[1]吴春香,吴 恋.面向视频的人员入侵检测方法研究及应用[J].计算机技术与发展,2022,32(04):116-121.[doi:10. 3969 / j. issn. 1673-629X. 2022. 04. 020]
 WU Chun-xiang,WU Lian.Research and Application of Video Oriented Personnel Intrusion Detection Method[J].,2022,32(04):116-121.[doi:10. 3969 / j. issn. 1673-629X. 2022. 04. 020]
点击复制

面向视频的人员入侵检测方法研究及应用()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
32
期数:
2022年04期
页码:
116-121
栏目:
应用前沿与综合
出版日期:
2022-04-10

文章信息/Info

Title:
Research and Application of Video Oriented Personnel Intrusion Detection Method
文章编号:
1673-629X(2022)04-0116-06
作者:
吴春香1 吴 恋2
1. 贵州大学 计算机科学与技术学院,贵州 贵阳 550025;
2. 贵州师范学院,贵州 贵阳 550018
Author(s):
WU Chun-xiang1 WU Lian2
1. School of Computer Science & Technology,Guizhou University,Guiyang 550025,China;
2. Guizhou Education University,Guiyang 550018,China
关键词:
视频监控入侵检测区域入侵越线入侵yolov3
Keywords:
video surveillanceintrusion detectionregional intrusionline-crossing intrusionyolov3
分类号:
TP391.4
DOI:
10. 3969 / j. issn. 1673-629X. 2022. 04. 020
摘要:
近年来智能视频监控在智能安防中的应用越来越广泛,人员入侵则是智能监控中一个重要部分。 然而传统基于运动检测的入侵检测方法稳定性差,容易受到光照和相似物干扰引起误报,为解决这个问题,文章主要对基于深度学习的区域入侵检测和越线入侵检测方法进行研究,实现视频监控下人员入侵智能检测与入侵帧存储。 针对不同监控角度下yolov3 检测得到的行人,设置不同检测点作为入侵检测定位点,在入侵判断方面,为提高判断的稳定性,文章提出鲁棒有效的入侵判断规则,即采用行人连续多帧位置的均值为判断依据,当行人连续多帧位于禁区时启动报警。 通过在多个场景中与现有流行方法进行对比实验验证了所提方法的实时性、有效性及鲁棒性。
Abstract:
In recent years,the intelligent video surveillance is widely applied in intelligent security,and personnel intrusion is an important part of intelligent surveillance. However,the traditional intrusion detection method based on motion detection has poor stability and is prone to false positives caused by illumination and similar interference. To solve this problem,the deep learning-based regional intrusion detection and line-crossing intrusion detection methods are mainly studied to realize the intelligent detection of personnel intrusion and the storage of intrusion frames. For pedestrians detected by yolov3 from different monitoring angles,different detection points are set as the registration points for intrusion detection. In terms of invasion of judgment, to improve the stability of the judgment, a robust and effective intrusion judgment rule is proposed,that is,the average position of pedestrians in consecutive multiple frames is used as the basis of judgment, and the alarm is activated when pedestrians in consecutive multiple frames are in the restricted area. The real - time performance, effectiveness and robustness of the proposed method are verified by comparing with the existing popular methods in a number of scenarios.

相似文献/References:

[1]洪红 朱秀昌.一种新的人手图像跟踪算法[J].计算机技术与发展,2010,(03):88.
 HONG Hong,ZHU Xiu-chang.A New Human Hand - Image Tracking Method[J].,2010,(04):88.
[2]李雷 丁亚丽 罗红旗.基于规则约束制导的入侵检测研究[J].计算机技术与发展,2010,(03):143.
 LI Lei,DING Ya-li,LUO Hong-qi.Intrusion Detection Technology Research Based on Homing - Constraint Rule[J].,2010,(04):143.
[3]高峥 陈蜀宇 李国勇.混合入侵检测系统的研究[J].计算机技术与发展,2010,(06):148.
 GAO Zheng,CHEN Shu-yu,LI Guo-yong.Research of a Hybrid Intrusion Detection System[J].,2010,(04):148.
[4]林英 张雁 欧阳佳.日志检测技术在计算机取证中的应用[J].计算机技术与发展,2010,(06):254.
 LIN Ying,ZHANG Yan,OU Yang-jia.Application of Log Testing Technology in Computer Forensics[J].,2010,(04):254.
[5]李钦 余谅.基于免疫遗传算法的网格入侵检测模型[J].计算机技术与发展,2009,(05):162.
 LI Qin,YU Liang.Grid Intrusion Detection Model Based on Immune Genetic Algorithm[J].,2009,(04):162.
[6]黄世权.网络存储安全分析[J].计算机技术与发展,2009,(05):170.
 HUANG Shi-quan.Analysis of Network Storage's Safety[J].,2009,(04):170.
[7]李睿 肖维民.基于孤立点挖掘的异常检测研究[J].计算机技术与发展,2009,(06):168.
 LI Rui,XIAO Wei-min.Research on Anomaly Intrusion Detection Based on Outlier Mining[J].,2009,(04):168.
[8]胡琼凯 黄建华.基于协议分析和决策树的入侵检测研究[J].计算机技术与发展,2009,(06):179.
 HU Oiong-kai,HUANG Jian-hua.Intrusion Detection Based on Protocol Analysis and Decision Tree[J].,2009,(04):179.
[9]汪世义.基于优化支持向量机的网络入侵检测技术研究[J].计算机技术与发展,2009,(07):177.
 WANG Shi-yi.Network Intrusion Detection Based on Improved Support Vector Machine[J].,2009,(04):177.
[10]薛俊 陈行 陶军.一种基于神经网络的入侵检测技术[J].计算机技术与发展,2009,(08):148.
 XUE Jun,CHEN Hang,TAO Jun.Technology of Intrusion Detection Based on Neural Network[J].,2009,(04):148.

更新日期/Last Update: 2022-04-10