1. Technical Field
The present disclosure relates to a video monitoring system and a video monitoring method.
2. Description of Related Art
Video monitoring systems monitor areas by cameras positioned in the areas to be monitored. The security-monitoring terminal can monitor captured images through monitor screens. To locate an intruder in a supervised area, the user of the security-monitoring terminal needs to switch the camera manually, to continuously track the intruder, which is inconvenient.
Referring to
The cameras are mounted in a plurality of areas that need to be monitored, to capture images in an area and send the captured images to the detection unit 20.
The detection unit 20 can determine whether an intruder enters an area, according to the captured images from the cameras. When an intruder enters one of the areas, the detection unit 20 confirms a position of the intruder and other information according to the captured images and sends the position and other information to the processing unit 30. Other information may include face recognition of the intruder. In one embodiment, the detection unit 20 is a facial recognition unit. The detection unit 20 examines the images to find items, such as faces, in the captured images to determine whether there are intruders in the areas. It is noteworthy, that the detection unit 20 can use a well-known facial recognition technology to find faces in the images. Upon the condition that the detection unit 20 finds a face in the captured images during monitoring, it assesses that there might be an intruder entering one of the monitored areas.
The storage unit 40 stores a camera database. In one embodiment, the camera database can be described as shown in Table 1. The database includes the following parameters: camera of the current monitored area where the intruder enters, next monitored area the intruder will enter, and camera corresponding to the next monitored area. For example, the intruder is currently located in a first area “a” corresponding to camera A, and the next time the intruder may be located in a second area “b” monitored with camera B, or in a third area “c” monitored with camera C.
The processing unit 30 receives the position information of the intruder from the detection unit 20, and compares the received position information with the content of the database stored in the storage unit 40, to determine the next monitored area that the intruder will enter. If the intruder still remains in the current monitored area, the processing unit 30 controls the camera of the current monitored area to continuously capture images of the intruder, and sends the captured images to the detection unit 20. If the intruder enters an intersection between the current monitored area and the next monitored area, the processing unit 30 switches between the cameras of the current monitored area to the camera corresponding to the next monitored area. Then, it controls the cameras of the current monitored area and the next monitored area to capture the images of the corresponding monitored areas, and sends the captured images to the detection unit 20, thus automatically and continuously tracking the intruder. Therefore, there is no need to manually switch the cameras for capturing images.
To illustrate one scenario, referring to
The camera A captures the image of the intruder if he/she enters the monitored area “a,” and sends the captured images to the detection unit 20. When the detection unit 20 confirms that the intruder entered the monitored area “a” according to the captured images, the detection unit 20 outputs position information of the intruder to the processing unit 30. The processing unit 30 compares the received information with the content of the camera database stored in the storage unit 40. If the intruder remains in the monitored area “a,” camera A will continue to capture images and send the images to the detection unit 20. When the intruder enters one of the intersection ranges “ab” and/or “ac,” such as the intersection range “ab,” the processing unit 30 determines if the intruder will enter the monitored area “b” or remain in the monitored area “a.” The processing unit 30 searches the cameras A and B corresponding to the monitored areas “a” and “b” from the camera database, and controls the cameras A and B to capture the images of the monitored areas “a” and “b” and sends the images to the detection unit 20. If the intruder enters the intersection ranges “abc,” the processing unit 30 determines if the intruder will enter the monitored area “b” or the monitored area “c,” or remain in the monitored area “a.” The processing unit 30 searches the cameras A, B, and C from the camera database, and controls the cameras A, B, and C to capture the images of the monitored areas “abc” and sends the images to the detection unit 20. Therefore, the video monitoring system can continuously track the intruder.
Referring to
In step S1, the plurality of cameras captures images of the plurality of monitored areas, and sends the captured images to the detection unit 20.
In step S2, the detection unit 20 determines whether an intruder enters one of the monitored areas according to the received images. If an intruder enters one of the monitored areas, the procedure goes to step S3. If the intruder does not enter one of the monitored areas, the procedure goes back to step S1.
In step S3, the detection unit 20 confirms the position information of the intruder and sends the position information to the processing unit 30.
In step S4, the processing unit 30 receives the position information of the intruder from the detection unit 20 and compares the received information with the content of the camera database stored in the storage unit 40, to determine a next monitored area that the intruder will enter. If the intruder remains in the current monitored area, the procedure goes to step S5. If the intruder enters an intersection area between the current monitored area and a next monitored area, the procedure goes to step S6.
In step S5, the processing unit 30 controls the camera of the current monitored area to continuously capture the images of the intruder and sends the images to the detection unit 20, and the procedure goes back to step S3.
In step S6, the processing unit 30 searches the camera of the current monitored area and a camera corresponding to the next monitored area from the camera database, and then controls the cameras of the current monitored area and the next monitored area to capture the images of the corresponding monitored areas and send the images to the detection unit 20. The procedure goes back to step S3.
The processing unit 30 compares the received information from the detection unit 20 with the content of the camera database stored in the storage unit 40, to determine a next monitored area that the intruder may enter. If the intruder is still located at the current monitored area, the processing unit 30 controls the camera of the current monitored area to continuously capture the images of the intruder and sends the images to the detection unit 20. If the intruder enters an intersection between the current monitored area and the next monitored area, the processing unit 30 uses the camera of the current monitored area and a camera corresponding to the next monitored area from the camera database, and controls the cameras of the current monitored area and the next monitored area to capture the images of the corresponding monitored areas and send the images to the detection unit 20. The video monitoring system can continuously track the intruder automatically and does not need manually switching the cameras for capturing images of the intruder.
The foregoing description of the embodiments of the disclosure has been presented only for the purposes of illustration and description and is not intended to be exhaustive or to limit the disclosure to the precise forms disclosed. Many modifications and variations are possible in light of the above everything. The embodiments were chosen and described in order to explain the principles of the disclosure and their practical application so as to enable others of ordinary skill in the art to utilize the disclosure and various embodiments and with various modifications as are suited to the particular use contemplated. Alternative embodiments will become apparent to those of ordinary skills in the art to which the present disclosure pertains without departing from its spirit and scope. Accordingly, the scope of the present disclosure is defined by the appended claims rather than the foregoing description and the embodiments described therein.
Number | Date | Country | Kind |
---|---|---|---|
99101562 | Jan 2010 | TW | national |