US20160210829A1 - Security system, security method, and non-transitory computer readable medium - Google Patents

Security system, security method, and non-transitory computer readable medium Download PDF

Info

Publication number
US20160210829A1
US20160210829A1 US14/916,702 US201414916702A US2016210829A1 US 20160210829 A1 US20160210829 A1 US 20160210829A1 US 201414916702 A US201414916702 A US 201414916702A US 2016210829 A1 US2016210829 A1 US 2016210829A1
Authority
US
United States
Prior art keywords
action
suspicious
person
hand
security system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US14/916,702
Inventor
Kaoru Uchida
Nobuyuki Yamashita
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NEC Corp
Original Assignee
NEC Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NEC Corp filed Critical NEC Corp
Assigned to NEC CORPORATION reassignment NEC CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: UCHIDA, KAORU, YAMASHITA, NOBUYUKI
Publication of US20160210829A1 publication Critical patent/US20160210829A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19602Image analysis to detect motion of the intruder, e.g. by frame subtraction
    • G08B13/19608Tracking movement of a target, e.g. by detecting an object predefined as a target, using target direction and or velocity to predict its new position
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T7/00Image analysis
    • G06T7/20Analysis of motion
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/50Context or environment of the image
    • G06V20/52Surveillance or monitoring of activities, e.g. for recognising suspicious objects
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19602Image analysis to detect motion of the intruder, e.g. by frame subtraction
    • G08B13/19613Recognition of a predetermined image pattern or behaviour pattern indicating theft or intrusion
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19639Details of the system layout
    • G08B13/19645Multiple cameras, each having view on one of a plurality of scenes, e.g. multiple cameras for multi-room surveillance or for tracking an object by view hand-over
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/20Movements or behaviour, e.g. gesture recognition
    • G06V40/28Recognition of hand or arm movements, e.g. recognition of deaf sign language

Definitions

  • the present invention relates to a security system, a security method, and a non-transitory computer readable medium storing a security program and, particularly, to a security system, a security method, and a non-transitory computer readable medium storing a security program using person images.
  • Damage caused by shoplifting by customers, misappropriation by part-time employees and the like are a continuous and growing concern for stores.
  • a store staff or a store manager keeps an eye on these customers and part-time employees, or records images monitored by a general 2D camera and visually checks them afterwards.
  • Patent Literatures 1 to 5 Since it is inefficient to visually check for the occurrence of misconduct, the systems disclosed in Patent Literatures 1 to 5 as related art, for example, are under development.
  • Patent Literature 1 when the number of times a store staff's face swings is a specified value of more and the cancelled amount of money in a cash register is a reference value or more, it is detected that a suspicious conduct (suspicious action) has occurred.
  • the technique of the related art performs detection based on a swing of a face or the like, it fails to detect a suspicious action of a shop staff and the like in some cases. For example, although a suspicious action is often carried out by a hand, the technique of the related art cannot detect the behavior on the basis of a hand action.
  • the technique disclosed in the related art has a problem that it is difficult to accurately detect a suspicious action of a store staff, a customer and the like.
  • an exemplary object of the present invention is to provide a security system, a security method, and a non-transitory computer readable medium storing a security program capable of accurately detecting a suspicious action.
  • a security system includes an image information acquisition unit that acquires input image information on an image taken of a person in a store, a tracking unit that tracks an action of a hand of the person based on the input image information, and a suspicious action detection unit that detects a suspicious action of the person based on the tracked action of the hand.
  • a security method includes acquiring input image information on an image taken of a person in a store, tracking an action of a hand of the person based on the input image information, and detecting a suspicious action of the person based on the tracked action of the hand.
  • a non-transitory computer readable medium storing a security program causes a computer to perform a security process including acquiring input image information on an image taken of a person in a store, tracking an action of a hand of the person based on the input image information, and detecting a suspicious action of the person based on the tracked action of the hand.
  • a security system a security method, and a non-transitory computer readable medium storing a security program capable of accurately detecting a suspicious action.
  • FIG. 1 is a block diagram showing main elements of a security system according to an exemplary embodiment.
  • FIG. 2 is a block diagram showing the configuration of a security system according to a first exemplary embodiment
  • FIG. 3A is a diagram showing a configuration example of a 3D camera according to the first exemplary embodiment
  • FIG. 3B is a diagram showing a configuration example of a 3D camera according to the first exemplary embodiment
  • FIG. 4 is a block diagram showing a configuration of a distance image analysis unit according to the first exemplary embodiment
  • FIG. 5 is a flowchart showing the operation of the security system according to the first exemplary embodiment
  • FIG. 6 is a flowchart showing the operation of a distance image analysis process according to the first exemplary embodiment
  • FIG. 7 is a flowchart showing the operation of an alert information generation process according to the first exemplary embodiment
  • FIG. 8 is an explanatory diagram illustrating the operation of the alert information generation process according to the first exemplary embodiment
  • FIG. 9 is a block diagram showing the configuration of a security system according to a second exemplary embodiment.
  • FIG. 10 is a block diagram showing a configuration of a distance image analysis unit according to the second exemplary embodiment.
  • FIG. 1 shows main elements of a security system according to an exemplary embodiment.
  • a security system 10 includes an image information acquisition unit 11 , a tracking unit 12 , and a suspicious action detection unit 13 .
  • the image information acquisition unit 11 acquires input image information, which is an image taken of a person in a store.
  • the tracking unit 12 tracks a hand action of a person based on the acquired input image information.
  • the suspicious action detection unit 13 detects a suspicious action of a person based on the tracked hand action.
  • a hand action of a person in a store is tracked, and a suspicious action is detected based on the tracking result. For example, by tracking a hand action of a customer or a store staff in front of a product shelf in a store, it is possible to accurately detect a suspicious action that can lead to shoplifting or misappropriation.
  • FIG. 2 is a block diagram showing the configuration of a security system according to this exemplary embodiment.
  • This security system is a system that detects a suspicious action of a customer or a store staff in a store or the like and outputs (displays) an alert (alarm) and the like. Note that customer includes all persons who come to (enter) a store, and the store staff includes all persons who work in a store.
  • a security system 1 includes a security device 100 , a 3D camera 210 , a facial recognition camera 220 , an in-store camera 230 , and an alert device 240 .
  • the security device 100 or the alert device 240 may be placed outside the store.
  • the respective components of the security system 1 are separate devices, the respective components may be one or any number of devices.
  • the 3D (three-dimensional) camera 210 is an imaging device (distance image sensor) that takes an image of and measures a target and generates a distance image (distance image information).
  • the distance image (range image) contains image information which is an image of a target taken and distance information which is a distance to a target measured.
  • the 3D camera 210 is Microsoft Kinect (registered trademark) or a stereo camera.
  • the 3D camera 210 takes an image of a customer or a store staff at a specified position in a store in this exemplary embodiment.
  • the 3D camera 210 takes an image of a product shelf (product display shelf) 300 on which a product 301 is placed (displayed), and particularly takes an image of a customer 400 who is about to touch the product 301 in front of the product shelf 300 .
  • the 3D camera 210 takes an image of a product placement area of the product shelf 300 and an area where a customer picks up/looks at a product in front of the product shelf 300 , which is a presentation area where a product is presented to a customer in the product shelf 300 .
  • the 3D camera 210 is placed at a position where images of the product shelf 300 and the customer 400 in front of (in the vicinity of) the product shelf 300 can be taken, which is, for example, above (the ceiling etc.) or in front of (a wall etc.) of the product shelf 300 , or in the product shelf 300 .
  • the 3D camera 210 takes an image of a checkout stand 310 where a cash register 311 is placed, and particularly takes an image of a store staff 410 who is standing in front of the checkout stand 310 and about to sell the product 301 to the customer 400 or the store staff 410 who is about to touch money 302 .
  • the 3D camera 210 is placed at a position where images of the checkout stand 310 and the store staff 410 in front of (in the vicinity of) the checkout stand 310 can be taken, which is, for example, above (the ceiling etc.) or in front of (a wall etc.) of the checkout stand 310 , or on the checkout stand 310 (cash register 311 ).
  • the 3D camera 210 is used as a device that takes images of the product shelf 300 and the checkout stand 310 .
  • it is not limited to the 3D camera but may be a general camera (2D camera) that outputs only images taken. In this case, tracking is performed using the image information only.
  • Each of the facial recognition camera 220 and the in-store camera 230 is an imaging device (2D camera) that takes and generates an image of a target.
  • the facial recognition camera 220 is placed at the entrance of a store or the like, takes an image of a face of a customer who comes to the store and generates a facial image to recognize the customer's face.
  • the in-store camera 230 is placed at a plurality of positions in a store, takes an image of each section in the store and generates an in-store image to detect the congestion of customers in the store.
  • each of the facial recognition camera 220 and the in-store camera 230 may be a 3D camera. By using a 3D camera, it is possible to accurately recognize the customer's face or the congestion in a store.
  • the alert device 240 is a device that notifies (outputs) alert information to a surveillant such as a store manager, a business manager or a security guard and performs recording.
  • the way to transmit (output) alert information to a surveillant is not limited, and it may be a display of letters and images on a display device, audio output through a speaker or the like.
  • the alert device 240 is placed at a position where a surveillant can view (hear) the alert information.
  • the alert device 240 may be an employee terminal in a shelf, a cash register, a guard's room or a store, or it may be a surveillance device connected to the outside of a store via a network.
  • the alert device 240 is a computer including a display device and a storage device, such as a personal computer or a server computer.
  • the security device 100 includes a distance image analysis unit 110 , a person recognition unit 120 , an in-store situation analysis unit 130 , an alert information generation unit 140 , a suspicious action information DB (database) 150 , a 3D video information recording unit 160 , and a suspicious person information DB 170 .
  • a distance image analysis unit 110 the security device 100 includes a distance image analysis unit 110 , a person recognition unit 120 , an in-store situation analysis unit 130 , an alert information generation unit 140 , a suspicious action information DB (database) 150 , a 3D video information recording unit 160 , and a suspicious person information DB 170 .
  • Each element in the security device 100 may be formed by hardware or software or both of them, and may be formed by one hardware or software or a plurality of hardware or software.
  • the product information DB 150 and the customer information DB 160 may be storage devices connected to an external network (cloud).
  • Each function (each processing) of the security device 100 may be implemented by a computer including CPU, memory and the like.
  • a security program for performing a security method (security process) according to the exemplary embodiments may be stored in a storage device, and each function may be implemented by executing the security program stored in the storage device on the CPU.
  • the non-transitory computer readable medium includes any type of tangible storage medium.
  • Examples of the non-transitory computer readable medium include magnetic storage media (such as floppy disks, magnetic tapes, hard disk drives, etc.), optical magnetic storage media (e.g. magneto-optical disks), CD-ROM (Read Only Memory), CD-R, CD-R/W, and semiconductor memories (such as mask ROM, PROM (Programmable ROM), EPROM (Erasable PROM), flash ROM, RAM (Random Access Memory), etc.).
  • the program may be provided to a computer using any type of transitory computer readable medium. Examples of the transitory computer readable medium include electric signals, optical signals, and electromagnetic waves.
  • the transitory computer readable medium can provide the program to a computer via a wired communication line such as an electric wire or optical fiber or a wireless communication line.
  • the distance image analysis unit 110 acquires a distance image generated by the 3D camera 210 , tracks a detection target based on the acquired distance image, and recognizes its action.
  • the distance image analysis unit 110 mainly tracks and recognizes a hand action of a customer or a store staff.
  • the distance image analysis unit 110 refers to the suspicious action information DB 150 to recognize a suspicious action of a customer or a store staff contained in the distance image. Further, the distance image analysis unit 110 performs detection necessary for recognition of a suspicious action, determination of a suspicion level and the like.
  • the distance image analysis unit 110 detects a time period during which a suspicious action is carried out, the quantity of target products, the amount of money, the scale of a target act (the size of damage etc.) and the like as well. Further, the distance image analysis unit 110 records the distance image acquired from the 3D camera 210 as a 3D video in the 3D video information recording unit 160 .
  • the person recognition unit 120 acquires a facial image of a customer generated by the facial recognition camera 220 and recognizes a person contained in the acquired facial image.
  • the person recognition unit 120 refers to the suspicious person information DB 170 and makes comparison of it with the facial image, and thereby determines whether the customer is a suspicious person or not.
  • the in-store situation analysis unit 130 acquires an in-store image generated by the in-store camera 230 , analyzes the number of customers in the store based on the acquired in-store image and detects the congestion in the store.
  • the alert information generation unit 140 generates alert information to be transmitted to a surveillant based on detection results of the distance image analysis unit 110 , the person recognition unit 120 and the in-store situation analysis unit 130 , and outputs the generated alert information to the alert device 240 .
  • the alert information generation unit 140 generates and outputs the alert information based on the hand action of a customer or a store staff detected by the distance image analysis unit 110 , the alert information based on the suspicious person recognized by the person recognition unit 120 , and the alert information based on the congestion in the store analyzed by the in-store situation analysis unit 130 . Further, the alert information generation unit 140 may record the generated alert information in a 3D video of the 3D video information recording unit 160 .
  • the suspicious action information DB 150 stores suspicious action patterns (suspicious action pattern information) for detecting a suspicious action of a customer or a store staff.
  • a suspicious action is an action (preliminary act) that raises suspicion of misconduct by a person such as a customer or a store staff.
  • the suspicious action information DB 150 stores a product fraudulent acquisition pattern 151 , a product fraudulent change pattern 152 , a money fraudulent acquisition pattern 153 and the like, for example, as the suspicious action patterns.
  • the product fraudulent acquisition pattern 151 is pattern information about actions of fraudulently acquiring a product, which include, for example, an action of a customer that puts a product in an improper place other than a shopping basket or cart.
  • the product fraudulent change pattern 152 is pattern information about actions of fraudulently changing a product, which include, for example, an action of a customer that breaks or damages a product.
  • the money fraudulent acquisition pattern 153 is pattern information about actions of fraudulently acquiring money, which include, for example, an action of a store staff that puts money from a cash register in an improper place such as a pocket of the store staff.
  • the suspicious person information DB 170 stores suspicious person identification information for detecting that a customer who comes to a store is a suspicious person.
  • the suspicious person includes a person with a previous record, a habitual offender and a person on a blacklist, and the suspicious person identification information contains the name, gender, age, facial image information (image) and the like.
  • the suspicious person information DB 170 acquires and stores suspicious person information such as persons with previous records from a cloud (cloud network) 250 or the like, and further stores suspicious person information such as habitual offenders (persons on the blacklist) based on the history in the store.
  • FIG. 4 shows the configuration of the distance image analysis unit 110 in the security device 100 .
  • the distance image analysis unit 110 includes a distance image acquisition unit 111 , a region detection unit 112 , a hand tracking unit 113 , and a hand action recognition unit 114 .
  • the elements for recognizing a person's hand action are mainly described below, a person's face, line of sight, product, money and the like can be detected by elements similar to those for recognizing a person's hand action.
  • the distance image acquisition unit 111 acquires a distance image containing a customer or a store staff which is taken and generated by the 3D camera 210 .
  • the region detection unit 112 detects a region of each part of a customer or a store staff contained in the distance image acquired by the distance image acquisition unit 111 .
  • the hand tracking unit 113 tracks the action of a hand of a customer or a store staff detected by the region detection unit 112 .
  • the hand action recognition unit 114 recognizes a suspicious action of the customer or the store staff based on the hand action tracked by the hand tracking unit 113 . For example, based on the suspicious action information DB 150 , the hand action recognition unit 114 determines whether the suspicious action corresponds to a product fraudulent acquisition pattern such as putting a product in a pocket, a product fraudulent change pattern such as breaking a product, or a money fraudulent acquisition pattern such as putting money in a pocket of clothes.
  • a security method (security process) that is performed in the security system (security device) according to this exemplary embodiment is described hereinafter with reference to FIG. 5 .
  • a customer enters a store and comes close to a shelf in the store (S 101 ). Then, the facial recognition camera 220 in the store generates a facial image of the customer, and the security device 100 checks the facial image against suspicious person information such as a list of persons with previous records/on the blacklist (S 102 ). Specifically, the person recognition unit 120 of the security device 100 compares the facial image taken by the facial recognition camera 220 with facial image information of suspicious persons (a list of persons with previous records/on the blacklist) stored in the suspicious person information DB 170 and searches for a person regarding which the facial image and facial image information match and thereby determines whether the customer is a suspicious person or not.
  • suspicious person information such as a list of persons with previous records/on the blacklist
  • the customer performs a suspicious action such as putting a product in a place other than a shopping basket or cart (S 103 ).
  • the 3D camera 210 in the vicinity of the shelf takes an image of the customer's hand
  • the security device 100 recognizes the action of the customer's hand by using the distance image of the 3D camera 210 (S 104 ).
  • the distance image analysis unit 110 in the security device 100 tracks the distance image of an image of the customer's hand, and recognizes that the customer has picked up the product and put it in an improper place.
  • the security device 100 determines that a suspicious action has taken place based on the customer's hand action recognized in S 104 , and displays and records an alert on the alert device 240 such as a store staff terminal or a security guard terminal (S 105 ).
  • the alert information generation unit 140 of the security device 100 generates and outputs alert information indicating a determination that a suspicious action has taken place. Further, the alert information generation unit 140 generates and outputs alert information based on the suspicious person recognized in S 102 .
  • the security device 100 recognizes the action of the store staff's hand by using the distance image of the 3D camera 210 (S 104 ), and displays and records an alert on the alert device 240 (S 105 ).
  • FIG. 6 shows the details of a recognition processing (tracking processing) performed by the distance image analysis unit 110 in S 104 of FIG. 5 .
  • the processing shown in FIG. 6 is one example, and the action of a hand may be recognized by another image analysis processing, and a person's face or line of sight, a product, money and the like may be detected in the same way.
  • the distance image acquisition unit 111 first acquires a distance image containing a customer or a store staff from the 3D camera 210 (S 201 ).
  • the region detection unit 112 detects a person who is a customer or a store staff contained in the distance image acquired in S 201 (S 202 ) and further detects each region of the person (S 203 ).
  • the region detection unit 112 detects a person (customer or store staff) based on the image and the distance contained in the distance image by using a discrimination circuit such as SVM
  • the region detection unit 112 detects the region of each part such as the person's hand based on the detected bone structure.
  • the hand tracking unit 113 tracks the hand action of the customer or the store staff detected in S 203 (S 204 ).
  • the hand tracking unit 113 tracks the bone structure of the customer's hand and its vicinity and detects the action of the fingers or palm of the hand based on the image and the distance contained in the distance image.
  • the hand action recognition unit 114 extracts the feature of the action of the hand based on the action of the hand tracked in S 204 (S 205 ), and recognizes a suspicious action of the customer or the store staff based on the extracted feature (S 206 ).
  • the hand action recognition unit 114 extracts the direction, angle, and change in movement of the fingers or the palm (wrist) as a feature amount.
  • the hand action recognition unit 114 detects that the customer is holding the product from the angle of the fingers, and when the customer moves the fingers off the product with the hand being close to a pocket of clothes, it detects that the customer puts the product in the pocket of the clothes. Then, the hand action recognition unit 114 compares the detected action pattern with the product fraudulent acquisition pattern 151 , the product fraudulent change pattern 152 and the money fraudulent acquisition pattern 153 , and when the detected pattern matches any of those, it determines that it is a suspicious action. Further, the features of images of the product fraudulent acquisition pattern 151 , the product fraudulent change pattern 152 and the money fraudulent acquisition pattern 153 may be learned in advance, and the state of the hand may be identified by comparing a detected feature amount with the learned feature amount.
  • FIG. 7 shows the details of an alert output processing performed in S 104 and S 105 of FIG. 5 .
  • the distance image analysis unit 110 determines whether a customer or a store staff performs a suspicious action (S 301 ). For example, the distance image analysis unit 110 determines an action of a customer that puts a product in a place other than a shopping basket or cart, such as a pocket or a bag in hand, or an action that breaks a product, damages the product, adds a foreign body, or fraudulently changes the placement. Further, the distance image analysis unit 110 determines an action of a store staff that embezzles the sales, appropriates a product (puts money in a pocket etc), or gives a product to a customer as a conspirator without receiving a full price.
  • the distance image analysis unit 110 determines, as a suspicious action, an action such as frequently looking around, tampering or illicitly manipulating a pachinko machine, attaching a skimming device to an ATM (Automated Teller Machine), illicitly manipulating a cash register or an electronic money device, or paying public money or issuing a ticket without through a regular process.
  • an action such as frequently looking around, tampering or illicitly manipulating a pachinko machine, attaching a skimming device to an ATM (Automated Teller Machine), illicitly manipulating a cash register or an electronic money device, or paying public money or issuing a ticket without through a regular process.
  • ATM Automatic Teller Machine
  • the alert information generation unit 140 acquires suspicious person information (S 302 ) and acquires the congestion in a store (S 303 ).
  • the alert information generation unit 140 acquires the suspicious person information indicating whether the customer is a suspicious person or not from the person recognition unit 120 so as to provide the alert information on the basis of a person recognition result by the facial image of the facial recognition camera 220 .
  • the alert information generation unit 140 acquires the congestion in the store from the in-store situation analysis unit 130 so as to provide the alert information on the basis of a congestion analysis result by the in-store image of the in-store camera 230 . Note that, before recognizing a customer, before analyzing the congestion, and when each information is not necessary, the acquisition of the suspicious person information and the acquisition of the congestion may be omitted.
  • the alert information generation unit 140 determines a suspicion level of the detected suspicious action of a customer or a store staff (S 304 ). For example, the suspicion level is assigned to each suspicious action pattern in the suspicious action information DB 150 , and the suspicion level is determined by referring to the suspicious action information DB 150 .
  • FIG. 8 shows examples of the suspicion level of a suspicious action.
  • a level is set among the suspicion levels 1 to 5. As the suspicion level is higher, it is more likely to be misconduct, for example.
  • a customer's action corresponds to the product fraudulent acquisition pattern “put a product in an improper place”
  • it is set to the suspicion level 3 by referring to the suspicious action information DB 150 .
  • the suspicion level is adjusted in consideration of other parameters.
  • thresholds are set for the action time, the quantity of products, and the price of a product.
  • the suspicion level is set higher in accordance with the amount exceeding the thresholds.
  • the time is longer, when the quantity of products is smaller, or when the price of a product is lower than such threshold, the suspicion level is set lower in accordance with the amount falling below the thresholds.
  • a customer's action corresponds to the product fraudulent change pattern “damage a product”, “open a product box”, or “deform a product box”, it is set to the suspicion level 3 by referring to the suspicious action information DB 150 . Then, the suspicion level is adjusted in consideration of other parameters.
  • thresholds are set for the scale (rate) of the damage, the action time, the quantity of products, and the price of a product.
  • the suspicion level is set higher in accordance with the amount exceeding the thresholds.
  • the suspicion level is set lower in accordance with the amount falling below the thresholds.
  • a store staff's action corresponds to the money fraudulent acquisition pattern “move money to an improper place”, it is set to the suspicion level 3 by referring to the suspicious action information DB 150 . Then, the suspicion level is adjusted in consideration of other parameters.
  • thresholds are set for the action time and the amount of money.
  • the suspicion level is set higher in accordance with the amount exceeding the thresholds.
  • the suspicion level is set lower in accordance with the amount falling below the thresholds.
  • the suspicion level is set higher.
  • the suspicion level may be set higher for an action of a customer or a store staff that looks around.
  • the suspicion level is determined based on the presence or absence of a suspicious person or the state in a store after a suspicious action is detected in this example, it may be determined before a suspicious action is detected. For example, when a customer is a suspicious action, when the state in a store is congested/sparsely populated, or when a customer has an open-top bag, alert information (warning information) may be output even when a suspicious action is not yet detected. Further, in such a case, the thresholds for detection of a suspicious action (such as the time to detect a suspicious action) may be lowered to make a suspicious action easy to be detected.
  • the alert information generation unit 140 outputs alert information based on a determination result (S 305 ).
  • the alert information generation unit 140 outputs the detected suspicious action and the determined suspicion level to the alert device 240 .
  • the output of the alert information may be controlled based on the suspicion level.
  • the suspicion level is lower than a specified level, an alert is not necessary and the alert information needs not to be output to the alert device 240 . Further, in this case, the alert information may be only recorded in the alert device 240 without being displayed thereon.
  • the suspicious actions and the suspicion levels may be recorded in 3D video information.
  • recording the suspicion levels it is possible to extract and check only a part with a high suspicion level and thus efficiently check the 3D video.
  • the hand motion of a customer or a store staff is observed by the 3D camera placed at the potion from which a product shelf and a client (shopper) in front of the shelf can view to recognize a suspicious action of the customer or the store staff.
  • alert information is notified to an employee terminal in a shelf, a cash register, a guard's room or a store, and the action is recorded.
  • a second exemplary embodiment is described hereinafter with reference to the drawings.
  • This exemplary embodiment is an example that, as a complement to the suspicious action recognition in the first exemplary embodiment, detects a suspicious action by detecting a deviant action from normal action information patterns.
  • the present invention is not limited to the example of the first exemplary embodiment, and a suspicious action may be determined by detecting a deviation from a store staff's normal action such as work at a cash register, rather than detecting an action of a store staff that embezzles the sales, appropriates a product (puts money in a pocket etc.) or gives a product to a customer as a conspirator without receiving a full price and the like.
  • FIG. 9 shows a configuration of a security system according to this exemplary embodiment.
  • the security device 100 further includes a normal action information DB 180 in addition to the elements of the first exemplary embodiment shown in FIG. 2 .
  • the normal action information DB 180 stores normal action patterns (normal action pattern information) indicating normal actions of a customer and a store staff.
  • the normal action information DB 180 stores a product normal acquisition pattern 181 , a product normal change pattern 182 , a money normal acquisition pattern 183 and the like, for example, as the normal action patterns.
  • the product normal acquisition pattern 181 is pattern information about actions of normally acquiring a product, which includes an action of a customer that puts a product in a shopping basket or cart, for example.
  • the product normal change pattern 182 is pattern information about actions of normally altering a product, which includes an action of a store staff that changes the display of a product, for example.
  • the money normal acquisition pattern 183 is pattern information about actions of normally acquiring money, which includes an action of a store staff that performs normal cash register work and an action of a store staff that gives money from a cash register to a customer, for example.
  • FIG. 10 shows the configuration of the distance image analysis unit 110 in the security device 100 according to this exemplary embodiment. As shown in FIG. 10 , a deviant action detection unit 115 is further included in addition to the elements of the first exemplary embodiment shown in FIG. 4 .
  • the deviant action detection unit 115 detects whether an action of a customer or a store staff is deviated from a normal action (suspicious action) or not based on the the hand action tracked by the hand tracking unit 113 .
  • the deviant action detection unit 115 refers to the normal action information DB 180 and compares the detected action of a customer or a store staff with the product normal acquisition pattern 181 , the product normal change pattern 182 and the money normal acquisition pattern 183 , and when the action of a customer or a store staff does not match any of them, determines that it is a suspicious action.
  • a suspicion level may be set in accordance with the degree of deviation from normal action patterns (the degree of mismatch).
  • a suspicious action may be determined in consideration of both of a detection result by the hand action recognition unit 114 using the suspicious action patterns and a detection result by the deviant action detection unit 115 using the normal action patterns. For example, an action may be determined as a suspicious action when any one of the hand action recognition unit 114 and the deviant action detection unit 115 determines that it is suspicious, or an action may be determined as a suspicious action when both of the hand action recognition unit 114 and the deviant action detection unit 115 determine that it is suspicious.

Abstract

A security system (10) includes an image information acquisition unit (11) that acquires input image information on an image taken of a person in a store, a tracking unit (12) that tracks an action of a hand of the person based on the input image information, and a suspicious action detection unit (13) that detects a suspicious action of the person based on the tracked action of the hand. A security system, a security method, and a security program capable of accurately detecting a suspicious action are thereby provided.

Description

    TECHNICAL FIELD
  • The present invention relates to a security system, a security method, and a non-transitory computer readable medium storing a security program and, particularly, to a security system, a security method, and a non-transitory computer readable medium storing a security program using person images.
  • BACKGROUND ART
  • Damage caused by shoplifting by customers, misappropriation by part-time employees and the like are a continuous and growing concern for stores. In order to prevent such misconduct, a store staff or a store manager keeps an eye on these customers and part-time employees, or records images monitored by a general 2D camera and visually checks them afterwards.
  • Since it is inefficient to visually check for the occurrence of misconduct, the systems disclosed in Patent Literatures 1 to 5 as related art, for example, are under development.
  • CITATION LIST Patent Literature
  • PTL1: Japanese Unexamined Patent Publication No. 2011-065328
  • PTL2: Japanese Unexamined Patent Publication No. 2010-094332
  • PTL3: Japanese Unexamined Patent Publication No. 2009-048430
  • PTL4: Japanese Unexamined Patent Publication No. 2009-009231
  • PTL5: Japanese Unexamined Patent Publication No. 2008-257487
  • SUMMARY OF INVENTION Technical Problem
  • For example, according to the techniques disclosed in related art like Patent Literature 1, when the number of times a store staff's face swings is a specified value of more and the cancelled amount of money in a cash register is a reference value or more, it is detected that a suspicious conduct (suspicious action) has occurred.
  • However, because the technique of the related art performs detection based on a swing of a face or the like, it fails to detect a suspicious action of a shop staff and the like in some cases. For example, although a suspicious action is often carried out by a hand, the technique of the related art cannot detect the behavior on the basis of a hand action.
  • Thus, the technique disclosed in the related art has a problem that it is difficult to accurately detect a suspicious action of a store staff, a customer and the like.
  • In light of the above, an exemplary object of the present invention is to provide a security system, a security method, and a non-transitory computer readable medium storing a security program capable of accurately detecting a suspicious action.
  • Solution to Problem
  • A security system according to an exemplary aspect of the present invention includes an image information acquisition unit that acquires input image information on an image taken of a person in a store, a tracking unit that tracks an action of a hand of the person based on the input image information, and a suspicious action detection unit that detects a suspicious action of the person based on the tracked action of the hand.
  • A security method according to an exemplary aspect of the present invention includes acquiring input image information on an image taken of a person in a store, tracking an action of a hand of the person based on the input image information, and detecting a suspicious action of the person based on the tracked action of the hand.
  • A non-transitory computer readable medium storing a security program according to an exemplary aspect of the present invention causes a computer to perform a security process including acquiring input image information on an image taken of a person in a store, tracking an action of a hand of the person based on the input image information, and detecting a suspicious action of the person based on the tracked action of the hand.
  • Advantageous Effects of Invention
  • According to the exemplary aspects of the present invention, it is possible to provide a security system, a security method, and a non-transitory computer readable medium storing a security program capable of accurately detecting a suspicious action.
  • BRIEF DESCRIPTION OF DRAWINGS
  • FIG. 1 is a block diagram showing main elements of a security system according to an exemplary embodiment.
  • FIG. 2 is a block diagram showing the configuration of a security system according to a first exemplary embodiment;
  • FIG. 3A is a diagram showing a configuration example of a 3D camera according to the first exemplary embodiment;
  • FIG. 3B is a diagram showing a configuration example of a 3D camera according to the first exemplary embodiment;
  • FIG. 4 is a block diagram showing a configuration of a distance image analysis unit according to the first exemplary embodiment;
  • FIG. 5 is a flowchart showing the operation of the security system according to the first exemplary embodiment;
  • FIG. 6 is a flowchart showing the operation of a distance image analysis process according to the first exemplary embodiment;
  • FIG. 7 is a flowchart showing the operation of an alert information generation process according to the first exemplary embodiment;
  • FIG. 8 is an explanatory diagram illustrating the operation of the alert information generation process according to the first exemplary embodiment;
  • FIG. 9 is a block diagram showing the configuration of a security system according to a second exemplary embodiment; and
  • FIG. 10 is a block diagram showing a configuration of a distance image analysis unit according to the second exemplary embodiment.
  • DESCRIPTION OF EMBODIMENTS Overview of Exemplary Embodiment
  • Prior to describing exemplary embodiments, the overview of the characteristics of the exemplary embodiments is described hereinbelow. FIG. 1 shows main elements of a security system according to an exemplary embodiment.
  • As shown in FIG. 1, a security system 10 according to this exemplary embodiment includes an image information acquisition unit 11, a tracking unit 12, and a suspicious action detection unit 13. The image information acquisition unit 11 acquires input image information, which is an image taken of a person in a store. The tracking unit 12 tracks a hand action of a person based on the acquired input image information. The suspicious action detection unit 13 detects a suspicious action of a person based on the tracked hand action.
  • As described above, in the exemplary embodiment, a hand action of a person in a store is tracked, and a suspicious action is detected based on the tracking result. For example, by tracking a hand action of a customer or a store staff in front of a product shelf in a store, it is possible to accurately detect a suspicious action that can lead to shoplifting or misappropriation.
  • First Exemplary Embodiment
  • A first exemplary embodiment is described hereinafter with reference to the drawings. FIG. 2 is a block diagram showing the configuration of a security system according to this exemplary embodiment. This security system is a system that detects a suspicious action of a customer or a store staff in a store or the like and outputs (displays) an alert (alarm) and the like. Note that customer includes all persons who come to (enter) a store, and the store staff includes all persons who work in a store.
  • As shown in FIG. 2, a security system 1 according to this exemplary embodiment includes a security device 100, a 3D camera 210, a facial recognition camera 220, an in-store camera 230, and an alert device 240. For example, while the respective components of the security system 1 are placed in the same store, the security device 100 or the alert device 240 may be placed outside the store. Although it is assumed in the following description that the respective components of the security system 1 are separate devices, the respective components may be one or any number of devices.
  • The 3D (three-dimensional) camera 210 is an imaging device (distance image sensor) that takes an image of and measures a target and generates a distance image (distance image information). The distance image (range image) contains image information which is an image of a target taken and distance information which is a distance to a target measured. For example, the 3D camera 210 is Microsoft Kinect (registered trademark) or a stereo camera. By using the 3D camera, it is possible to recognize (track) a target (a customer's action or the like) including the distance information, and it is thus possible to perform highly accurate recognition.
  • As shown in FIGS. 3A and 3B, in order to detect a suspicious action by a hand of a customer or a store staff, the 3D camera 210 takes an image of a customer or a store staff at a specified position in a store in this exemplary embodiment. In the example of FIG. 3A, the 3D camera 210 takes an image of a product shelf (product display shelf) 300 on which a product 301 is placed (displayed), and particularly takes an image of a customer 400 who is about to touch the product 301 in front of the product shelf 300. The 3D camera 210 takes an image of a product placement area of the product shelf 300 and an area where a customer picks up/looks at a product in front of the product shelf 300, which is a presentation area where a product is presented to a customer in the product shelf 300. The 3D camera 210 is placed at a position where images of the product shelf 300 and the customer 400 in front of (in the vicinity of) the product shelf 300 can be taken, which is, for example, above (the ceiling etc.) or in front of (a wall etc.) of the product shelf 300, or in the product shelf 300.
  • In the example of FIG. 3B, the 3D camera 210 takes an image of a checkout stand 310 where a cash register 311 is placed, and particularly takes an image of a store staff 410 who is standing in front of the checkout stand 310 and about to sell the product 301 to the customer 400 or the store staff 410 who is about to touch money 302. The 3D camera 210 is placed at a position where images of the checkout stand 310 and the store staff 410 in front of (in the vicinity of) the checkout stand 310 can be taken, which is, for example, above (the ceiling etc.) or in front of (a wall etc.) of the checkout stand 310, or on the checkout stand 310 (cash register 311).
  • Note that, although an example in which the 3D camera 210 is used as a device that takes images of the product shelf 300 and the checkout stand 310 is described below, it is not limited to the 3D camera but may be a general camera (2D camera) that outputs only images taken. In this case, tracking is performed using the image information only.
  • Each of the facial recognition camera 220 and the in-store camera 230 is an imaging device (2D camera) that takes and generates an image of a target. The facial recognition camera 220 is placed at the entrance of a store or the like, takes an image of a face of a customer who comes to the store and generates a facial image to recognize the customer's face. The in-store camera 230 is placed at a plurality of positions in a store, takes an image of each section in the store and generates an in-store image to detect the congestion of customers in the store.
  • Note that each of the facial recognition camera 220 and the in-store camera 230 may be a 3D camera. By using a 3D camera, it is possible to accurately recognize the customer's face or the congestion in a store.
  • The alert device 240 is a device that notifies (outputs) alert information to a surveillant such as a store manager, a business manager or a security guard and performs recording. The way to transmit (output) alert information to a surveillant is not limited, and it may be a display of letters and images on a display device, audio output through a speaker or the like. The alert device 240 is placed at a position where a surveillant can view (hear) the alert information. The alert device 240 may be an employee terminal in a shelf, a cash register, a guard's room or a store, or it may be a surveillance device connected to the outside of a store via a network. For example, the alert device 240 is a computer including a display device and a storage device, such as a personal computer or a server computer.
  • As shown in FIG. 2, the security device 100 includes a distance image analysis unit 110, a person recognition unit 120, an in-store situation analysis unit 130, an alert information generation unit 140, a suspicious action information DB (database) 150, a 3D video information recording unit 160, and a suspicious person information DB 170. Note that, although those blocks are described as the functions of the security device 100 in this example, another configuration may be used as long as the operation according to this exemplary embodiment, which is described later, can be achieved.
  • Each element in the security device 100 may be formed by hardware or software or both of them, and may be formed by one hardware or software or a plurality of hardware or software. For example, the product information DB 150 and the customer information DB 160 may be storage devices connected to an external network (cloud). Each function (each processing) of the security device 100 may be implemented by a computer including CPU, memory and the like. For example, a security program for performing a security method (security process) according to the exemplary embodiments may be stored in a storage device, and each function may be implemented by executing the security program stored in the storage device on the CPU.
  • This security program can be stored and provided to the computer using any type of non-transitory computer readable medium. The non-transitory computer readable medium includes any type of tangible storage medium. Examples of the non-transitory computer readable medium include magnetic storage media (such as floppy disks, magnetic tapes, hard disk drives, etc.), optical magnetic storage media (e.g. magneto-optical disks), CD-ROM (Read Only Memory), CD-R, CD-R/W, and semiconductor memories (such as mask ROM, PROM (Programmable ROM), EPROM (Erasable PROM), flash ROM, RAM (Random Access Memory), etc.). The program may be provided to a computer using any type of transitory computer readable medium. Examples of the transitory computer readable medium include electric signals, optical signals, and electromagnetic waves. The transitory computer readable medium can provide the program to a computer via a wired communication line such as an electric wire or optical fiber or a wireless communication line.
  • The distance image analysis unit 110 acquires a distance image generated by the 3D camera 210, tracks a detection target based on the acquired distance image, and recognizes its action. In this exemplary embodiment, the distance image analysis unit 110 mainly tracks and recognizes a hand action of a customer or a store staff. The distance image analysis unit 110 refers to the suspicious action information DB 150 to recognize a suspicious action of a customer or a store staff contained in the distance image. Further, the distance image analysis unit 110 performs detection necessary for recognition of a suspicious action, determination of a suspicion level and the like. For example, the distance image analysis unit 110 detects a time period during which a suspicious action is carried out, the quantity of target products, the amount of money, the scale of a target act (the size of damage etc.) and the like as well. Further, the distance image analysis unit 110 records the distance image acquired from the 3D camera 210 as a 3D video in the 3D video information recording unit 160.
  • The person recognition unit 120 acquires a facial image of a customer generated by the facial recognition camera 220 and recognizes a person contained in the acquired facial image. The person recognition unit 120 refers to the suspicious person information DB 170 and makes comparison of it with the facial image, and thereby determines whether the customer is a suspicious person or not. The in-store situation analysis unit 130 acquires an in-store image generated by the in-store camera 230, analyzes the number of customers in the store based on the acquired in-store image and detects the congestion in the store.
  • The alert information generation unit 140 generates alert information to be transmitted to a surveillant based on detection results of the distance image analysis unit 110, the person recognition unit 120 and the in-store situation analysis unit 130, and outputs the generated alert information to the alert device 240. The alert information generation unit 140 generates and outputs the alert information based on the hand action of a customer or a store staff detected by the distance image analysis unit 110, the alert information based on the suspicious person recognized by the person recognition unit 120, and the alert information based on the congestion in the store analyzed by the in-store situation analysis unit 130. Further, the alert information generation unit 140 may record the generated alert information in a 3D video of the 3D video information recording unit 160.
  • The suspicious action information DB 150 stores suspicious action patterns (suspicious action pattern information) for detecting a suspicious action of a customer or a store staff. Note that a suspicious action is an action (preliminary act) that raises suspicion of misconduct by a person such as a customer or a store staff. The suspicious action information DB 150 stores a product fraudulent acquisition pattern 151, a product fraudulent change pattern 152, a money fraudulent acquisition pattern 153 and the like, for example, as the suspicious action patterns.
  • The product fraudulent acquisition pattern 151 is pattern information about actions of fraudulently acquiring a product, which include, for example, an action of a customer that puts a product in an improper place other than a shopping basket or cart. The product fraudulent change pattern 152 is pattern information about actions of fraudulently changing a product, which include, for example, an action of a customer that breaks or damages a product. The money fraudulent acquisition pattern 153 is pattern information about actions of fraudulently acquiring money, which include, for example, an action of a store staff that puts money from a cash register in an improper place such as a pocket of the store staff.
  • The suspicious person information DB 170 stores suspicious person identification information for detecting that a customer who comes to a store is a suspicious person. The suspicious person includes a person with a previous record, a habitual offender and a person on a blacklist, and the suspicious person identification information contains the name, gender, age, facial image information (image) and the like. For example, the suspicious person information DB 170 acquires and stores suspicious person information such as persons with previous records from a cloud (cloud network) 250 or the like, and further stores suspicious person information such as habitual offenders (persons on the blacklist) based on the history in the store.
  • FIG. 4 shows the configuration of the distance image analysis unit 110 in the security device 100. As shown in FIG. 4, the distance image analysis unit 110 includes a distance image acquisition unit 111, a region detection unit 112, a hand tracking unit 113, and a hand action recognition unit 114. Although the elements for recognizing a person's hand action are mainly described below, a person's face, line of sight, product, money and the like can be detected by elements similar to those for recognizing a person's hand action.
  • The distance image acquisition unit 111 acquires a distance image containing a customer or a store staff which is taken and generated by the 3D camera 210. The region detection unit 112 detects a region of each part of a customer or a store staff contained in the distance image acquired by the distance image acquisition unit 111.
  • The hand tracking unit 113 tracks the action of a hand of a customer or a store staff detected by the region detection unit 112. The hand action recognition unit 114 recognizes a suspicious action of the customer or the store staff based on the hand action tracked by the hand tracking unit 113. For example, based on the suspicious action information DB 150, the hand action recognition unit 114 determines whether the suspicious action corresponds to a product fraudulent acquisition pattern such as putting a product in a pocket, a product fraudulent change pattern such as breaking a product, or a money fraudulent acquisition pattern such as putting money in a pocket of clothes.
  • A security method (security process) that is performed in the security system (security device) according to this exemplary embodiment is described hereinafter with reference to FIG. 5.
  • As shown in FIG. 5, a customer enters a store and comes close to a shelf in the store (S101). Then, the facial recognition camera 220 in the store generates a facial image of the customer, and the security device 100 checks the facial image against suspicious person information such as a list of persons with previous records/on the blacklist (S102). Specifically, the person recognition unit 120 of the security device 100 compares the facial image taken by the facial recognition camera 220 with facial image information of suspicious persons (a list of persons with previous records/on the blacklist) stored in the suspicious person information DB 170 and searches for a person regarding which the facial image and facial image information match and thereby determines whether the customer is a suspicious person or not.
  • After that, the customer performs a suspicious action such as putting a product in a place other than a shopping basket or cart (S103). Then, the 3D camera 210 in the vicinity of the shelf takes an image of the customer's hand, and the security device 100 recognizes the action of the customer's hand by using the distance image of the 3D camera 210 (S104). Specifically, the distance image analysis unit 110 in the security device 100 tracks the distance image of an image of the customer's hand, and recognizes that the customer has picked up the product and put it in an improper place.
  • Then, the security device 100 determines that a suspicious action has taken place based on the customer's hand action recognized in S104, and displays and records an alert on the alert device 240 such as a store staff terminal or a security guard terminal (S105). Specifically, the alert information generation unit 140 of the security device 100 generates and outputs alert information indicating a determination that a suspicious action has taken place. Further, the alert information generation unit 140 generates and outputs alert information based on the suspicious person recognized in S102.
  • Further, besides a customer, a store staff comes close to a checkout stand (S106) and performs a suspicious action such as putting money in a place other than a cash register (S107). Then, in the same manner as in the case of the customer's action, the security device 100 recognizes the action of the store staff's hand by using the distance image of the 3D camera 210 (S104), and displays and records an alert on the alert device 240 (S105).
  • FIG. 6 shows the details of a recognition processing (tracking processing) performed by the distance image analysis unit 110 in S104 of FIG. 5. Note that, the processing shown in FIG. 6 is one example, and the action of a hand may be recognized by another image analysis processing, and a person's face or line of sight, a product, money and the like may be detected in the same way.
  • As shown in FIG. 6, the distance image acquisition unit 111 first acquires a distance image containing a customer or a store staff from the 3D camera 210 (S201). Next, the region detection unit 112 detects a person who is a customer or a store staff contained in the distance image acquired in S201 (S202) and further detects each region of the person (S203). For example, the region detection unit 112 detects a person (customer or store staff) based on the image and the distance contained in the distance image by using a discrimination circuit such as SVM
  • (Support Vector Machine), and estimates the joint of the detected person and thereby detects the bone structure of the person. The region detection unit 112 detects the region of each part such as the person's hand based on the detected bone structure.
  • Then, the hand tracking unit 113 tracks the hand action of the customer or the store staff detected in S203 (S204). The hand tracking unit 113 tracks the bone structure of the customer's hand and its vicinity and detects the action of the fingers or palm of the hand based on the image and the distance contained in the distance image.
  • After that, the hand action recognition unit 114 extracts the feature of the action of the hand based on the action of the hand tracked in S204 (S205), and recognizes a suspicious action of the customer or the store staff based on the extracted feature (S206). The hand action recognition unit 114 extracts the direction, angle, and change in movement of the fingers or the palm (wrist) as a feature amount.
  • For example, the hand action recognition unit 114 detects that the customer is holding the product from the angle of the fingers, and when the customer moves the fingers off the product with the hand being close to a pocket of clothes, it detects that the customer puts the product in the pocket of the clothes. Then, the hand action recognition unit 114 compares the detected action pattern with the product fraudulent acquisition pattern 151, the product fraudulent change pattern 152 and the money fraudulent acquisition pattern 153, and when the detected pattern matches any of those, it determines that it is a suspicious action. Further, the features of images of the product fraudulent acquisition pattern 151, the product fraudulent change pattern 152 and the money fraudulent acquisition pattern 153 may be learned in advance, and the state of the hand may be identified by comparing a detected feature amount with the learned feature amount.
  • FIG. 7 shows the details of an alert output processing performed in S104 and S105 of FIG. 5.
  • As shown in FIG. 7, the distance image analysis unit 110 determines whether a customer or a store staff performs a suspicious action (S301). For example, the distance image analysis unit 110 determines an action of a customer that puts a product in a place other than a shopping basket or cart, such as a pocket or a bag in hand, or an action that breaks a product, damages the product, adds a foreign body, or fraudulently changes the placement. Further, the distance image analysis unit 110 determines an action of a store staff that embezzles the sales, appropriates a product (puts money in a pocket etc), or gives a product to a customer as a conspirator without receiving a full price. Besides, the distance image analysis unit 110 determines, as a suspicious action, an action such as frequently looking around, tampering or illicitly manipulating a pachinko machine, attaching a skimming device to an ATM (Automated Teller Machine), illicitly manipulating a cash register or an electronic money device, or paying public money or issuing a ticket without through a regular process. When a customer or a store staff performs the corresponding action, the following process is performed to output alert information in accordance with that action.
  • Specifically, the alert information generation unit 140 acquires suspicious person information (S302) and acquires the congestion in a store (S303). The alert information generation unit 140 acquires the suspicious person information indicating whether the customer is a suspicious person or not from the person recognition unit 120 so as to provide the alert information on the basis of a person recognition result by the facial image of the facial recognition camera 220. Further, the alert information generation unit 140 acquires the congestion in the store from the in-store situation analysis unit 130 so as to provide the alert information on the basis of a congestion analysis result by the in-store image of the in-store camera 230. Note that, before recognizing a customer, before analyzing the congestion, and when each information is not necessary, the acquisition of the suspicious person information and the acquisition of the congestion may be omitted.
  • Then, the alert information generation unit 140 determines a suspicion level of the detected suspicious action of a customer or a store staff (S304). For example, the suspicion level is assigned to each suspicious action pattern in the suspicious action information DB 150, and the suspicion level is determined by referring to the suspicious action information DB 150.
  • FIG. 8 shows examples of the suspicion level of a suspicious action. For example, as shown in FIG. 8, a level is set among the suspicion levels 1 to 5. As the suspicion level is higher, it is more likely to be misconduct, for example.
  • As one example, when a customer's action corresponds to the product fraudulent acquisition pattern “put a product in an improper place”, it is set to the suspicion level 3 by referring to the suspicious action information DB 150. Then, the suspicion level is adjusted in consideration of other parameters.
  • For example, when the time period of the suspicious action is short, when the quantity of products is large, or when the product is expensive, it is likely to be shoplifting. Thus, thresholds are set for the action time, the quantity of products, and the price of a product. When the time is shorter, when the quantity of products is larger, or when the price of a product is higher than such threshold, the suspicion level is set higher in accordance with the amount exceeding the thresholds. On the other hand, when the time is longer, when the quantity of products is smaller, or when the price of a product is lower than such threshold, the suspicion level is set lower in accordance with the amount falling below the thresholds.
  • Likewise, when a customer's action corresponds to the product fraudulent change pattern “damage a product”, “open a product box”, or “deform a product box”, it is set to the suspicion level 3 by referring to the suspicious action information DB 150. Then, the suspicion level is adjusted in consideration of other parameters.
  • For example, when the damage is large or when the product box is deformed, when the time period of the suspicious action is short, when the quantity of products is large, or when the product is expensive, it is likely to be malicious. Thus, thresholds are set for the scale (rate) of the damage, the action time, the quantity of products, and the price of a product. When the damage is larger, when the time is shorter, when the quantity of products is larger, or when the price of a product is higher than such threshold, the suspicion level is set higher in accordance with the amount exceeding the thresholds. On the other hand, when the damage is smaller, when the time is longer, when the quantity of products is smaller, or when the price of a product is lower than such threshold, the suspicion level is set lower in accordance with the amount falling below the thresholds.
  • Likewise, when a store staff's action corresponds to the money fraudulent acquisition pattern “move money to an improper place”, it is set to the suspicion level 3 by referring to the suspicious action information DB 150. Then, the suspicion level is adjusted in consideration of other parameters.
  • For example, when the time period of the suspicious action is short, or when the amount of money is large, it is likely to be misappropriation. Thus, thresholds are set for the action time and the amount of money. When the time is shorter or when the amount of money is larger than such threshold, the suspicion level is set higher in accordance with the amount exceeding the thresholds. On the other hand, when the time is longer or when the amount of money is smaller than such threshold, the suspicion level is set lower in accordance with the amount falling below the thresholds.
  • Further, when the customer is a suspicious person or when the situation in the store is congested/sparsely populated, the possibility of a suspicious action increases, and the suspicion level is set higher. In addition, the suspicion level may be set higher for an action of a customer or a store staff that looks around.
  • Note that, although the suspicion level is determined based on the presence or absence of a suspicious person or the state in a store after a suspicious action is detected in this example, it may be determined before a suspicious action is detected. For example, when a customer is a suspicious action, when the state in a store is congested/sparsely populated, or when a customer has an open-top bag, alert information (warning information) may be output even when a suspicious action is not yet detected. Further, in such a case, the thresholds for detection of a suspicious action (such as the time to detect a suspicious action) may be lowered to make a suspicious action easy to be detected.
  • After that, the alert information generation unit 140 outputs alert information based on a determination result (S305). The alert information generation unit 140 outputs the detected suspicious action and the determined suspicion level to the alert device 240. For example, the output of the alert information may be controlled based on the suspicion level. When the suspicion level is lower than a specified level, an alert is not necessary and the alert information needs not to be output to the alert device 240. Further, in this case, the alert information may be only recorded in the alert device 240 without being displayed thereon.
  • Further, the suspicious actions and the suspicion levels may be recorded in 3D video information. By recording the suspicion levels, it is possible to extract and check only a part with a high suspicion level and thus efficiently check the 3D video.
  • As described above, in this exemplary embodiment, the hand motion of a customer or a store staff is observed by the 3D camera placed at the potion from which a product shelf and a client (shopper) in front of the shelf can view to recognize a suspicious action of the customer or the store staff. When a suspicious action is recognized, alert information (alarm) is notified to an employee terminal in a shelf, a cash register, a guard's room or a store, and the action is recorded.
  • Because it is thereby possible to precisely grasp the hand motion by the 3D camera and thereby grasp the action such as fraudulently acquiring a product, fraudulently changing a product or fraudulently acquiring money, it is possible to accurately detect a suspicious action and output alert information in accordance with the suspicious action. It is thereby possible to automate the surveillance of a suspicious action/misconduct and efficiently enhance the security, thereby improving the profit ratio.
  • Second Exemplary Embodiment
  • A second exemplary embodiment is described hereinafter with reference to the drawings. This exemplary embodiment is an example that, as a complement to the suspicious action recognition in the first exemplary embodiment, detects a suspicious action by detecting a deviant action from normal action information patterns. Specifically, the present invention is not limited to the example of the first exemplary embodiment, and a suspicious action may be determined by detecting a deviation from a store staff's normal action such as work at a cash register, rather than detecting an action of a store staff that embezzles the sales, appropriates a product (puts money in a pocket etc.) or gives a product to a customer as a conspirator without receiving a full price and the like.
  • FIG. 9 shows a configuration of a security system according to this exemplary embodiment. As shown in FIG. 9, in this exemplary embodiment, the security device 100 further includes a normal action information DB 180 in addition to the elements of the first exemplary embodiment shown in FIG. 2.
  • The normal action information DB 180 stores normal action patterns (normal action pattern information) indicating normal actions of a customer and a store staff. The normal action information DB 180 stores a product normal acquisition pattern 181, a product normal change pattern 182, a money normal acquisition pattern 183 and the like, for example, as the normal action patterns.
  • The product normal acquisition pattern 181 is pattern information about actions of normally acquiring a product, which includes an action of a customer that puts a product in a shopping basket or cart, for example. The product normal change pattern 182 is pattern information about actions of normally altering a product, which includes an action of a store staff that changes the display of a product, for example. The money normal acquisition pattern 183 is pattern information about actions of normally acquiring money, which includes an action of a store staff that performs normal cash register work and an action of a store staff that gives money from a cash register to a customer, for example.
  • FIG. 10 shows the configuration of the distance image analysis unit 110 in the security device 100 according to this exemplary embodiment. As shown in FIG. 10, a deviant action detection unit 115 is further included in addition to the elements of the first exemplary embodiment shown in FIG. 4.
  • The deviant action detection unit 115 detects whether an action of a customer or a store staff is deviated from a normal action (suspicious action) or not based on the the hand action tracked by the hand tracking unit 113. The deviant action detection unit 115 refers to the normal action information DB 180 and compares the detected action of a customer or a store staff with the product normal acquisition pattern 181, the product normal change pattern 182 and the money normal acquisition pattern 183, and when the action of a customer or a store staff does not match any of them, determines that it is a suspicious action. For example, a suspicion level may be set in accordance with the degree of deviation from normal action patterns (the degree of mismatch).
  • Further, a suspicious action may be determined in consideration of both of a detection result by the hand action recognition unit 114 using the suspicious action patterns and a detection result by the deviant action detection unit 115 using the normal action patterns. For example, an action may be determined as a suspicious action when any one of the hand action recognition unit 114 and the deviant action detection unit 115 determines that it is suspicious, or an action may be determined as a suspicious action when both of the hand action recognition unit 114 and the deviant action detection unit 115 determine that it is suspicious.
  • As described above, by detecting a suspicious action based on whether an action of a customer or a store staff is deviated from the normal action patterns, not limited to detecting a suspicious action using the suspicious action patterns in the first exemplary embodiment, it is possible to detect a suspicious action more accurately.
  • It should be noted that the present invention is not limited to the above-described exemplary embodiment and may be varied in many ways within the scope of the present invention.
  • While the invention has been particularly shown and described with reference to exemplary embodiments thereof, the invention is not limited to these embodiments. It will be understood by those of ordinary skill in the art that various changes in form and details may be made therein without departing from the spirit and scope of the present invention as defined by the claims.
  • This application is based upon and claims the benefit of priority from Japanese patent application No. 2013-185130, filed on Sep. 6, 2013, the disclosure of which is incorporated herein in its entirety by reference.
  • REFERENCE SIGNS LIST
  • 1, 10 SECURITY SYSTEM
  • 11 IMAGE INFORMATION ACQUISITION UNIT
  • 12 TRACKING UNIT
  • 13 SUSPICIOUS ACTION DETECTION UNIT
  • 100 SECURITY DEVICE
  • 110 DISTANCE IMAGE ANALYSIS UNIT
  • 111 DISTANCE IMAGE ACQUISITION UNIT
  • 112 REGION DETECTION UNIT
  • 113 HAND TRACKING UNIT
  • 114 HAND ACTION RECOGNITION UNIT
  • 115 DEVIANT ACTION DETECTION UNIT
  • 120 PERSON RECOGNITION UNIT
  • 130 IN-STORE SITUATION ANALYSIS UNIT
  • 140 ALERT INFORMATION GENERATION UNIT
  • 150 SUSPICIOUS ACTION INFORMATION DB
  • 151 PRODUCT FRAUDULENT ACQUISITION PATTERN
  • 152 PRODUCT FRAUDULENT CHANGE PATTERN
  • 153 MONEY FRAUDULENT ACQUISITION PATTERN
  • 160 VIDEO INFORMATION RECORDING UNIT
  • 170 SUSPICIOUS PERSON DB
  • 180 NORMAL ACTION INFORMATION DB
  • 181 PRODUCT NORMAL ACQUISITION PATTERN
  • 182 PRODUCT NORMAL CHANGE PATTERN
  • 183 MONEY NORMAL ACQUISITION PATTERN
  • 210 3D CAMERA
  • 220 FACIAL RECOGNITION CAMERA
  • 230 IN-STORE CAMERA
  • 240 ALERT DEVICE
  • 300 PRODUCT SHELF
  • 301 PRODUCT
  • 302 MONEY
  • 310 CHECKOUT STAND
  • 311 CASH REGISTER
  • 400 CUSTOMER
  • 410 STORE STAFF

Claims (16)

1. A security system comprising:
an image information acquisition unit that acquires input image information on an image taken of a person in a store;
a tracking unit that tracks an action of a hand of the person based on the input image information; and
a suspicious action detection unit that detects a suspicious action of the person based on the tracked action of the hand.
2. The security system according to claim 1, wherein the input image information is distance image information containing image information on an image of a target taken and distance information on a distance to the target measured.
3. The security system according to claim 1, wherein the suspicious action detection unit detects an action of the person that fraudulently acquires a product based on the action of the hand.
4. The security system according to claim 1, wherein the suspicious action detection units detects an action of the person that fraudulently changes a product based on the action of the hand.
5. The security system according to claim 1, wherein the suspicious action detection unit detects an action of the person that fraudulently acquires money based on the action of the hand.
6. The security system according to claim 1, wherein the suspicious action detection unit determines a suspicion level in accordance with the detected suspicious action.
7. The security system according to claim 6, wherein the suspicious action detection unit determines the suspicion level in accordance with a length of an action time of the suspicious action.
8. The security system according to claim 6, wherein the suspicious action detection unit determines the suspicion level in accordance with the number of products related to the suspicious action.
9. The security system according to claim 6, wherein the suspicious action detection unit determines the suspicion level in accordance with an amount of money related to the suspicious action.
10. The security system according to claim 6, wherein the suspicious action detection unit determines the suspicion level in accordance with whether the person is a suspicious person.
11. The security system according to claim 6, wherein the suspicious action detection unit determines the suspicion level in accordance with congestion in the store.
12. The security system according to claim 1, comprising:
an alert output unit that outputs an alert in accordance with the detected suspicious action.
13. The security system according to claim 6, comprising:
an alert output unit that outputs an alert for the suspicious action in accordance with the detected suspicious action.
14. A security method comprising:
acquiring input image information on an image taken of a person in a store;
tracking an action of a hand of the person based on the input image information; and
detecting a suspicious action of the person based on the tracked action of the hand.
15. A non-transitory computer readable medium storing a security program causing a computer to perform a security process comprising:
acquiring input image information on an image taken of a person in a store;
tracking an action of a hand of the person based on the input image information; and
detecting a suspicious action of the person based on the tracked action of the hand.
16. A security system comprising:
an image information acquisition means for acquiring input image information on an image taken of a person in a store;
a tracking means for tracking an action of a hand of the person based on the input image information; and
a suspicious action detection means for detecting a suspicious action of the person based on the tracked action of the hand.
US14/916,702 2013-09-06 2014-09-05 Security system, security method, and non-transitory computer readable medium Abandoned US20160210829A1 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
JP2013185130 2013-09-06
JP2013-185130 2013-09-06
PCT/JP2014/004583 WO2015033576A1 (en) 2013-09-06 2014-09-05 Security system, security method, and non-temporary computer-readable medium

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2014/004583 A-371-Of-International WO2015033576A1 (en) 2013-09-06 2014-09-05 Security system, security method, and non-temporary computer-readable medium

Related Child Applications (3)

Application Number Title Priority Date Filing Date
US16/126,777 Continuation US10573141B2 (en) 2013-09-06 2018-09-10 Security system, security method, and non-transitory computer readable medium
US16/126,729 Continuation US20190005785A1 (en) 2013-09-06 2018-09-10 Security system, security method, and non-transitory computer readable medium
US16/126,818 Continuation US11354991B2 (en) 2013-09-06 2018-09-10 Security system, security method, and non-transitory computer readable medium

Publications (1)

Publication Number Publication Date
US20160210829A1 true US20160210829A1 (en) 2016-07-21

Family

ID=52628072

Family Applications (6)

Application Number Title Priority Date Filing Date
US14/916,702 Abandoned US20160210829A1 (en) 2013-09-06 2014-09-05 Security system, security method, and non-transitory computer readable medium
US16/126,777 Active US10573141B2 (en) 2013-09-06 2018-09-10 Security system, security method, and non-transitory computer readable medium
US16/126,729 Abandoned US20190005785A1 (en) 2013-09-06 2018-09-10 Security system, security method, and non-transitory computer readable medium
US16/126,818 Active US11354991B2 (en) 2013-09-06 2018-09-10 Security system, security method, and non-transitory computer readable medium
US17/743,647 Active US11688256B2 (en) 2013-09-06 2022-05-13 Security system, security method, and non-transitory computer readable medium
US18/197,397 Pending US20230282084A1 (en) 2013-09-06 2023-05-15 Security system, security method, and non-transitory computer readable medium

Family Applications After (5)

Application Number Title Priority Date Filing Date
US16/126,777 Active US10573141B2 (en) 2013-09-06 2018-09-10 Security system, security method, and non-transitory computer readable medium
US16/126,729 Abandoned US20190005785A1 (en) 2013-09-06 2018-09-10 Security system, security method, and non-transitory computer readable medium
US16/126,818 Active US11354991B2 (en) 2013-09-06 2018-09-10 Security system, security method, and non-transitory computer readable medium
US17/743,647 Active US11688256B2 (en) 2013-09-06 2022-05-13 Security system, security method, and non-transitory computer readable medium
US18/197,397 Pending US20230282084A1 (en) 2013-09-06 2023-05-15 Security system, security method, and non-transitory computer readable medium

Country Status (4)

Country Link
US (6) US20160210829A1 (en)
JP (1) JP6249021B2 (en)
CN (2) CN111723668A (en)
WO (1) WO2015033576A1 (en)

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150206188A1 (en) * 2014-01-17 2015-07-23 Panasonic Intellectual Property Corporation Of America Item presentation method, and information display method
US20170061204A1 (en) * 2014-05-12 2017-03-02 Fujitsu Limited Product information outputting method, control device, and computer-readable recording medium
US20170278112A1 (en) * 2016-03-25 2017-09-28 Fuji Xerox Co., Ltd. Information processing apparatus, information processing method, and non-transitory computer readable medium
US20180002109A1 (en) * 2015-01-22 2018-01-04 Nec Corporation Shelf space allocation management device and shelf space allocation management method
JP2018018150A (en) * 2016-07-25 2018-02-01 ユニティガードシステム株式会社 Crime prevention system, crime prevention method, and robot
CN107886667A (en) * 2017-10-11 2018-04-06 深圳云天励飞技术有限公司 Alarm method and device
US20180174150A1 (en) * 2016-12-20 2018-06-21 Mastercard International Incorporated Systems and methods for processing a payment transaction authorization request
GB2557920A (en) * 2016-12-16 2018-07-04 Canon Europa Nv Learning analytics
US20180321660A1 (en) * 2017-05-05 2018-11-08 Walmart Apollo, Llc System and method for automatically restocking items on shelves using a conveyor system
CN109308780A (en) * 2018-10-19 2019-02-05 杭州虹晟信息科技有限公司 Smart home security monitoring system based on Internet of Things
US10360572B2 (en) * 2016-03-07 2019-07-23 Ricoh Company, Ltd. Image processing system, method and computer program product for evaluating level of interest based on direction of human action
US20190236377A1 (en) * 2018-01-31 2019-08-01 Canon Kabushiki Kaisha Information processing apparatus, system, control method for information processing apparatus, and non-transitory computer readable storage medium
WO2019156599A1 (en) * 2018-02-06 2019-08-15 Open Joint Stock Company Research And Development Center "Electronic Information Computation Systems" System and method of people's movement control
EP3531341A3 (en) * 2018-07-03 2020-01-08 Baidu Online Network Technology (Beijing) Co., Ltd. Method for human motion analysis, apparatus for human motion analysis, device and storage medium
US20200387875A1 (en) * 2019-06-04 2020-12-10 Toshiba Tec Kabushiki Kaisha Store management system, electronic receipt system, and store management method
US10984250B2 (en) * 2018-05-31 2021-04-20 Boe Technology Group Co., Ltd. Method and system for management of article storage and computer-readable medium
EP3779776A4 (en) * 2018-08-01 2021-05-26 Advanced New Technologies Co., Ltd. Abnormality detection method, apparatus and device in unmanned settlement scenario
EP3839855A1 (en) * 2019-12-17 2021-06-23 Wincor Nixdorf International GmbH Self-service registration terminal and method
US11270257B2 (en) * 2017-03-06 2022-03-08 Nec Corporation Commodity monitoring device, commodity monitoring system, output destination device, commodity monitoring method, display method and program
US20220222472A1 (en) * 2021-01-14 2022-07-14 Toshiba Tec Kabushiki Kaisha Fraudulent act recognition device, control program therefor, and fraudulent act recognition method
US11922482B2 (en) 2018-03-09 2024-03-05 Nec Corporation Self-checkout system, purchased product management method, and purchased product management program

Families Citing this family (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
BR112015003816B1 (en) 2012-08-21 2022-05-03 Nexen Group, Inc Tension wave gear system
JP6249021B2 (en) * 2013-09-06 2017-12-20 日本電気株式会社 Security system, security method, and security program
US9542626B2 (en) * 2013-09-06 2017-01-10 Toyota Jidosha Kabushiki Kaisha Augmenting layer-based object detection with deep convolutional neural networks
JP6563234B2 (en) * 2015-03-31 2019-08-21 綜合警備保障株式会社 Security system and security method
JP6558178B2 (en) * 2015-09-24 2019-08-14 日本電気株式会社 Nuisance agent estimation system, control method and control program for nuisance agent estimation system
JP2017097599A (en) * 2015-11-24 2017-06-01 宮田 清蔵 Method and device for determining exceptional behavior customer
JP7057959B2 (en) * 2016-08-09 2022-04-21 住友ゴム工業株式会社 Motion analysis device
EP3291191B1 (en) * 2016-08-29 2019-10-09 Panasonic Intellectual Property Management Co., Ltd. Suspicious person report system and suspicious person report method
JP6402219B1 (en) * 2017-04-19 2018-10-10 ユニティガードシステム株式会社 Crime prevention system, crime prevention method, and robot
JP7327458B2 (en) * 2018-03-09 2023-08-16 日本電気株式会社 Self-checkout system, purchased product management method, and purchased product management program
JP7134708B2 (en) * 2018-05-23 2022-09-12 株式会社日立製作所 Monitoring device, monitoring system and monitoring method
US11521460B2 (en) 2018-07-25 2022-12-06 Konami Gaming, Inc. Casino management system with a patron facial recognition system and methods of operating same
AU2019208182B2 (en) 2018-07-25 2021-04-08 Konami Gaming, Inc. Casino management system with a patron facial recognition system and methods of operating same
JP7138547B2 (en) * 2018-11-09 2022-09-16 セコム株式会社 store equipment
JP7161920B2 (en) * 2018-11-09 2022-10-27 セコム株式会社 store equipment
JP6534499B1 (en) * 2019-03-20 2019-06-26 アースアイズ株式会社 MONITORING DEVICE, MONITORING SYSTEM, AND MONITORING METHOD
JP6562437B1 (en) * 2019-04-26 2019-08-21 アースアイズ株式会社 Monitoring device and monitoring method
JP7337354B2 (en) * 2019-05-08 2023-09-04 株式会社オレンジテクラボ Information processing device and information processing program
JP7388440B2 (en) 2019-08-20 2023-11-29 コニカミノルタ株式会社 Image processing system, image processing program, and image processing method
JP2020074567A (en) * 2020-01-15 2020-05-14 日本電気株式会社 Image processing system, image processing method, and program
JP6854959B1 (en) * 2020-10-30 2021-04-07 株式会社Vaak Behavior estimation device, behavior estimation method, program and behavior estimation system
JP7054075B2 (en) * 2021-01-26 2022-04-13 日本電気株式会社 Information processing system, information processing method, and program
WO2023275968A1 (en) * 2021-06-29 2023-01-05 日本電信電話株式会社 Abnormality determination device, abnormality determination method, and abnormality determination program
JP7318753B2 (en) * 2021-06-30 2023-08-01 富士通株式会社 Information processing program, information processing method, and information processing apparatus
JP7318679B2 (en) * 2021-07-30 2023-08-01 富士通株式会社 Information processing program, information processing method, and information processing apparatus
JP7318680B2 (en) * 2021-07-30 2023-08-01 富士通株式会社 Information processing program, information processing method, and information processing apparatus
WO2023152825A1 (en) * 2022-02-09 2023-08-17 日本電気株式会社 Movement evaluation system, movement evaluation method, and non-transitory computer-readable medium
JP7085257B1 (en) 2022-03-17 2022-06-16 株式会社Iso Video analysis service provision system, video analysis service provision program, and video analysis service provision method
CN114708696B (en) * 2022-04-02 2023-06-16 河南大学 Elevator car theft behavior monitoring method and system based on upper limb micro-motion recognition

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050108063A1 (en) * 2003-11-05 2005-05-19 Madill Robert P.Jr. Systems and methods for assessing the potential for fraud in business transactions
US7036094B1 (en) * 1998-08-10 2006-04-25 Cybernet Systems Corporation Behavior recognition system
US20060243798A1 (en) * 2004-06-21 2006-11-02 Malay Kundu Method and apparatus for detecting suspicious activity using video analysis
US20070182818A1 (en) * 2005-09-02 2007-08-09 Buehler Christopher J Object tracking and alerts
US20080018738A1 (en) * 2005-05-31 2008-01-24 Objectvideo, Inc. Video analytics for retail business process monitoring
US20130277423A1 (en) * 2011-03-07 2013-10-24 Fujitsu Frontech Limited Item payment check apparatus
US20140347479A1 (en) * 2011-11-13 2014-11-27 Dor Givon Methods, Systems, Apparatuses, Circuits and Associated Computer Executable Code for Video Based Subject Characterization, Categorization, Identification, Tracking, Monitoring and/or Presence Response
US20150146921A1 (en) * 2012-01-17 2015-05-28 Sony Corporation Information processing apparatus, information processing method, and program
US9589433B1 (en) * 2013-07-31 2017-03-07 Jeff Thramann Self-checkout anti-theft device

Family Cites Families (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS61260391A (en) * 1985-05-14 1986-11-18 三菱電機株式会社 Monitor/controller
JPS62115388A (en) * 1985-11-14 1987-05-27 Matsushita Electric Works Ltd Distance measuring type abnormality supervisory sensor
US6421462B1 (en) * 1998-02-06 2002-07-16 Compaq Computer Corporation Technique for differencing an image
WO2002087636A1 (en) 2001-03-12 2002-11-07 Sub-Q, Inc. Methods for sterilizing cross-linked gelatin compositions
US7200266B2 (en) * 2002-08-27 2007-04-03 Princeton University Method and apparatus for automated video activity analysis
CN101268478B (en) * 2005-03-29 2012-08-15 斯达普力特有限公司 Method and apparatus for detecting suspicious activity using video analysis
JP2008257487A (en) * 2007-04-05 2008-10-23 Multi Solution:Kk Face-authentication-based shoplifting detection system
US7844105B2 (en) * 2007-04-23 2010-11-30 Mitsubishi Electric Research Laboratories, Inc. Method and system for determining objects poses from range images
JP2009009231A (en) 2007-06-26 2009-01-15 Toshiba Corp Security management system and security management method
JP4972491B2 (en) 2007-08-20 2012-07-11 株式会社構造計画研究所 Customer movement judgment system
US20090055205A1 (en) * 2007-08-23 2009-02-26 Igt Multimedia player tracking infrastructure
US8472715B2 (en) * 2007-10-26 2013-06-25 Panasonic Corporation Situation determining apparatus, situation determining method, situation determining program, abnormality determining apparatus, abnormality determining method, abnormality determining program, and congestion estimating apparatus
JP2010094332A (en) 2008-10-17 2010-04-30 Okamura Corp Merchandise display apparatus
JP5143780B2 (en) * 2009-03-31 2013-02-13 綜合警備保障株式会社 Monitoring device and monitoring method
US20110063108A1 (en) * 2009-09-16 2011-03-17 Seiko Epson Corporation Store Surveillance System, Alarm Device, Control Method for a Store Surveillance System, and a Program
JP5540622B2 (en) 2009-09-16 2014-07-02 セイコーエプソン株式会社 Receipt printer, receipt printer control method and program
JP2011108769A (en) 2009-11-16 2011-06-02 Yokogawa Electric Corp Semiconductor device
JP2011108169A (en) * 2009-11-20 2011-06-02 Ishida Co Ltd Store management system
JP5580683B2 (en) * 2010-07-29 2014-08-27 セコム株式会社 Reporting device
US9338409B2 (en) * 2012-01-17 2016-05-10 Avigilon Fortress Corporation System and method for home health care monitoring
CN102881100B (en) * 2012-08-24 2017-07-07 济南纳维信息技术有限公司 Entity StoreFront anti-thefting monitoring method based on video analysis
US9165190B2 (en) * 2012-09-12 2015-10-20 Avigilon Fortress Corporation 3D human pose and shape modeling
CN202995945U (en) * 2012-12-08 2013-06-12 南通纺织职业技术学院 An intelligent anti-theft system
US9443148B2 (en) * 2013-03-15 2016-09-13 International Business Machines Corporation Visual monitoring of queues using auxiliary devices
JP6249021B2 (en) * 2013-09-06 2017-12-20 日本電気株式会社 Security system, security method, and security program
CN106462725A (en) * 2014-01-07 2017-02-22 Arb实验室公司 Systems and methods of monitoring activities at a gaming venue

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7036094B1 (en) * 1998-08-10 2006-04-25 Cybernet Systems Corporation Behavior recognition system
US20050108063A1 (en) * 2003-11-05 2005-05-19 Madill Robert P.Jr. Systems and methods for assessing the potential for fraud in business transactions
US20060243798A1 (en) * 2004-06-21 2006-11-02 Malay Kundu Method and apparatus for detecting suspicious activity using video analysis
US20080018738A1 (en) * 2005-05-31 2008-01-24 Objectvideo, Inc. Video analytics for retail business process monitoring
US20070182818A1 (en) * 2005-09-02 2007-08-09 Buehler Christopher J Object tracking and alerts
US20130277423A1 (en) * 2011-03-07 2013-10-24 Fujitsu Frontech Limited Item payment check apparatus
US20140347479A1 (en) * 2011-11-13 2014-11-27 Dor Givon Methods, Systems, Apparatuses, Circuits and Associated Computer Executable Code for Video Based Subject Characterization, Categorization, Identification, Tracking, Monitoring and/or Presence Response
US20150146921A1 (en) * 2012-01-17 2015-05-28 Sony Corporation Information processing apparatus, information processing method, and program
US9589433B1 (en) * 2013-07-31 2017-03-07 Jeff Thramann Self-checkout anti-theft device

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Haritaoglu et al., "Backpack: Detection of People Carrying Objects Using Silhouettes," Computer Vision and Image Understanding, 81 (3) (2001), pp. 385-397 *
Haritaoglu et al., "Backpack: Detection of People Carrying Objects Using Silhouettes," Computer Vision and Image Understanding, 81 (3) (2001), pp. 385-397 (Year: 2001) *

Cited By (34)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150206188A1 (en) * 2014-01-17 2015-07-23 Panasonic Intellectual Property Corporation Of America Item presentation method, and information display method
US20170061204A1 (en) * 2014-05-12 2017-03-02 Fujitsu Limited Product information outputting method, control device, and computer-readable recording medium
US10354131B2 (en) * 2014-05-12 2019-07-16 Fujitsu Limited Product information outputting method, control device, and computer-readable recording medium
US20190002201A1 (en) * 2015-01-22 2019-01-03 Nec Corporation Shelf space allocation management device and shelf space allocation management method
US10891470B2 (en) * 2015-01-22 2021-01-12 Nec Corporation Shelf space allocation management device and shelf space allocation management method
US20180002109A1 (en) * 2015-01-22 2018-01-04 Nec Corporation Shelf space allocation management device and shelf space allocation management method
US20190009987A1 (en) * 2015-01-22 2019-01-10 Nec Corporation Shelf space allocation management device and shelf space allocation management method
US20190009986A1 (en) * 2015-01-22 2019-01-10 Nec Corporation Shelf space allocation management device and shelf space allocation management method
US10872264B2 (en) * 2015-01-22 2020-12-22 Nec Corporation Shelf space allocation management device and shelf space allocation management method
US10360572B2 (en) * 2016-03-07 2019-07-23 Ricoh Company, Ltd. Image processing system, method and computer program product for evaluating level of interest based on direction of human action
US20170278112A1 (en) * 2016-03-25 2017-09-28 Fuji Xerox Co., Ltd. Information processing apparatus, information processing method, and non-transitory computer readable medium
JP2018018150A (en) * 2016-07-25 2018-02-01 ユニティガードシステム株式会社 Crime prevention system, crime prevention method, and robot
GB2557920B (en) * 2016-12-16 2020-03-04 Canon Kk Learning analytics
GB2557920A (en) * 2016-12-16 2018-07-04 Canon Europa Nv Learning analytics
US20180174150A1 (en) * 2016-12-20 2018-06-21 Mastercard International Incorporated Systems and methods for processing a payment transaction authorization request
US20220156686A1 (en) * 2017-03-06 2022-05-19 Nec Corporation Commodity monitoring device, commodity monitoring system, output destination device, commodity monitoring method, display method and program
US11270257B2 (en) * 2017-03-06 2022-03-08 Nec Corporation Commodity monitoring device, commodity monitoring system, output destination device, commodity monitoring method, display method and program
US20180321660A1 (en) * 2017-05-05 2018-11-08 Walmart Apollo, Llc System and method for automatically restocking items on shelves using a conveyor system
CN107886667A (en) * 2017-10-11 2018-04-06 深圳云天励飞技术有限公司 Alarm method and device
US10984249B2 (en) * 2018-01-31 2021-04-20 Canon Kabushiki Kaisha Information processing apparatus, system, control method for information processing apparatus, and non-transitory computer readable storage medium
US20190236377A1 (en) * 2018-01-31 2019-08-01 Canon Kabushiki Kaisha Information processing apparatus, system, control method for information processing apparatus, and non-transitory computer readable storage medium
WO2019156599A1 (en) * 2018-02-06 2019-08-15 Open Joint Stock Company Research And Development Center "Electronic Information Computation Systems" System and method of people's movement control
US11922482B2 (en) 2018-03-09 2024-03-05 Nec Corporation Self-checkout system, purchased product management method, and purchased product management program
US10984250B2 (en) * 2018-05-31 2021-04-20 Boe Technology Group Co., Ltd. Method and system for management of article storage and computer-readable medium
US10970528B2 (en) 2018-07-03 2021-04-06 Baidu Online Network Technology (Beijing) Co., Ltd. Method for human motion analysis, apparatus for human motion analysis, device and storage medium
EP3531341A3 (en) * 2018-07-03 2020-01-08 Baidu Online Network Technology (Beijing) Co., Ltd. Method for human motion analysis, apparatus for human motion analysis, device and storage medium
EP3779776A4 (en) * 2018-08-01 2021-05-26 Advanced New Technologies Co., Ltd. Abnormality detection method, apparatus and device in unmanned settlement scenario
US11132559B2 (en) * 2018-08-01 2021-09-28 Advanced New Technologies Co., Ltd. Abnormality detection method, apparatus, and device for unmanned checkout
CN109308780A (en) * 2018-10-19 2019-02-05 杭州虹晟信息科技有限公司 Smart home security monitoring system based on Internet of Things
US20200387875A1 (en) * 2019-06-04 2020-12-10 Toshiba Tec Kabushiki Kaisha Store management system, electronic receipt system, and store management method
US11605057B2 (en) * 2019-06-04 2023-03-14 Toshiba Tec Kabushiki Kaisha Store management system, electronic receipt system, and store management method
EP3839855A1 (en) * 2019-12-17 2021-06-23 Wincor Nixdorf International GmbH Self-service registration terminal and method
WO2021122101A1 (en) * 2019-12-17 2021-06-24 Wincor Nixdorf International Gmbh Self-service checkout terminal, and method
US20220222472A1 (en) * 2021-01-14 2022-07-14 Toshiba Tec Kabushiki Kaisha Fraudulent act recognition device, control program therefor, and fraudulent act recognition method

Also Published As

Publication number Publication date
JP6249021B2 (en) 2017-12-20
US20230282084A1 (en) 2023-09-07
US20190005786A1 (en) 2019-01-03
US20190005787A1 (en) 2019-01-03
US10573141B2 (en) 2020-02-25
US20220270455A1 (en) 2022-08-25
CN111723668A (en) 2020-09-29
WO2015033576A1 (en) 2015-03-12
US20190005785A1 (en) 2019-01-03
US11354991B2 (en) 2022-06-07
CN105518755A (en) 2016-04-20
JPWO2015033576A1 (en) 2017-03-02
US11688256B2 (en) 2023-06-27

Similar Documents

Publication Publication Date Title
US11688256B2 (en) Security system, security method, and non-transitory computer readable medium
US20210248382A1 (en) Multiple-factor verification for vision-based systems
US10242267B2 (en) Systems and methods for false alarm reduction during event detection
US10817710B2 (en) Predictive theft notification
US20170068945A1 (en) Pos terminal apparatus, pos system, commodity recognition method, and non-transitory computer readable medium storing program
AU2019204149A1 (en) Video Analytics System
WO2015033577A1 (en) Customer behavior analysis system, customer behavior analysis method, non-temporary computer-readable medium, and shelf system
JP5673888B1 (en) Information notification program and information processing apparatus
CN109353397B (en) Commodity management method, device and system, storage medium and shopping cart
Sujith Crime detection and avoidance in ATM: a new framework
TWI671701B (en) System and method for detecting trading behavior
US20240070642A1 (en) Method and system for self-checkout in a retail environment
WO2019077559A1 (en) System for tracking products and users in a store
US20230136054A1 (en) Information processing method, information processing device, and recording medium
US20230132132A1 (en) Card skimming detection
TWM408755U (en) ATM monitoring device
WO2023026277A1 (en) Context-based moniitoring of hand actions
JP2024008708A (en) Determination program, determination method, and determination device
CN115546703A (en) Risk identification method, device and equipment for self-service cash register and storage medium

Legal Events

Date Code Title Description
AS Assignment

Owner name: NEC CORPORATION, JAPAN

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:UCHIDA, KAORU;YAMASHITA, NOBUYUKI;REEL/FRAME:037895/0527

Effective date: 20160113

STPP Information on status: patent application and granting procedure in general

Free format text: ADVISORY ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION