Smart Security application

Smart home and security home new technology and innovation. DIY home automation sharing knowledge and experience.
vedard
Posts: 837
Joined: Wed Dec 05, 2018 12:27 am

Smart Security application

Unread post by vedard »

Typical smart security applications
With the penetration of AI in the security industry and the research and development of deep-level application technology, the current security industry has shown a new trend of "no AI, no security", the security monitoring manufacturers of the whole line of AI products has been an indisputable fact, but also become a new strategy of the manufacturers.With the in-depth landing of AI in the security industry, the product form and application pattern of AI in the security field, especially in the field of video surveillance, also begin to be stable. AI technologies in the security industry are mainly focused on face recognition, vehicle recognition, pedestrian recognition, behavior recognition, structural analysis, large-scale video retrieval and other directions.
AI application scenarios in security industry are divided into bayonet scenarios and non-bayonet scenarios. The former refers to the application scenarios with controllable conditions such as light and Angle, mainly vehicle bayonet and face bayonet.The latter refers to ordinary security surveillance video scenes.Among them, the bayonet scene accounts for about 1%-3% of the total number of surveillance cameras, and the rest are non-bayonet scene surveillance videos.
1. Bayonet scene: face identification application
The application of face identification is represented by the deployment of personnel in the public security industry, the deployment of face capture camera at key points, the analysis and recognition of the captured face through the back-end face recognition server, and the comparison with the face blacklist database.With the enhancement of personnel deployment application, the initial effect has been shown.For example, the recent arrest of suspects in "Jacky cheung concert" is the identity confirmed by the scene of bayonet.
2. Bayonet scene: face authentication application
Face authentication applications are becoming more common.Common face whitelist applications have been implemented in many industries, such as face access control, face speed gate, face attendance, personnel identification, etc., widely used in enterprises, all kinds of parks and other scenarios.In addition to implementing the basic face recognition application, the face entrance guard can also prevent the face impersonation behavior such as photos and videos, and effectively guarantee the security control and daily staff management of the entrance and exit personnel.
3. Bayonet scene: vehicle identification application
Vehicle identification technology is one of the most mature and effective technologies in the actual combat of public security.With the help of vehicle bayonet throughout the country, license plate recognition makes it possible to "find people by car" and successfully helps the police to solve all kinds of cases.Vehicle recognition technology has been developed from the initial application stage of vehicle recognition based on license plate to the precise application stage of vehicle recognition such as vehicle model recognition and vehicle license plate recognition.
4. Non-bayonet scenario: video structured analysis and quick retrieval application
In the application of video structured analysis and fast retrieval, the function of video structured service is to classify and detect the motor vehicle, non-motor vehicle and pedestrian in the video.At the same time, the small image of the target and the large image of the scene are extracted and written into the storage device, which is convenient for the subsequent quick query and intelligent retrieval.By quickly analyzing and extracting the feature attribute information of the interested target in the video structured service, the user can efficiently obtain the clues related to the case and events, and promote the video data in the era of big security to leap from seeing clearly to understanding.
5. Non-bayonet scenario: behavior analysis auxiliary security application
Behavior analysis can assist security applications.The behavior analysis system is used to analyze and deal with the abnormal behavior of personnel, which can be applied to the machine identification of the prevention of key areas, the monitoring of important items, the suspicious dangerous items left behind, etc.It can also alarm the abnormal behavior of personnel, which greatly improves the application efficiency of video monitoring.
[attachment=0]smart security ecosphere.jpg[/attachment]
Attachments
Smart security
Smart security
smart security ecosphere.jpg (55.94 KiB) Viewed 4937 times
Shop Focus brand wireless alarm, HB solar power alarm, HST fire alarm at https://www.vedardalarm.com
RalphRox
Posts: 1
Joined: Mon Oct 12, 2020 8:48 pm

Smart Security application

Unread post by RalphRox »

anyone network/app security experts one this forum looking for a challenge to showcase their skills? send me a pm for more info if you are interested.

variant3
Post Reply