Disclosure of Invention
In order to solve the technical problems in the related field, the invention provides a data transceiving system and a data transceiving method applying characteristic analysis, which can sharpen and detect a blurred fingerprint target in real time on the basis of targeted signal analysis, and wirelessly report the detection result to a remote security control center, thereby improving the real-time performance and effectiveness of field trace analysis.
Therefore, the invention needs to have the following two key points:
(1) extracting each fingerprint area where each fingerprint target is respectively located from the image based on the fingerprint imaging characteristics, and performing sharpening processing based on a spatial differentiation method on each fingerprint area when the definition of each fingerprint area is insufficient so as to obtain a corresponding instant sharpened area;
(2) and respectively carrying out similarity analysis on each instant sharpening area and each fingerprint pattern so as to upload the names of the escapers corresponding to the fingerprint patterns with the similarity exceeding the limit to a remote security control center as the names of the target persons.
According to an aspect of the present invention, there is provided a data transceiving system applying a feature analysis, the system including:
the data transceiver is positioned on the handheld security terminal and used for wirelessly downloading each fingerprint pattern of each escaping person;
the data transceiver is also used for wirelessly uploading the received one or more target personnel names to a remote security control center;
the embedded camera is positioned on the handheld security terminal and is used for shooting images of the current monitored environment of the handheld security terminal so as to obtain and output a corresponding current monitoring image;
the image correction equipment is connected with the embedded camera and used for executing geometric correction processing on the received current monitoring image so as to obtain an instant correction image;
the morphological processing device is connected with the image correction device and is used for performing morphological processing on the received instant correction image to obtain a corresponding field processing image;
the histogram equalization equipment is connected with the morphological processing equipment and is used for executing histogram equalization processing on the received field processing image so as to obtain a real-time equalized image;
the fingerprint extraction device is connected with the histogram equalization device and used for receiving the real-time equalization image and extracting each fingerprint area where each fingerprint target is respectively located from the real-time equalization image based on fingerprint imaging characteristics;
the data sharpening device is connected with the fingerprint extraction device and is used for receiving each fingerprint area and carrying out sharpening processing based on a spatial differentiation method on each fingerprint area when the definition of each fingerprint area is insufficient so as to obtain a corresponding instant sharpened area;
and the name recognition device is realized by adopting an ASIC chip, is respectively connected with the data receiving and transmitting device and the data sharpening device, and is used for respectively carrying out similarity analysis on each instant sharpening area and each fingerprint pattern so as to output the name of the person escaping from the house corresponding to the fingerprint pattern with the similarity exceeding the limit as the name of the target person.
According to another aspect of the present invention, there is also provided a data transceiving method using feature analysis, the method including:
the data receiving and sending equipment is used and positioned on the handheld security terminal and used for wirelessly downloading each fingerprint pattern of each escaping person;
the data transceiver is also used for wirelessly uploading the received one or more target personnel names to a remote security control center;
the method comprises the following steps that an embedded camera is used, is located on a handheld security terminal and is used for shooting images of the environment currently monitored by the handheld security terminal so as to obtain and output a corresponding current monitoring image;
using an image correction device connected with the embedded camera and used for executing geometric correction processing on the received current monitoring image to obtain an instant correction image;
using a morphological processing device, connected to the image correction device, for performing morphological processing on the received live corrected image to obtain a corresponding live processed image;
using a histogram equalization device connected with the morphological processing device, and executing histogram equalization processing on the received field processing image to obtain a real-time equalized image;
using fingerprint extraction equipment, connecting with the histogram equalization equipment, and receiving the real-time equalization image, and extracting each fingerprint area where each fingerprint target is respectively located from the real-time equalization image based on fingerprint imaging characteristics;
the data sharpening device is connected with the fingerprint extraction device and used for receiving each fingerprint area and carrying out sharpening processing based on a spatial differentiation method on each fingerprint area when the definition of each fingerprint area is insufficient so as to obtain a corresponding instant sharpened area;
and the name recognition device is realized by adopting an ASIC chip, is respectively connected with the data receiving and transmitting device and the data sharpening device, and is used for respectively carrying out similarity analysis on each instant sharpening region and each fingerprint pattern so as to output the name of the person escaping from the house corresponding to the fingerprint pattern with the similarity exceeding the limit as the name of the target person.
The data receiving and transmitting system and method applying characteristic analysis are compact in design and convenient to use. The on-site fingerprint target is subjected to self-adaptive deepening processing, and timely information analysis and result uploading are performed on the on-site fingerprint target, so that the on-site monitoring effect is ensured.
Detailed Description
Embodiments of the data transmission and reception system and method using characteristic analysis according to the present invention will be described in detail below.
Signal processing is the general term for processing various types of electrical signals for various intended purposes and requirements. The processing of analog signals is referred to as analog signal processing, and the processing of digital signals is referred to as digital signal processing. The term "signal processing" refers to a process of processing a signal recorded on a certain medium to extract useful information, and is a generic term for processes of extracting, converting, analyzing, and synthesizing the signal.
One processes the signal in order to utilize it. For example, when the electrical signal is weak, it needs to be amplified; when noise is mixed, the noise needs to be filtered; when the frequency is not suitable for transmission, modulation and demodulation are needed; when the signal is distorted, the signal needs to be balanced; when the signal types are many, identification and the like are required.
At present, in actual security monitoring, fingerprint information is an important way for personnel tracking, however, at present, image processing of fingerprints is only limited to original fingerprint data, adaptive sharpening operation cannot be executed according to the definition of a fingerprint image, so that the error of field fingerprint analysis is large, and meanwhile, a portable field monitoring instrument is lacked, so that the specific operation of field monitoring is difficult to execute.
In order to overcome the defects, the invention builds a data receiving and transmitting system and method applying characteristic analysis, and can effectively solve the corresponding technical problem.
The data transmitting and receiving system applying the characteristic analysis according to the embodiment of the invention comprises:
the data transceiver is positioned on the handheld security terminal and used for wirelessly downloading each fingerprint pattern of each escaping person;
the data transceiver is also used for wirelessly uploading the received one or more target personnel names to a remote security control center;
the embedded camera is positioned on the handheld security terminal and is used for shooting images of the current monitored environment of the handheld security terminal so as to obtain and output a corresponding current monitoring image;
the image correction equipment is connected with the embedded camera and used for executing geometric correction processing on the received current monitoring image so as to obtain an instant correction image;
the morphological processing device is connected with the image correction device and is used for performing morphological processing on the received instant correction image to obtain a corresponding field processing image;
the histogram equalization equipment is connected with the morphological processing equipment and is used for executing histogram equalization processing on the received field processing image so as to obtain a real-time equalized image;
the fingerprint extraction device is connected with the histogram equalization device and used for receiving the real-time equalization image and extracting each fingerprint area where each fingerprint target is respectively located from the real-time equalization image based on fingerprint imaging characteristics;
the data sharpening device is connected with the fingerprint extraction device and is used for receiving each fingerprint area and carrying out sharpening processing based on a spatial differentiation method on each fingerprint area when the definition of each fingerprint area is insufficient so as to obtain a corresponding instant sharpened area;
and the name recognition device is realized by adopting an ASIC chip, is respectively connected with the data receiving and transmitting device and the data sharpening device, and is used for respectively carrying out similarity analysis on each instant sharpening area and each fingerprint pattern so as to output the name of the person escaping from the house corresponding to the fingerprint pattern with the similarity exceeding the limit as the name of the target person.
Next, a specific configuration of the data transmission/reception system to which the characteristic analysis of the present invention is applied will be further described.
The data transceiving system applying the feature analysis may further include:
and the hard disk equipment is used for storing various configuration parameters of the name recognition equipment.
In the data transceiving system applying the characteristic analysis:
the hard disk equipment adopts rubber shock absorption, steel wire shock absorption or electronic shock absorption.
The data transceiving system applying the feature analysis may further include:
and the sound pickup equipment is positioned near the name recognition equipment and is used for acquiring real-time audio data of the environment where the name recognition equipment is positioned in real time.
The data transceiving system applying the feature analysis may further include:
and the PSTN communication interface is connected with the name recognition equipment and used for transmitting the current transmission data of the name recognition equipment through a PSTN communication line.
The data transceiving method applying the characteristic analysis according to the embodiment of the invention comprises the following steps:
the data receiving and sending equipment is used and positioned on the handheld security terminal and used for wirelessly downloading each fingerprint pattern of each escaping person;
the data transceiver is also used for wirelessly uploading the received one or more target personnel names to a remote security control center;
the method comprises the following steps that an embedded camera is used, is located on a handheld security terminal and is used for shooting images of the environment currently monitored by the handheld security terminal so as to obtain and output a corresponding current monitoring image;
using an image correction device connected with the embedded camera and used for executing geometric correction processing on the received current monitoring image to obtain an instant correction image;
using a morphological processing device, connected to the image correction device, for performing morphological processing on the received live corrected image to obtain a corresponding live processed image;
using a histogram equalization device connected with the morphological processing device, and executing histogram equalization processing on the received field processing image to obtain a real-time equalized image;
using fingerprint extraction equipment, connecting with the histogram equalization equipment, and receiving the real-time equalization image, and extracting each fingerprint area where each fingerprint target is respectively located from the real-time equalization image based on fingerprint imaging characteristics;
the data sharpening device is connected with the fingerprint extraction device and used for receiving each fingerprint area and carrying out sharpening processing based on a spatial differentiation method on each fingerprint area when the definition of each fingerprint area is insufficient so as to obtain a corresponding instant sharpened area;
and the name recognition device is realized by adopting an ASIC chip, is respectively connected with the data receiving and transmitting device and the data sharpening device, and is used for respectively carrying out similarity analysis on each instant sharpening region and each fingerprint pattern so as to output the name of the person escaping from the house corresponding to the fingerprint pattern with the similarity exceeding the limit as the name of the target person.
Next, the specific steps of the data transmission and reception method to which the characteristic analysis is applied according to the present invention will be further described.
The data transceiving method applying the feature analysis may further include:
and using a hard disk device for storing various configuration parameters of the name recognition device.
The data receiving and sending method applying the characteristic analysis comprises the following steps:
the hard disk equipment adopts rubber shock absorption, steel wire shock absorption or electronic shock absorption.
The data transceiving method applying the feature analysis may further include:
and the pickup equipment is positioned near the name recognition equipment and used for acquiring real-time audio data of the environment where the name recognition equipment is positioned in real time.
The data transceiving method applying the feature analysis may further include:
and the PSTN communication interface is connected with the name recognition equipment and used for transmitting the current transmission data of the name recognition equipment through a PSTN communication line.
In addition, the PSTN is simple and flexible in network access, and generally has the following modes:
(1) and accessing the network through a common dial-up telephone line. The Modem is connected to the original telephone line of both communication parties in parallel, and then the Modem is connected to the corresponding internet access device. In 2013, most internet access equipment such as a PC or a router is provided with a plurality of serial ports, and serial interface specifications such as RS-232 and the like are adopted between the serial ports and the Modem. The cost of the connection mode is relatively economic, the charging price is the same as that of the ordinary telephone, and the method is suitable for occasions with infrequent communication.
(2) The network is accessed through a special telephone line. Compared with the conventional dial-up telephone line method, the leased telephone line can provide higher communication rate and data transmission quality, but the corresponding cost is higher than that of the former method. The access mode using the private line is not greatly different from the access mode using the ordinary dial line, but the dial-up connection process is omitted. Generally, when deciding to use the private line mode, the user must apply to the local telecommunication office, which is responsible for the erection and opening.
(3) The access mode of public data exchange network (X.25 or Frame-Relay, etc.) is switched from PSTN to access via ordinary dialing or special telephone line leasing. The use of this approach to achieve a connection to a remote location is a better remote approach because the public switched data network provides users with reliable connection-oriented virtual circuit services that are much more reliable and faster than the PSTN.
Finally, it should be noted that each functional device in the embodiments of the present invention may be integrated into one processing device, or each device may exist alone physically, or two or more devices may be integrated into one device.
The functions, if implemented in the form of software-enabled devices and sold or used as a stand-alone product, may be stored in a computer-readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.