstract.It should be noted that digest algorithm, that is, Hash (Hash) algorithm, it is right can to calculate first object coding institute
The first abstract answered, this calculating process is irreversible, that is, it is encoded according to the first irreversible release first object of abstract,
Can not backstepping go out the calculation formula of digest algorithm.
Then, first processor 102 sends first abstract to second processor 103 by the first communication channel.Also,
The video-frequency band being newly generated was packaged in first processor 102 each 5 minutes, and will send and be packaged to second processor 103
Video-frequency band afterwards.
Second processor 103 carries out validation verification to video-frequency band first after receiving video-frequency band, if verifying is logical
If crossing, then the second abstract can be obtained, ratio is then passed through according to the mode similar with the course of work of first processor 102
It is whether identical to the first abstract and the second abstract, to judge whether video-frequency band is effective video section.First processor 102 and
Two processors 103 determine key frame, determine target code and determine that the mode of abstract should be identical.
Under normal circumstances, video-frequency band can be only sent to second processor 103 by some external equipment, rather than send video
Abstract corresponding to section, at this point, then system does not need to comprehend the video-frequency band, to ensure that second processor 103 can will only have
The video-frequency band of effect is saved, and those video-frequency bands that do not make a summary then directly are ignored (as deleted), is deposited to ensure that
Storage space can be effectively used.And it is different with the communication channel of the first abstract to send video-frequency band, can also play certain
Raising safety effect.
Preferably, method provided herein, as shown in Figure 2, further includes:
S201, second processor 103 obtain the significance level of video-frequency band;
S202, if significance level is more than preset threshold value, second processor 103 obtains view corresponding with significance level
Frequency decomposition rule;
S203, second processor 103 resolve into three parts of local datas according to video decomposition rule, by video-frequency band;Every part of office
The partial data of each frame image in video-frequency band is carried in portion's data;
S204, second processor 103 store three parts of local datas respectively to the first publicly-owned memory, the second publicly-owned storage
In device and privately owned memory.
It is, video-frequency band is stored in local by the processing of second processor 103, video-frequency band can also be stored in other and deposited
In reservoir, but the safety in order to guarantee data, should using first decompose store afterwards by the way of stored so that every part of local number
The partial data of each frame image in video-frequency band is carried, in guarantee read for some timely hackers as far as possible
Data in some memory can not also know the desired meaning expressed of entire video-frequency band, to ensure that the safety of data
Property.
Preferably, before step 7, further includes:
First processor 102 encrypts decoded information using the first encryption key;Decoded information is located at the first data
In the stem of packet, the video data ontology by coding is carried in the data portion of the first data packet;Decoded information is for reading
Video data ontology;
Before step 6 further include:
First processor 102 encrypts the first abstract using the second encryption key, and encrypted first is made a summary
It is sent to second processor 103;First encryption key and the second encryption key are different;
Before step 9 further include:
Second processor 103 is decrypted encrypted decoded information using the first decruption key, to obtain decoding letter
Breath;
Second processor 103 is decoded the video data ontology by coding using decoded information;
Second processor 103 is decrypted encrypted first abstract using the second decruption key.
It is, first processor 102 also needs before the first abstract and video-frequency band are sent to second processor 103
The two data are encrypted, since the video frame in video-frequency band is excessive, while these video frames be carried out direct
If encryption, then workload is excessive, unfavorable to system treatment effeciency.Therefore, it is solved at this time using being encrypted to decoded information
Code is therefore the process being subjected to before video can be normally read can also be played by being encrypted to decoded information
Effect to a certain extent.Similar, being encrypted to the first abstract can also play the role of improving safety.Also, by
It is different in the first encryption key and the second encryption key, this ensure that hacker can not learn the two encryptions simultaneously
The content of key, further improves safety.Certainly, corresponding, second processor 103 receive the two data it
Afterwards, it is also necessary to the corresponding operation being decrypted.
In the following, being illustrated to the process for generating local data.That is, as shown in figure 3, step second processor 103 according to
Video decomposition rule, video-frequency band, which is resolved into three parts of local datas, includes:
Frame image each in video-frequency band is carried out gray processing processing by S301, second processor 103;
S302, second processor 103 generate first frame image, the second frame according to the gray value of designated frame image in video-frequency band
Image and third frame image;The sum of the grayscale values of the gray value of first frame image specified pixel point, the second frame image specified pixel point
The sum of gray value of third frame image specified pixel point is equal to the gray value that pixel is specified in designated frame image;
First frame image, the second frame image and third frame image are stored in different by S303, second processor 103 respectively
In local data.
It is, firstly, each frame image in video-frequency band is first carried out gray processing processing by second processor 103.It is right
For same frame image (designated frame image), image be by being constituted according to multiple pixels of matrix arrangement, and it is every
A pixel all has a gray value, which is divided into three values, that is, the gray value is split as three numerical value
The sum of.For example the gray value of the A pixel (pixel that such as coordinate is (9,12)) in designated frame image is 123, then the gray scale
Value can be split as 50+20+53, and it is 50 that coordinate, which is the gray value of the pixel of (9,12), in turn, in first frame image;Second frame
It is 20 that coordinate, which is the gray value of the pixel of (9,12), in image;Coordinate is the gray scale of the pixel of (9,12) in first frame image
Value is 53.In turn, by this kind of mode, the gray value of each pixel in designated frame image can be split, and
The gray value is distributed into three different frame images, also, these three frame images are stored in different local datas respectively
In.In turn, it ensure that simple by a frame image is that can not know meaning expressed by original image.Play raising
The effect of safety.
Preferably, the first encryption key and the second encryption key are unsymmetrical key.For example, it is asymmetric to can be RSA
Code key used in Encryption Algorithm.
Preferably, as shown in figure 4, in method provided herein further include:
S401, for the received video-frequency band of second processor, second processor 103 calculate in the video-frequency band preceding picture frame with
The value differences of picture frame afterwards, obtain pixel value difference;
S402, second processor 103 judge whether pixel value difference is more than preset threshold value;
S403, if being more than, preceding picture frame and rear picture frame are marked second processor 103, before after label
Picture frame covers preceding picture frame described in the video-frequency band, by rear image described in the rear picture frame covering video-frequency band after label
Frame.
It is, in the present solution, the difference of the pixel value of specified adjacent two field pictures can be calculated (for example, can refer to
Determine the difference of the pixel value of pixel;For another example, it can be the difference of the sum of the pixel value of pixel in specified region).If
Difference is excessive, then it is assumed that has biggish difference between this two field pictures, at this point, then will be understood that the prospect on this two images
Variation (walking about if any pedestrian) has occurred, therefore, other can be improved by way of increasing label in this two field pictures
The efficiency of personnel's viewing video.
Preferably, the first publicly-owned memory, the second publicly-owned memory are the equipment of publicly-owned cloud storage;Privately owned memory is
Private cloud storage equipment.Cloud storage technology can obtain anywhere or anytime corresponding data in order to user, be conducive to user's use
Data.
Preferably, the first publicly-owned memory, the second publicly-owned memory are the equipment of publicly-owned cloud storage;Privately owned memory is
Equipment is stored under line.Being set as the privately owned memory to store equipment under line can be to avoid data caused by networking (online) afterwards by the
The problem of tripartite steals.
Present invention also provides a kind of video monitoring systems, comprising: at multiple monitoring cameras, first processor and second
Manage device;Multiple monitoring cameras are separately positioned in different regions, and first processor passes through with multiple monitoring cameras respectively
WIFI connection;First processor is connected with second processor telecommunication;
Monitoring camera, first processor and second processor execute corresponding operation according to the method described above.
Preferably, fluorescent marker note is provided on each monitoring camera.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description,
The specific work process of device and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.
It, can be with if the function is realized in the form of SFU software functional unit and when sold or used as an independent product
It is stored in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially in other words
The part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, the meter
Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be a
People's computer, server or network equipment etc.) it performs all or part of the steps of the method described in the various embodiments of the present invention.
And storage medium above-mentioned includes: that USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited
The various media that can store program code such as reservoir (RAM, Random Access Memory), magnetic or disk.
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any
Those familiar with the art in the technical scope disclosed by the present invention, can easily think of the change or the replacement, and should all contain
Lid is within protection scope of the present invention.Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.
Claims (10)
1. a kind of video monitoring method characterized by comprising
Step 1, the video taken is sent to first processor by WIFI by monitoring camera;
Step 2, the video is divided into continuous multiple video-frequency bands by first processor, each video-frequency band when it is 5 minutes a length of;
Step 3, first processor extracts the key frame in the video-frequency band;
Step 4, first processor extracts first object coding according to the first acquisition modes from the key frame;
Step 5, the first processor calculates the first of the first object coding using the first digest algorithm obtained in advance
Abstract;
Step 6, the first processor uses the first communication channel, and described first is made a summary and is sent to second processor;It is described
First communication channel is telecommunication channel;
Step 7, newest video-frequency band was packaged by first processor every 5 minutes, to form the first data packet, and was passed through
Second communication channel sends the first data packet to second processor;Second communication channel is and first communication channel
Different telecommunication channels;
Step 8, second processor verifies the validity of the video-frequency band in the first data packet after receiving video-frequency band;
Wherein, if validation verification passes through, second processor extracts the second target according to the second acquisition modes from the key frame
Coding;If validation verification does not pass through, second processor sends reissue commands to first processor;
Step 9, second processor calculates the second abstract of second target code using the second digest algorithm obtained in advance;
Step 10, whether the first abstract of second processor verifying and the second abstract are identical;Wherein,
If the first abstract is identical with the second abstract, the corresponding video-frequency band of second abstract is stored in this by second processor
Ground.
2. video monitoring method according to claim 1, which is characterized in that further include:
Second processor obtains the significance level of the video-frequency band;
If the significance level is more than preset threshold value, second processor obtains video point corresponding with the significance level
Solution rule;
Second processor resolves into three parts of local datas according to the video decomposition rule, by the video-frequency band;Every part of local number
The partial data of each frame image in the video-frequency band is carried in;
Second processor stores three parts of local datas respectively to the first publicly-owned memory, the second publicly-owned memory and privately owned storage
In device.
3. video monitoring method according to claim 1, which is characterized in that before step 7, further includes:
First processor encrypts decoded information using the first encryption key;The decoded information is located at first data
In the stem of packet, the video data ontology by coding is carried in the data portion of first data packet;The decoded information
For reading video data ontology;
Before step 6 further include:
First processor encrypts the first abstract using the second encryption key, and encrypted first is made a summary at second
Device is managed to send;First encryption key and the second encryption key are different;
Before step 9 further include:
Second processor is decrypted encrypted decoded information using the first decruption key, to obtain decoded information;
Second processor is decoded the video data ontology by coding using decoded information;
Second processor is decrypted encrypted first abstract using the second decruption key.
4. video monitoring method according to claim 2, which is characterized in that second processor is decomposed according to the video and advised
Then, the video-frequency band is resolved into three parts of local datas includes:
Frame image each in video-frequency band is carried out gray processing processing by second processor;
Second processor generates first frame image, the second frame image and third frame according to the gray value of designated frame image in video-frequency band
Image;The sum of the grayscale values third frame figure of the gray value of the first frame image specified pixel point, the second frame image specified pixel point
The sum of gray value as specified pixel point is equal to the gray value that pixel is specified in designated frame image;
First frame image, the second frame image and third frame image are stored in different local datas by second processor respectively.
5. video monitoring method according to claim 3, which is characterized in that first encryption key and described second adds
Key is unsymmetrical key.
6. video monitoring method according to claim 1, which is characterized in that further include:
For the received video-frequency band of second processor, second processor calculates the picture of preceding picture frame and rear picture frame in the video-frequency band
Plain value difference is different, obtains pixel value difference;
Second processor judges whether pixel value difference is more than preset threshold value;
If being more than, the preceding picture frame and rear picture frame are marked second processor, and the preceding picture frame after label is covered
Preceding picture frame described in the video-frequency band is covered, picture frame after the rear picture frame after label is covered described in the video-frequency band.
7. video monitoring method according to claim 2, which is characterized in that the first publicly-owned memory, the second publicly-owned storage
Device is the equipment of publicly-owned cloud storage;The privately owned memory is private cloud storage equipment.
8. video monitoring method according to claim 2, which is characterized in that the first publicly-owned memory, the second publicly-owned storage
Device is the equipment of publicly-owned cloud storage;The privately owned memory is to store equipment under line.
9. a kind of video monitoring system characterized by comprising multiple monitoring cameras, first processor and second processor;
The multiple monitoring camera is separately positioned in different regions, and the first processor is logical with multiple monitoring cameras respectively
Cross WIFI connection;The first processor is connected with the second processor telecommunication;
The monitoring camera, the first processor and the second processor are according to as described in claim any one of 1-8
Method execute corresponding operation.
10. system according to claim 9, which is characterized in that be provided with fluorescent marker note on each monitoring camera.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710669125.7A CN107241585B (en) | 2017-08-08 | 2017-08-08 | Video monitoring method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710669125.7A CN107241585B (en) | 2017-08-08 | 2017-08-08 | Video monitoring method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107241585A CN107241585A (en) | 2017-10-10 |
CN107241585B true CN107241585B (en) | 2019-09-06 |
Family
ID=59989141
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710669125.7A Active CN107241585B (en) | 2017-08-08 | 2017-08-08 | Video monitoring method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107241585B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108600864B (en) * | 2018-04-25 | 2020-08-28 | 中影数字巨幕(北京)有限公司 | Movie preview generation method and device |
CN111327925A (en) * | 2019-06-04 | 2020-06-23 | 杭州海康威视***技术有限公司 | Data processing method and device, electronic equipment and machine-readable storage medium |
CN110505534B (en) * | 2019-08-26 | 2022-03-08 | 腾讯科技(深圳)有限公司 | Monitoring video processing method, device and storage medium |
CN114915768B (en) * | 2022-07-14 | 2022-09-30 | 中通服建设有限公司 | Intelligent building security system based on passive optical network |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103873243A (en) * | 2012-12-12 | 2014-06-18 | 腾讯科技(北京)有限公司 | Method for realizing data security transmission, system, server and terminal |
CN104185089A (en) * | 2013-05-23 | 2014-12-03 | 三星电子(中国)研发中心 | Video summary generation method, server and client-terminal |
CN106203277A (en) * | 2016-06-28 | 2016-12-07 | 华南理工大学 | Fixed lens real-time monitor video feature extracting method based on SIFT feature cluster |
CN106851231A (en) * | 2017-04-06 | 2017-06-13 | 南京三宝弘正视觉科技有限公司 | A kind of video frequency monitoring method and system |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060047967A1 (en) * | 2004-08-31 | 2006-03-02 | Akhan Mehmet B | Method and system for data authentication for use with computer systems |
-
2017
- 2017-08-08 CN CN201710669125.7A patent/CN107241585B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103873243A (en) * | 2012-12-12 | 2014-06-18 | 腾讯科技(北京)有限公司 | Method for realizing data security transmission, system, server and terminal |
CN104185089A (en) * | 2013-05-23 | 2014-12-03 | 三星电子(中国)研发中心 | Video summary generation method, server and client-terminal |
CN106203277A (en) * | 2016-06-28 | 2016-12-07 | 华南理工大学 | Fixed lens real-time monitor video feature extracting method based on SIFT feature cluster |
CN106851231A (en) * | 2017-04-06 | 2017-06-13 | 南京三宝弘正视觉科技有限公司 | A kind of video frequency monitoring method and system |
Also Published As
Publication number | Publication date |
---|---|
CN107241585A (en) | 2017-10-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107241585B (en) | Video monitoring method and system | |
JP6545192B2 (en) | Verification of captured images using timestamps decoded from illumination from modulated light sources | |
KR20130114037A (en) | Masking and recovering method of privacy region | |
CN114003190A (en) | Augmented reality method and device suitable for multiple scenes and multiple devices | |
CN111327947A (en) | Screen capture management method and device and mobile terminal | |
CN115527101A (en) | Image tampering detection method and processor | |
US11374933B2 (en) | Securing digital data transmission in a communication network | |
CN113766085A (en) | Image processing method and related device | |
JP7456446B2 (en) | Image processing method, image processing device and program | |
CN108712400A (en) | Data transmission method, device, computer readable storage medium and electronic equipment | |
CN108512651B (en) | Artificial intelligence image identification attack defense method, system and storage medium | |
CN117115287A (en) | Image generation method, device, electronic equipment and readable storage medium | |
CN109120648B (en) | A kind of anti-tamper verifying system of real-time monitoring data | |
CN113014609B (en) | Multimedia file processing and tracing method, device, equipment and medium | |
CN114466224A (en) | Video data encoding and decoding method and device, storage medium and electronic equipment | |
CN113158794A (en) | Object detection method, edge device, and computer-readable storage medium | |
CN113762970A (en) | Data processing method and device, computer readable storage medium and computer equipment | |
CN116600070B (en) | Holographic video storage method, device, equipment and storage medium | |
CN117834952B (en) | Video conference content secure transmission method, device and medium | |
CN109165317B (en) | A kind of real time monitoring aspect indexing inquiry system | |
CN117579896B (en) | Unmanned aerial vehicle video transmission processing method, device, equipment and storage medium | |
CN117176979B (en) | Method, device, equipment and storage medium for extracting content frames of multi-source heterogeneous video | |
CN115250377B (en) | Video processing method, processing platform, electronic device and storage medium | |
CN116305281B (en) | Human face recognition system and human face recognition method based on sensory cognition | |
CN113674387B (en) | Video processing method and device for unnatural scene video |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |