Search

CN-121982770-A - Security and protection treatment method, system, terminal and medium based on behavior recognition

CN121982770ACN 121982770 ACN121982770 ACN 121982770ACN-121982770-A

Abstract

The invention belongs to the technical field of security and protection treatment, and particularly discloses a security and protection treatment method, system, terminal and medium based on behavior identification. The method comprises the steps of obtaining environment perception data of a target area, wherein the environment perception data at least comprise image data and space pose information corresponding to image acquisition time, detecting the target based on the environment perception data and executing behavior analysis to generate a behavior recognition result used for representing threat degree of the target, judging whether security treatment triggering conditions are met according to the behavior recognition result, entering a treatment preparation state when the security treatment triggering conditions are met, executing continuous locking on the target in the treatment preparation state to determine a security treatment mode to be adopted, executing a security check flow on the treatment behavior before executing the security treatment mode, and executing security treatment under the condition that security check passes. The method realizes complete flow control from perception, identification, decision-making to treatment, and improves safety and controllability in public scenes.

Inventors

  • DU MIN
  • YANG ZHONGBAO
  • YU PENG
  • Fu Rongjian

Assignees

  • 山东标度信息科技有限公司

Dates

Publication Date
20260505
Application Date
20260126

Claims (10)

  1. 1. The security and protection treatment method based on behavior recognition is characterized by comprising the following steps of: acquiring environment perception data of a target area, wherein the environment perception data at least comprises image data and space pose information corresponding to image acquisition time; Detecting a target based on the environment perception data and performing behavior analysis to generate a behavior recognition result for representing the threat degree of the target; Judging whether the security treatment triggering condition is met according to the behavior recognition result, and entering a treatment preparation state when the security treatment triggering condition is met; In a treatment preparation state, continuously locking a target, and determining a security treatment mode to be adopted; before executing the security disposal mode, executing a security check flow on the disposal behavior; and executing security treatment under the condition that the security check passes.
  2. 2. The behavior-recognition-based security treatment method according to claim 1, wherein when detecting a target based on the environmental awareness data and performing behavior analysis, comprising: denoising and correcting distortion of the sensing data and synchronizing time; Detecting a personnel target in the image, generating a target frame, and tracking the personnel target according to the association relation of the adjacent frame target frames to obtain real-time spatial position information of the target; The real-time spatial position information at least comprises one of pixel coordinates and corresponding spatial coordinates; Performing face detection and feature extraction on a face region in a target frame, and performing similarity matching on face features and a preset feature library to obtain an identity recognition result of a target; carrying out gesture estimation or motion feature extraction on limb or hand regions in the target frame to obtain target limb or hand motion features; Executing suspicious object detection in a target frame or a hand neighborhood region to obtain a recognition result of whether the target carries suspicious objects or not; the behavior recognition result comprises an identification result of the target, real-time spatial position information of the target, and a recognition result of whether the target carries suspicious articles or not.
  3. 3. The security treatment method based on behavior recognition according to claim 2, wherein determining whether the security treatment trigger condition is satisfied according to the behavior recognition result comprises: Respectively taking an identity recognition result, real-time spatial position information, limb or hand action characteristics and suspicious object recognition results in the behavior recognition result as independent evidence sources, and constructing a trigger judgment model aiming at a preset threat hypothesis set, wherein the threat hypothesis set comprises a normal state, a suspicious state and a high-risk state; Respectively calculating a corresponding probability distribution result aiming at each evidence source, wherein the probability distribution result is used for representing the support degree of the evidence source to a normal state, a suspicious state and a high-risk state; and executing evidence fusion operation on the probability distribution results of the evidence sources to obtain a fused probability distribution result, and taking the probability value distributed to the high-risk state in the fused probability distribution result as a high-risk judgment index.
  4. 4. The security and protection method based on behavior recognition according to claim 3, wherein when the probability value assigned to the high-risk state in the fused probability assignment result is used as the high-risk determination index, the method comprises: applying time sequence consistency constraint to the high-risk judging index in a preset sliding time window, wherein the time sequence consistency constraint is one of continuous frame monotonous enhancement constraint or accumulated increment constraint; Triggering judgment is carried out by adopting a sequential judgment strategy, wherein when the high-risk judgment index meets the time sequence consistency constraint in continuous frames and reaches a preset triggering threshold and continuously reaches a preset triggering duration, the triggering judgment is carried out to judge that the security treatment triggering condition is met; When the high-risk judging index is continuously lower than a preset revocation threshold or meets the accumulated decrement constraint in continuous frames and continuously reaches the preset revocation duration, the security treatment triggering condition is revoked; And when the difference value of the fused probability distribution results among the threat states is smaller than a preset difference threshold, judging that the current observation is in a state which is difficult to distinguish, and setting the triggering judgment as invalid.
  5. 5. The behavior-based security treatment method according to claim 1, wherein when it is determined that the security treatment trigger condition is satisfied and the treatment preparation state is entered, comprising: Continuously locking and tracking the personnel target based on the real-time space position information of the personnel target, and predicting the movement trend of the personnel target in a preset time period to obtain a predicted position; Pre-configuring or pre-aligning pointing parameters of the treatment device based on the predicted position, and determining the relative distance and the relative position between the personnel target and the treatment device by combining the size change of the target frame, the visual angle change or the ranging result; According to suspicious object identification results of personnel targets, limb or hand action characteristics and spatial relations between the personnel targets and key protection areas, security protection treatment modes to be adopted are selected from a preset security protection treatment mode set, the security protection treatment mode set at least comprises one or more of net capturing limitation, acousto-optic deterrence and pungent medium dispersion, and the selection results and corresponding treatment parameters are output together for subsequent security verification processes.
  6. 6. The behavior-recognition-based security treatment method according to claim 5, wherein performing a security check procedure on a treatment behavior comprises: Performing authorization verification on the treatment authority corresponding to the security and protection treatment mode to be adopted, wherein the authorization verification at least comprises one or more of manual authorization confirmation and pre-authorization validity verification; Executing safety area verification on an area where a personnel target is located, wherein the safety area verification at least comprises one or more of forbidden area verification, sensitive area verification and crowd intensive risk verification, and forbidding to execute network capturing limitation or stimulated medium dispersion and switching to acousto-optic deterrence when the personnel target is located in the forbidden area or the crowd intensive risk condition is met; performing an overstock suppression check on the treatment intensity and the treatment frequency, the overstock suppression check including at least one or more of an upper limit on treatment times per unit time, an upper limit on treatment duration, or a lower limit on treatment interval time for the same target; and when any check fails, setting the treatment trigger judgment as invalid, keeping the continuous locking and tracking of the personnel target, and outputting a control instruction only reporting and continuously tracking.
  7. 7. The behavior-recognition-based security treatment method according to claim 6, wherein performing security treatment if a security check flow passes comprises: Invoking a corresponding treatment execution strategy according to a security treatment mode to be adopted, dynamically correcting treatment parameters according to real-time spatial position information of a personnel target, a predicted position and a prealignment state of a treatment device, and then executing treatment actions; Collecting treatment process monitoring data in the treatment process, wherein the treatment process monitoring data at least comprises target tracking continuity, treatment device working state and personnel target behavior change information, when target loss occurs in the treatment process, treatment device abnormality or treatment effect does not meet preset validity conditions, stopping treatment and backing to a continuous tracking mode, and simultaneously recording a current trigger judgment result, a treatment mode, treatment parameters and a safety verification result for subsequent rechecking.
  8. 8. A behavior-based security treatment system for implementing the behavior-based security treatment method as claimed in claim 1, the system comprising: the mobile platform module is used for providing mobile bearing capacity, power supply support and communication capacity for the system and comprises a built-in power supply, a main control unit and a communication module; the multispectral sensing module is arranged on the mobile platform module and is used for collecting environment sensing data of a target area, wherein the environment sensing data at least comprises visible light image data, infrared light filling sensing data and thermal imaging data; The recognition and behavior analysis module is in communication connection with the multispectral sensing module and operates on the main control unit, and is used for executing personnel target detection, target tracking, face comparison and behavior feature analysis on the environment sensing data to generate a behavior recognition result for representing the threat degree of the target; the alarm decision module is used for judging the alarm grade corresponding to the target based on the behavior recognition result and outputting a reporting instruction, a tracking instruction or a treatment preparation instruction according to the alarm grade; The security control module is used for carrying out security check on the treatment behavior before security treatment is executed, and the security check at least comprises manual confirmation check, electronic fence check and treatment effectiveness detection; And the non-fatal treatment execution module is arranged on the mobile platform module and is used for executing corresponding non-fatal security and protection treatment according to the control instruction output by the alarm decision module under the condition that the security check passes.
  9. 9. A terminal, comprising: a memory for storing security treatment programs based on behavior recognition; A processor for implementing the steps of the behavior-based security treatment method according to any one of claims 1-7 when executing the behavior-based security treatment device.
  10. 10. A computer readable storage medium storing computer instructions which, when read by a computer, perform the behavior-based security treatment method of any one of claims 1 to 7.

Description

Security and protection treatment method, system, terminal and medium based on behavior recognition Technical Field The invention belongs to the technical field of security and protection treatment, and particularly relates to a security and protection treatment method, system, terminal and medium based on behavior identification. Background With the continuous promotion of public security demand, areas such as airport, station, subway station, garden, campus, large-scale public place of activities have put forward higher demands to security system's instantaneity, accuracy and security. The existing security technology generally depends on fixed video monitoring equipment, manual patrol or a simple alarm device, discovery and treatment of abnormal events mainly depend on experience judgment and manual intervention of manual attendees, and the problems of lag response, strong subjectivity, limited coverage range and the like exist. In recent years, intelligent video analysis technology based on computer vision is gradually applied to the field of security and protection, and automatic recognition and behavior analysis of personnel targets are realized through technical means such as target detection, target tracking, face recognition and the like. However, after detecting an abnormality, some security systems in the prior art can only trigger an alarm or send alarm information to the background, and subsequent treatment still depends on manual remote judgment and manual operation, so that an effective linkage mechanism from sensing, identification and treatment is difficult to form. In an application scenario involving non-fatal treatment, if there is a lack of refined decision and safety constraints on treatment triggering conditions, there is a risk of overstocking or mishandling, thereby affecting public safety and system acceptability. Disclosure of Invention Aiming at the problems in the prior art, the invention provides a security and protection disposal method, a security and protection system, a terminal and a medium based on behavior recognition, which are used for solving the problems that after the security and protection system in the prior art detects an abnormality, the security and protection system in the prior art can only trigger an alarm or send alarm information to a background, the subsequent disposal still depends on manual remote judgment and manual operation, and an effective linkage mechanism from perception, recognition and disposal is difficult to form. The technical scheme adopted by the invention is as follows: in a first aspect, the present application provides a security and protection treatment method based on behavior recognition, the method comprising the steps of: acquiring environment perception data of a target area, wherein the environment perception data at least comprises image data and space pose information corresponding to image acquisition time; Detecting a target based on the environment perception data and performing behavior analysis to generate a behavior recognition result for representing the threat degree of the target; Judging whether the security treatment triggering condition is met according to the behavior recognition result, and entering a treatment preparation state when the security treatment triggering condition is met; In a treatment preparation state, continuously locking a target, and determining a security treatment mode to be adopted; before executing the security disposal mode, executing a security check flow on the disposal behavior; and executing security treatment under the condition that the security check passes. Further, detecting the target based on the environmental awareness data and performing the behavioral analysis includes: denoising and correcting distortion of the sensing data and synchronizing time; Detecting a personnel target in the image, generating a target frame, and tracking the personnel target according to the association relation of the adjacent frame target frames to obtain real-time spatial position information of the target; The real-time spatial position information at least comprises one of pixel coordinates and corresponding spatial coordinates; Performing face detection and feature extraction on a face region in a target frame, and performing similarity matching on face features and a preset feature library to obtain an identity recognition result of a target; carrying out gesture estimation or motion feature extraction on limb or hand regions in the target frame to obtain target limb or hand motion features; Executing suspicious object detection in a target frame or a hand neighborhood region to obtain a recognition result of whether the target carries suspicious objects or not; the behavior recognition result comprises an identification result of the target, real-time spatial position information of the target, and a recognition result of whether the target carries suspicious articles or not. Further, judging