WO2017085755A1 - Système de sécurité perfectionné, procédé de sécurité perfectionné, et programme de sécurité perfectionné - Google Patents
Système de sécurité perfectionné, procédé de sécurité perfectionné, et programme de sécurité perfectionné Download PDFInfo
- Publication number
- WO2017085755A1 WO2017085755A1 PCT/JP2015/005784 JP2015005784W WO2017085755A1 WO 2017085755 A1 WO2017085755 A1 WO 2017085755A1 JP 2015005784 W JP2015005784 W JP 2015005784W WO 2017085755 A1 WO2017085755 A1 WO 2017085755A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- suspect
- advanced security
- security system
- thresholded
- armed
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01S—RADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
- G01S13/00—Systems using the reflection or reradiation of radio waves, e.g. radar systems; Analogous systems using reflection or reradiation of waves whose nature or wavelength is irrelevant or unspecified
- G01S13/86—Combinations of radar systems with non-radar systems, e.g. sonar, direction finder
- G01S13/867—Combination of radar systems with cameras
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01S—RADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
- G01S13/00—Systems using the reflection or reradiation of radio waves, e.g. radar systems; Analogous systems using reflection or reradiation of waves whose nature or wavelength is irrelevant or unspecified
- G01S13/88—Radar or analogous systems specially adapted for specific applications
- G01S13/887—Radar or analogous systems specially adapted for specific applications for detection of concealed objects, e.g. contraband or weapons
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01S—RADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
- G01S13/00—Systems using the reflection or reradiation of radio waves, e.g. radar systems; Analogous systems using reflection or reradiation of waves whose nature or wavelength is irrelevant or unspecified
- G01S13/88—Radar or analogous systems specially adapted for specific applications
- G01S13/89—Radar or analogous systems specially adapted for specific applications for mapping or imaging
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01V—GEOPHYSICS; GRAVITATIONAL MEASUREMENTS; DETECTING MASSES OR OBJECTS; TAGS
- G01V8/00—Prospecting or detecting by optical means
- G01V8/005—Prospecting or detecting by optical means operating with millimetre waves, e.g. measuring the black losey radiation
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01V—GEOPHYSICS; GRAVITATIONAL MEASUREMENTS; DETECTING MASSES OR OBJECTS; TAGS
- G01V8/00—Prospecting or detecting by optical means
- G01V8/10—Detecting, e.g. by using light barriers
- G01V8/12—Detecting, e.g. by using light barriers using one transmitter and one receiver
- G01V8/14—Detecting, e.g. by using light barriers using one transmitter and one receiver using reflectors
Definitions
- the present invention relates to an advanced security system, an advanced security method and an advanced security program.
- Advanced security system in which radar imaging and optical imaging are used conjointly, has been proposed.
- radar imaging is used and, after thresholding of obtained radar image at a predetermined level, a comparison of obtained thresholded image with database from a library of dangerous objects is provided. If such comparison gives a predetermined degree of coincidence, then a camera, used in the system, is focused on a suspect and the suspect detection is provided and, as result, an alarming signal is originating in the system and is transmitted to authorized personnel.
- Typical solution which is used to create a criminal (or terror) free zone is based on the use of established checkpoint screening.
- patent literature 1 discloses a technique of determining the presence or absence of a dangerous object, based on the luminance information.
- patent literature 2 discloses a technique of detecting a non-metal weapon, based on the backscatter signal.
- the present invention enables to provide a technique of solving the above-described problem.
- One aspect of the present invention provides an advanced security system comprising: a radar for producing images which are used to detect a suspect armed an unauthorized object and are thresholded at a predetermined level; a comparator for comparing said thresholded images with dangerous objects stored in a library; a camera for focusing on a detected suspect armed by unauthorized object due to said comparison; and a signal generator for generating an alarming signal on the detected suspect.
- Another aspect of the present invention provides an advanced security method comprising: producing images which are used to detect a suspect armed an unauthorized object and are thresholded at a predetermined level; comparing said thresholded images with dangerous objects stored in a library; fixing on a detected suspect armed by unauthorized object due to said comparison; and generating an alarming signal on the detected suspect.
- Still other aspect of the present invention provides an advanced security program for causing a computer to execute a method, comprising: producing images which are used to detect a suspect armed an unauthorized object and are thresholded at a predetermined level; comparing said thresholded images with dangerous objects stored in a library; fixing on a detected suspect armed by unauthorized object due to said comparison; and generating an alarming signal on the detected suspect.
- Fig. 1 is a block diagram showing the arrangement of an advanced security system according to the first embodiment of the present invention.
- Fig. 2 is a block diagram showing the arrangement of an advanced security system according to the second embodiment of the present invention.
- Fig. 3 is a schematic view showing thresholding process of a radar image from suspect according to the second embodiment of the present invention.
- Fig. 4 is a library showing the dangerous object library used in the advanced security system according to the second embodiment of the present invention.
- Fig. 5 is a block diagram showing the hardware arrangement of the advanced security system 200 according to this embodiment, in the case of expressing the system in one apparatus.
- Fig. 6 is a flowchart showing the sequence of processing in the advanced security system according to the second embodiment of the present invention.
- Fig. 1 is a block diagram showing the arrangement of an advanced security system according to the first embodiment of the present invention.
- Fig. 2 is a block diagram showing the arrangement of an advanced security system according to the second embodiment of the present invention.
- Fig. 3 is
- FIG. 7 is a block diagram showing the arrangement of an advanced security system according to the third embodiment of the present invention.
- Fig. 8 is a flowchart showing the sequence of processing in the advanced security system according to the third embodiment of the present invention.
- Fig. 9 is a block diagram showing the arrangement of an advanced security system according to the forth embodiment of the present invention.
- Fig. 10 is a flowchart showing the sequence of processing in the advanced security system according to the forth embodiment of the present invention.
- This object in the presented application is provided by a conjoint use of a radar and a camera which give radar and optical images of a person investigated. As result, after data processing of optical and radar signals, it makes possible both detection and identification of the person armed by hidden unauthorized object.
- the advanced security system combines two functional parts providing both optical signal processing (camera) and electromagnetic signal processing (radar).
- the system identifies a type of dangerous objects (as for an example, gun, knife, or so on) carried by the suspect.
- microwave and millimeter-wave radars which can be compact and, as a result, can provide arrangement of radar and camera in public places and also as a hidden system.
- Advanced security system 100 comprises radar 101, comparator 102, camera 103 and signal generator. Comparator 102 further comprises library 121.
- radar 101 After illumination of a person by a radar signal using radar 101 and receiving a reflected radar signal, radar 101 executes data processing of the reflected signal, and the processing is made by a predetermined algorithm. As a result, radar imaging is provided by radar 101. Obtained radar image is thresholded at a predetermined level (for example, at -10dB level, or -15dB level) in radar 101. Comparator 102 compares obtained thresholded image with database of dangerous objects kept in a library 121 of comparator 102. If thresholded image is matched with an object of library 121 with predetermined accuracy, advanced security system 100 fixes camera 103 on the person providing the suspect detection, and after that, signal generator 104 generates alarming signal.
- a predetermined level for example, at -10dB level, or -15dB level
- Advanced security system 200 comprises radar 201, comparator 202, camera 203 and signal generator 204.
- Advanced security system 200 further comprises library 210 of dangerous objects and terminal device 220.
- radar 201 has processor 211.
- processor 211 of radar 201 After illumination of a person by a radar signal using radar 201 and receiving a reflected signal, processor 211 of radar 201 performs data processing of the reflected signal, and the processing is made by a predetermined algorithm. As a result, radar imaging is provided by processor 211 of radar 201. Obtained radar image is thresholded at a predetermined level by processor 211 of 201. Obtained thresholded image is compared with database of dangerous objects kept in library 210 by comparator 202.
- advanced security system 200 fixes camera 203 on the person providing the suspect detection, and after that, signal generator 204 generates alarming signal which is submitted to terminal device 220 (as, for an example, a police monitor).
- thresholding process of a radar image from a suspect is presented.
- thresholding gives a possibility to remove human body effect and obtain a radar image of an unauthorized object which is well-suitable for comparison with database of dangerous objects in the library 210.
- Library 210 stores name 401, shape 402 and size 403. And, shape 402 and size 403 is associated with name 401.
- FIG. 5 a block diagram showing the hardware arrangement of the advanced security system 200 according to this embodiment, in the case of expressing the system in one apparatus.
- Advanced security system 200 includes CPU(Central Processing Unit) 510, ROM(Read Only Memory) 520, communication controller 530, RAM(Random Access Memory) 540 and Storage 550.
- CPU 610 is a central processor and controls the entire cloud server 220 by executing various programs.
- ROM 620 is a read-only memory and stores various kinds of parameters in addition to a boot program to be executed by CPU 610 first.
- RAM 540 stores radar imaging 541, dangerous object image 542 and comparison result.
- storage 650 stores library 551 and a program 552.
- Communication controller 530 controls communication with another device via the network. The functions of modules accumulated in the program 552 will be described. Processing module 553 functions to process reflected signal. Comparison module 554 functions to compare thresholded image with dangerous objects.
- step S601 radar 201 illuminates a radar signal for a person.
- processor 211 of radar 201 performs data processing of reflected signal by a predetermined algorithm.
- step S605 as a result of step S603, radar image is obtained.
- step S607 obtained radar image is thresholded at a predetermined level.
- comparator 202 compares thresholded image with database of dangerous objects stored in library 210.
- step S611 comparator judges whether thresholded image matches with dangerous objects.
- step S613 If thresholded image is matched with a dangerous object of library 210 with predetermined accuracy (predetermined degree of coincidence in %), in step S613, camera 203 is fixed on the person providing dangerous object (camera focusing on suspect). In step S615, signal generator 204 generates alarming signal which is submitted to terminal device 220.
- Advanced security system 700 comprises radar 701, comparator 202, camera 203 and signal generator 204. And, advanced security system 700 further comprises library 210 and terminal device 220.
- processor 711 of radar 701 executes data processing of the reflected signal, and the processing is made by a predetermined algorithm.
- radar imaging is provided.
- Obtained radar image is thresholded step-by-step in processor 711.
- comparator 202 compares each obtained thresholded image with database of dangerous objects kept in library 210. If thresholded image is matched with an object of library 210 with predetermined accuracy (predetermined degree of coincidence in %), advanced security system 600 fixes camera 203 on the person providing the suspect detection, and after that, signal generator 204 generates alarming signal which is submitted to a terminal device 220.
- step S801 the alarming signal is transmitted to terminal device 220 by advanced security system 700.
- Advanced security system 900 comprises radar 701, comparator 202, camera 203 and signal generator 904. And, advanced security system 900 further comprises library 210 and terminal device 220.
- processor 611 of radar 701 executes data processing of the reflected signal, and the processing is made by a predetermined algorithm.
- radar imaging is provided.
- Obtained radar image is thresholded at a predetermined level.
- comparator 202 compares obtained thresholded image with database of dangerous objects kept in library 210. If thresholded image is matched with an object of library 210 with predetermined accuracy (predetermined degree of coincidence in %), advanced security system 900 fixes camera 203 on the person providing the suspect detection and a photo of the suspect.
- comparator 202 changes the level of thresholding by decreasing on predetermined level in DB.
- person identification 14 is produced in signal generator 904. After suspect identification alarming signal providing simultaneously suspect personal information is submitted to a terminal device 220.
- step S1001 if thresholding image is not matched with an objects kept in library 210, comparator 202 changes the level of thresholding by decreasing on predetermined level in DB. (Other Embodiments)
- An advanced security system comprising: a radar for producing images which are used to detect a suspect armed an unauthorized object and are thresholded at a predetermined level; a comparator for comparing said thresholded images with dangerous objects stored in a library; a camera for focusing on a detected suspect armed by unauthorized object due to said comparison; and a signal generator for generating an alarming signal on the detected suspect.
- a radar for producing images which are used to detect a suspect armed an unauthorized object and are thresholded at a predetermined level
- a comparator for comparing said thresholded images with dangerous objects stored in a library
- a camera for focusing on a detected suspect armed by unauthorized object due to said comparison
- a signal generator for generating an alarming signal on the detected suspect.
- the advanced security system according to Claim 1 further comprising a terminal device, wherein said alarming signal is submitted to said terminal device.
- An advanced security method comprising: producing images which are used to detect a suspect armed an unauthorized object and are thresholded at a predetermined level; comparing said thresholded images with dangerous objects stored in a library; fixing on a detected suspect armed by unauthorized object due to said comparison; and generating an alarming signal on the detected suspect.
- An advanced security program for causing a computer to execute a method comprising: producing images which are used to detect a suspect armed an unauthorized object and are thresholded at a predetermined level; comparing said thresholded images with dangerous objects stored in a library; fixing on a detected suspect armed by unauthorized object due to said comparison; and generating an alarming signal on the detected suspect.
Landscapes
- Engineering & Computer Science (AREA)
- Remote Sensing (AREA)
- Radar, Positioning & Navigation (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Electromagnetism (AREA)
- Geophysics (AREA)
- General Life Sciences & Earth Sciences (AREA)
- Life Sciences & Earth Sciences (AREA)
- Alarm Systems (AREA)
- Image Analysis (AREA)
- Image Processing (AREA)
Abstract
La présente invention vise à fournir un système de sécurité perfectionné, qui peut fournir simultanément la détection d'un suspect armé par un objet non autorisé et également l'identification du suspect. Un système de sécurité perfectionné comprenant : un radar pour produire des images qui sont utilisées pour détecter un suspect armé d'un objet non autorisé et sont seuillées à un niveau prédéterminé ; un comparateur qui compare lesdites images seuillées avec des objets dangereux stockés dans une bibliothèque ; une caméra qui est fixée sur un suspect détecté armé d'un objet non autorisé en raison de ladite comparaison ; et un générateur de signal pour générer un signal d'alarme sur le suspect détecté.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/JP2015/005784 WO2017085755A1 (fr) | 2015-11-19 | 2015-11-19 | Système de sécurité perfectionné, procédé de sécurité perfectionné, et programme de sécurité perfectionné |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/JP2015/005784 WO2017085755A1 (fr) | 2015-11-19 | 2015-11-19 | Système de sécurité perfectionné, procédé de sécurité perfectionné, et programme de sécurité perfectionné |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2017085755A1 true WO2017085755A1 (fr) | 2017-05-26 |
Family
ID=58718491
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2015/005784 WO2017085755A1 (fr) | 2015-11-19 | 2015-11-19 | Système de sécurité perfectionné, procédé de sécurité perfectionné, et programme de sécurité perfectionné |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2017085755A1 (fr) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2021135268A (ja) * | 2020-02-28 | 2021-09-13 | 株式会社東芝 | 監視方法および監視装置 |
WO2022044187A1 (fr) * | 2020-08-27 | 2022-03-03 | 日本電気株式会社 | Dispositif de traitement de données, procédé de traitement de données et programme |
EP4050891A4 (fr) * | 2019-10-25 | 2022-10-19 | NEC Corporation | Dispositif de traitement, procédé de traitement et programme |
EP4109379A4 (fr) * | 2020-02-20 | 2023-04-12 | NEC Corporation | Système de traitement, procédé de traitement et programme |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH10282247A (ja) * | 1997-04-10 | 1998-10-23 | Mitsubishi Electric Corp | 金属検知装置 |
US20050110672A1 (en) * | 2003-10-10 | 2005-05-26 | L-3 Communications Security And Detection Systems, Inc. | Mmw contraband screening system |
JP2007213291A (ja) * | 2006-02-09 | 2007-08-23 | Fujitsu General Ltd | 緊急通報システム |
US20080129581A1 (en) * | 2004-10-22 | 2008-06-05 | Douglass Robert J | System and Method For Standoff Detection of Human Carried Explosives |
WO2009157551A1 (fr) * | 2008-06-27 | 2009-12-30 | マスプロ電工株式会社 | Dispositif de capture d'image d'ondes millimétriques |
-
2015
- 2015-11-19 WO PCT/JP2015/005784 patent/WO2017085755A1/fr active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH10282247A (ja) * | 1997-04-10 | 1998-10-23 | Mitsubishi Electric Corp | 金属検知装置 |
US20050110672A1 (en) * | 2003-10-10 | 2005-05-26 | L-3 Communications Security And Detection Systems, Inc. | Mmw contraband screening system |
US20080129581A1 (en) * | 2004-10-22 | 2008-06-05 | Douglass Robert J | System and Method For Standoff Detection of Human Carried Explosives |
JP2007213291A (ja) * | 2006-02-09 | 2007-08-23 | Fujitsu General Ltd | 緊急通報システム |
WO2009157551A1 (fr) * | 2008-06-27 | 2009-12-30 | マスプロ電工株式会社 | Dispositif de capture d'image d'ondes millimétriques |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP4050891A4 (fr) * | 2019-10-25 | 2022-10-19 | NEC Corporation | Dispositif de traitement, procédé de traitement et programme |
EP4109379A4 (fr) * | 2020-02-20 | 2023-04-12 | NEC Corporation | Système de traitement, procédé de traitement et programme |
JP2021135268A (ja) * | 2020-02-28 | 2021-09-13 | 株式会社東芝 | 監視方法および監視装置 |
JP7414587B2 (ja) | 2020-02-28 | 2024-01-16 | 株式会社東芝 | 監視方法および監視装置 |
WO2022044187A1 (fr) * | 2020-08-27 | 2022-03-03 | 日本電気株式会社 | Dispositif de traitement de données, procédé de traitement de données et programme |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109799544B (zh) | 应用于毫米波安检仪的智能检测方法、装置以及存储装置 | |
US10026270B2 (en) | Detection of unauthorized devices on ATMs | |
WO2017085755A1 (fr) | Système de sécurité perfectionné, procédé de sécurité perfectionné, et programme de sécurité perfectionné | |
Ratches | Review of current aided/automatic target acquisition technology for military target acquisition tasks | |
US8890745B2 (en) | RF gun barrel detection system | |
WO2017062078A2 (fr) | Détection combinée de changement d'intensité et de changement cohérent dans des images | |
Wang et al. | Data-driven probability hypothesis density filter for visual tracking | |
Sadjadi et al. | Remote sensing using passive infrared Stokes parameters | |
CN111724558B (zh) | 一种监控方法、装置及入侵报警*** | |
CN105095769A (zh) | 一种信息服务软件漏洞检测方法 | |
CN103023889A (zh) | 一种安全域风险量化方法 | |
CN109471201A (zh) | 一种安检方法及装置 | |
Belloni et al. | SAR image dataset of military ground targets with multiple poses for ATR | |
US20160133023A1 (en) | Method for image processing, presence detector and illumination system | |
Gao et al. | Modified log-ratio operator for change detection of synthetic aperture radar targets in forest concealment | |
CN109613562A (zh) | 测风激光雷达有效探测边界的识别方法及装置 | |
CN116434161B (zh) | 用于判断基于高位视频的停车行为是否可信的方法和*** | |
KR102664000B1 (ko) | 블록체인 네트워크의 위험 월렛 주소를 관리하는 방법 및 장치 | |
Gardezi et al. | Enhanced target recognition employing spatial correlation filters and affine scale invariant feature transform | |
Dowdy et al. | Voxel-space radar signal processing for side attack explosive ballistic detection | |
US8102305B2 (en) | Filtering sensor data to provide estimates of structures | |
US20200302614A1 (en) | Target detection and tracking method | |
Pietkiewicz et al. | Fusion of identification information from ELINT-ESM sensors | |
Grönwall et al. | Spatial filtering for detection of partly occluded targets | |
Zhang et al. | Synthetic aperture radar ship detection in complex scenes based on multifeature fusion network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 15908695 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 15908695 Country of ref document: EP Kind code of ref document: A1 |