Based on the needs of the development of the Internet of Things, the application of security products and technologies in the realization of the Internet of Things is an extension of the security application field. The essence and most important thing is the security of security products. This article refers to the address: http:// In the security industry, the application of video surveillance occupies the vast majority of the market, so the first thing to be solved in the intelligentization of security products is the intelligence of video surveillance technology. Through intelligent video analysis technology, some key information worthy of attention can be separated from the video. Thus, the video capture device with intelligent video analysis technology becomes an intelligent sensor for collecting key information and becomes the front-end core of the Internet of Things application. As a result, the application is no longer just a video surveillance application, but a series of new applications around the video surveillance application centered on the video surveillance application. This article will analyze the application of intelligent video analysis technology in smart security. What is wisdom security? The security industry is a global industry. It has undergone many evolutions from analog to digital to IP, but overall there are obvious problems of insufficient automatic intelligence. In the past two or three years, smart security has been proposed under the banner of “Smart Earth†and is increasingly being valued because it may bring a series of industrial changes and industrial opportunities. In the field of smart security, it inherits the application connotation of “intelligent video analysis†technology advocated by OV, IOI and other companies. At the same time, many practitioners add various new ideas, such as the application of 3G technology, “Security Cloudâ€. The concept, the application system of "PSIM", and the concept of "Internet of Things security" proposed by Fei Ruisi systematically. No matter what kind of technology is applied and what kind of concept is included in the label of smart security, the core value point is to make a fuss about this "wisdom", all for the security application to be more intelligent and intelligent. The incident, and exposed some hazards to the initial stage, in order to turn the security system into a post-warning tool into a pre-warning weapon. The application of security is divided into large and small scales, including government projects such as “Safe City†and “Safe Campusâ€, large-scale commercial projects such as “networked alarmâ€, and enterprise applications such as parks, communities, enterprises, and factories. And personal applications such as safe home. IoT sensing technology based on intelligent video analysis has excellent applications for these areas. Application in the “Peace China†project The "Peace China" project has been in full swing throughout the country since 2004, including a variety of government-led centralized monitoring projects including Safe City, Ping An Campus, and Ping An Village. The most typical project features include: government investment, centralized monitoring, analog video surveillance as the absolute core, wide monitoring range, and a large number of front-end cameras. For this kind of application, due to the large scale, the manual monitoring is very difficult, so the demand for intelligence is particularly urgent, which is why the recent “Safe City†Phase II renovation projects in many cities are very clear. One of the reasons for the demand for "smart video". However, the large scale also brings a problem, that is, there are many applications that need to be intelligent, and it is very difficult to think about it at a glance, so I think that we can make breakthroughs from some of the quickest points, mainly including the following applications. Front camera health status inspection In the Ping An China application, most of the cameras are not in the daily monitoring range of the monitoring center, but only exist as a collection source of video archives, and its health status is very difficult to obtain real-time protection. Using the back-end platform to automatically perform background inspection, it is convenient to detect and alarm various non-health status such as camera power loss, video loss, defocus blur, occlusion, video interference, frame loss, etc. Maintenance personnel targeted maintenance. Face capture archive In the "Ping An China" category of applications, storage has always been one of the most important components of a system. Due to the large amount of video storage and high investment, the storage time will not be very long. Generally, it takes about 30 days. After a long time, the video recording will be cleared. Security needs to monitor the object, it can be said that more than 90% are people, the usual video recording is largely stored redundant, inefficient data. In response to this feature, Fei Ruisi advocates that face capture technology can be used to capture human faces from a large number of videos into static photos, which are used as auxiliary auxiliary information for long-term storage, which can be used for three years and five at a small storage cost. Storage for years or even more than ten years. Undoubtedly, people's information is one of the most important information in the security field. The face photo has the characteristics of small storage space and large information capacity, and can establish a relationship with personal identity. Therefore, capturing and storing the face photo has an important meaning of the flow chart of the face capture technology of FIG. A large number of photo captures can bring about the retention of human behavioral activities, and at least four excellent applications are derived: face retrieval, blacklist arming, VIP identification, and stranger recognition. Behavior analysis alarm Behavior analysis in Ping An China applications mainly includes: crowd gathering detection, virtual warning line detection, virtual warning zone detection, and residue detection. By using these video intelligent analysis functions, various hazards can be warned in time, and various dangerous flames can be extinguished in the bud. Application in networked alarms Almost every city now has some networked alarm services, relying on 110, and some security companies set up their own teams to provide services. The technology currently used in these networked alarms is mainly infrared and other detection technologies. The infrared detection is used to warn the intrusion behavior, and then the alarm result is notified to the user and the security service provider. However, the false alarm rate of infrared detection is still high, and due to the lack of means of secondary confirmation, it is necessary to manually confirm the alarm regardless of whether it is false or not, which brings a lot of waste of human resources. The author believes that multiple evaluation methods such as infrasound, infrared, and video analysis can be used to achieve multiple false positives, and then achieve a lower false positive rate through 3G video, etc., to achieve remote initial confirmation of the alarm, in order to effectively improve the networked alarm. The application efficiency of the system. For the detection of confined spaces such as homes, shops, and small offices, intrusion behavior can be alarmed by non-directional, non-dead-angle infrasound intrusion detection alarms and intelligent video analysis methods. Infrasound detection has very high sensitivity and accuracy for intrusion detection in confined spaces. Because there is no directionality, there is basically no need for construction. It can work normally when placed directly indoors, and can be interconnected by short-range wireless and video capture devices to achieve comprehensive logic judgment. At the same time, it has self-communication capabilities and can interact with management users or owners via GSM. When an alarm occurs, the management user or the owner can immediately obtain the implementation video through the mobile phone, PAD, PC, etc., to achieve remote alarm confirmation. Personal applications such as homes and vehicles In personal applications such as homes and vehicles, the privacy issues brought by video are very high, so generally do not use video to do security monitoring applications, but through infrared, window magnetism, vibration and other sensors to achieve invasion. Detection. Similarly, there are problems with the confirmation of on-site alarms. Similar to the application of the networked alarm project, it can also use the infrasound detection + video analysis to achieve excellent applications of autonomous alarm and remote confirmation for confined spaces such as homes and vehicles. summary We can see that whether it is in medium-sized applications such as “Ping An Chinaâ€, medium-sized applications such as networked alarms, or personal applications, the “smart security†in this article is concentrated on two points: front-end active detection and early warning, and detection. Interaction after security risks. With automatic intelligent detection, proactively discovering hidden dangers and actively interacting with users, the security system has a preliminary "wisdom" that can bring us a better application experience. Switching Residual Current Transformer Switching Residual Current Transformer,Switching Transformer,Open Residual Current Transformer,Busbar Open Residual Current Transformer Zibo Tongyue Electronics Co., Ltd , https://www.tongyueelectron.com