SlideShare uma empresa Scribd logo
1 de 43
Riccardo Satta
riccardo.satta@diee.unica.it
Dissimilarity-based
people re-identification and search
for intelligent video surveillance
PhD final dissertation
PhD School on Information Engineering
April 2013
University
Of Cagliari
Department of Electrical
and Electronic
Engineering
Pattern Recognition
and Applications Lab
1
Outline
University
Of Cagliari
Department of Electrical
and Electronic Engineering
2
• General context
Intelligent Video-Surveillance, and in particular
– Person Re-identification
– Appearance-based People Search
• A framework for constructing descriptors of people
– dissimilarity-based representations and their advantages
– the Multiple Component Dissimilarity (MCD) framework
• MCD and person re-identification
• MCD and people search
• Discussion and conclusions
Intelligent Video Surveillance
University
Of Cagliari
Department of Electrical
and Electronic Engineering
3
Machine Learning
Biometrics and pattern
recognition
Novel sensor
technologies
Useful tools for operators and forensic
investigators
• person identification
• on-line tracking of persons and objects
• detection of events of interest
• detection of suspicious actions
• summarisation of long video footages
…
Intelligent
Video Surveillance
University
Of Cagliari
Department of Electrical
and Electronic Engineering
Person re-identification
Person Re-Identification is the ability to determine if an
individual has already been observed over a network of video-
surveillance cameras
4
A
B
Scenarios
- on-line (e.g. people
tracking among different
cameras)
- off-line (e.g. retrieve all the
frames showing an individual
of interest)
University
Of Cagliari
Department of Electrical
and Electronic Engineering
Person re-identification
Face recognition cannot be used
- bad quality images (low resolution, blur, …)
- unconstrained pose
Other cues must be used
 clothing appearance
(easy to extract, good uniqueness in limited time spans)
 other ones (e.g. gait) are impractical in real-world
scenarios
5
University
Of Cagliari
Department of Electrical
and Electronic Engineering
Clothing appearance descriptors
6
Blob detection
and tracking
BG/FG
segmentation
Descriptor
computation
Descriptor = body part subdivision + appearance
features
Each body part is automatically detected and described
separately by e.g.
- colour (e.g., histograms)
- texture (e.g., DCT, LBP)
- local/global features
Appearance-based people search
University
Of Cagliari
Department of Electrical
and Electronic Engineering
7
Clothing appearance descriptors can enable another useful
task, appearance-based people search (a novelty in the literature)
 Retrieve images of people via a query expressed as a high-level description of
the
clothes (es. “people with red shirt and blue trousers”), instead of as an image
University
Of Cagliari
Department of Electrical
and Electronic Engineering
8
THE MULTIPLE COMPONENT
DISSIMILARITY FRAMEWORK
Dissimilarity representations
University
Of Cagliari
Department of Electrical
and Electronic Engineering
9
An alternative way [1] to represent objects in pattern
recognition, useful when
 it is unclear how to choose a features
 it is difficult to find a good feature set
feature-based representation
dissimilarity-based representation
Object
feature
extraction
[ x1 x2 … xn ]
feature vector
prototypes
[1] Pekalska and Duin. The Dissimilarity Representation for Pattern Recognition: Foundations and
Applications. World Scientific Publishing, 2005
[ d1 d2 … dn ]
dissimilarity vector
Object
dissimilarities
computation
P1 P2 Pn
The Multiple Component Dissimilarity framework
University
Of Cagliari
Department of Electrical
and Electronic Engineering
10
Extension of the dissimilarity-based approach to objects represented by
- multiple parts
- multiple local features (components)
Prototypes
for body
part #1
Prototypes
for body
part #2
Dissimilarity vectors
(one for each body
part)
Local
appearance
Global
appearance
The Multiple Component Dissimilarity framework
University
Of Cagliari
Department of Electrical
and Electronic Engineering
11
Prototype construction
 From a design set of images of people
 various possible approaches, e.g. clustering
Clustering-based prototype creation example (two body parts)
Design set
Create a set of all the
components of body part 1
Create a set of all the
components of body part 2
Cluster
the set
Take centroids as
prototypes
Cluster
the set
Take centroids as
prototypes
The Multiple Component Dissimilarity framework
University
Of Cagliari
Department of Electrical
and Electronic Engineering
12
MCD representations will be exploited for
 person re-identification
 appearance-based people search
[d1,1 d1,2 d1,3 d1,4 d2,1 d2,2 d2,3 ] [d1,1 d1,2 d1,3 d1,4 d2,1 d2,2 d2,3 ]
[d1,1 d1,2 d1,3 d1,4 d2,1 d2,2 d2,3 ] [d1,1 d1,2 d1,3 d1,4 d2,1 d2,2 d2,3 ]
University
Of Cagliari
Department of Electrical
and Electronic Engineering
13
MCD FOR
PERSON RE-IDENTIFICATION
MCD and person re-identification
University
Of Cagliari
Department of Electrical
and Electronic Engineering
14
Person re-identification
MCD salient features for person re-identification:
 a very compact representation
descriptors are small real vectors (low storage requirements, fast
matching)
 dissimilarity vectors are representation-independent
they can be used to combine different features and modalities
Applications: 1) Speed up person re-identification methods
2) Feature combination for person re-identification
3) Multimodal person re-identification
matching
ranked list of templates
(w.r.t. the degree of similarity)
template gallery
probe
0.03 0.28 0.33 0.34
MCD-based matching
University
Of Cagliari
Department of Electrical
and Electronic Engineering
15
A novel weighted Euclidean distance for dissimilarity spaces
RATIONALE: - each dissimilarity is a degree of relevance of the corresponding
prototype;
- lower dissimilarity values carry more information; in fact, they
encode the
most relevant characteristics of the sample.
Weights: where (xi, yi in the range [0,1])
The weighting rule f() is a monotonically increasing
function; its choice governs the difference between
relevant and non-relevant prototypes
x and y: dissimilarity vectors;
W such that
University
Of Cagliari
Department of Electrical
and Electronic Engineering
16
USING MCD TO SPEED UP
EXISTING METHODS
MCD to speed up existing methods
University
Of Cagliari
Department of Electrical
and Electronic Engineering
17
MCD has been applied to an existing method, MCMimpl [2]
MCMimpl in short:
part subdivision:
torso – legs exploiting symmetry and
anti-symmetry properties, discarding head
multiple component representation:
for each part, randomly taken and partly
overlapping patches
Four data sets of increasing size:
i-LIDS (119 pedestrians) VIPeR-316 (316 pedestrians)
VIPeR-474 (474 pedestrians) VIPeR-632 (632 pedestrians)
[2] Satta, Fumera, Roli, Cristani, and Murino. A Multiple Component Matching Framework for Person Re-
Identification. In: ICIAP, 2011
Experimental evaluation
University
Of Cagliari
Department of Electrical
and Electronic Engineering
18
Experimental evaluation
University
Of Cagliari
Department of Electrical
and Electronic Engineering
19
Trade-off between accuracy and computational time
It can be shown that the overall re-identification time* in a practical search
scenario is much lower when using MCD
* sum of processing time plus the average
search time spent by the operator
Experimental evaluation
University
Of Cagliari
Department of Electrical
and Electronic Engineering
20
Impact of the number and source of prototypes
University
Of Cagliari
Department of Electrical
and Electronic Engineering
21
USING MCD TO COMBINE
FEATURE SETS
Fusion of different feature sets by MCD
University
Of Cagliari
Department of Electrical
and Electronic Engineering
22
Prototypes in MCD are representation-independent
 MCD dissimilarity vectors can be used to combine together different kinds of
features, either global or local
 each feature set will be responsible for a different sub-set of prototypes
Fusion of different feature sets by MCD
University
Of Cagliari
Department of Electrical
and Electronic Engineering
23
This technique has been used to combine five different feature sets
• RandPatchesHSV
• RandPatchesLBP
• FCTH [3]
• EdgeHistogram [4]
• SCD [4]
exploiting a 4-body-parts subdivision
First two feature sets:
200 prototypes per feature set per body part
Last three feature sets:
100 prototypes per feature set per body part
3200 prototypes in total
[3] Chatzichristofis and Boutalis. FCTH: Fuzzy Color and Texture Histogram – a Low Level Feature for
Accurate Image Retrieval. In: WIAMIS, 2008
[4] Sikora. The MPEG-7 Visual Standard for Content Description – an Overview. IEEE Transactions on
Circuits and Systems for Video Technology, 2001
Performance of the single feature sets
University
Of Cagliari
Department of Electrical
and Electronic Engineering
24
I-LIDS: 119 individuals
Comparison with the state-of-the-art
University
Of Cagliari
Department of Electrical
and Electronic Engineering
25
Comparison with two state-of-the-art methods
- SDALF [5]
- CPS [6]
[5] Farenzena, Bazzani, Perina, Murino, and Cristani. Person Re-Identification by Symmetry-Driven
Accumulation of Local Features. In: CVPR, 2010
[6] Cheng, Cristani, Stoppa, Bazzani, and Murino. Custom Pictorial Structures for Re-Identification. In:
BMVC, 2011
University
Of Cagliari
Department of Electrical
and Electronic Engineering
26
USING MCD TO PERFORM
MULTI-MODAL PERSON
RE-IDENTIFICATION
Multi-modal person re-identification
University
Of Cagliari
Department of Electrical
and Electronic Engineering
27
• Appearance is a widely used cue for person re-identification
 other cues (e.g., gait) pose constraints that limit their applicability
in real world scenarios
• However, the recent introduction of RGB-D sensors makes it
possible to extract anthropometric measures that can be
combined with appearance
Example  MS Kinect™!
By processing RGB-D data, it is possible to estimate a 3D model of a person in real-time [7]
From this model, one can extract various anthropometric measures (e.g., height, arm
length)
[7] Shotton, Fitzgibbon, Cook, Sharp, Finocchio, Moore, Kipman, and Blake. Real-time Pose Recognition in
Parts from Single Depth Images. In: CVPR, 2011
Multi-modal person re-identification
University
Of Cagliari
Department of Electrical
and Electronic Engineering
28
Multi-modal person re-identification
University
Of Cagliari
Department of Electrical
and Electronic Engineering
29
A proper fusion strategy must be used to combine different modalities.
Score-level fusion Feature-level fusion
- Performance of score-level fusion is affected by the choice of the fusion
rule (e.g.,
mean, min); a suitable choice for re-id is not trivial
- Feature-level fusion requires homogeneous features
Fusion
Modality 1 Matching score
Modality 2 Matching score
Modality n Matching score
Fusion score
Modality 1
Modality 2
Modality n
Matching
Multi-modal person re-identification
University
Of Cagliari
Department of Electrical
and Electronic Engineering
30
MCD provides a way to combine non-homogeneous modalities at feature
level, by exploiting its representation-independency
Multi-modal person re-identification
University
Of Cagliari
Department of Electrical
and Electronic Engineering
31
This MCD-based approach has been used to combine appearance with anthropometry
Appearance:
two descriptors, MCMimpl v2 and SDALF
Anthropometry:
three measures from the skeleton:
- normalised height
- normalised average arm length
- normalised average leg length
MCMimpl v2 SDALF
Experimental evaluation
University
Of Cagliari
Department of Electrical
and Electronic Engineering
32
Experiments have been carried out on a novel dataset acquired using Kinect
cameras, Kinect4REID
 video sequences of 80 individuals taken at different locations
 different lighting conditions and view points
 2 to 7 different video sequences per person
 many persons are carrying bags or accessories
Experimental evaluation
University
Of Cagliari
Department of Electrical
and Electronic Engineering
33
Experiments:
one video-sequence per person taken as template, the remaining ones as probe
20 repetitions
Experimental evaluation
University
Of Cagliari
Department of Electrical
and Electronic Engineering
34
Comparison of MCD-based fusion with other fusion rules
Similar results have been obtained with SDALF + Anthropometry
University
Of Cagliari
Department of Electrical
and Electronic Engineering
35
USING MCD TO PERFORM
APPEARANCE-BASED
PEOPLE SEARCH
MCD for people search
University
Of Cagliari
Department of Electrical
and Electronic Engineering
36
Implementation by MCD: high-level concepts that describe certain clothing
characteristics (e.g., “red shirt”) may be encoded by one or more visual
prototypes, according to the low-level features and part subdivision used
Prototypes (rectangular patches) extracted from a set of
24 people (upper body part)
Correlation with the presence of the concept “red shirt”
MCD for people search
University
Of Cagliari
Department of Electrical
and Electronic Engineering
37
How to implement people search
(i) define a set of basic queries
(ii) construct a detector for each basic query, using dissimilarity values as input
Complex queries can be built by connecting basic ones through Boolean
operators,
e.g., “red shirt AND (blue trousers OR black trousers)”
Detector[ d1 d2 … dn ] SCORE
Experimental evaluation
University
Of Cagliari
Department of Electrical
and Electronic Engineering
38
Dataset
a subset of 512 images taken from the VIPeR data-set, tagged with respect to 14
different basic queries
Examples:
Three descriptors:
i) MCMimpl
ii) SDALF
iii) MCMimpl-PS, which uses a pictorial structure [8] to subdivide the body into nine
parts
body subdivision,
MCMimpl and SDALF
body subdivision,
MCMimpl-PS
[8] Andriluka, Roth, and Schiele. Pictorial Structures Revisited: People Detection and Articulated Pose
Estimation. In: CVPR 2009
Experimental evaluation
University
Of Cagliari
Department of Electrical
and Electronic Engineering
39
For each basic query:
(i) the VIPeR-Tagged is subdivided into a training and a testing sets of equal size
(ii) a linear SVM is trained on training images to implement a detector
(iii) the P-R curve is evaluated on testing images, by varying the SVM decision threshold
This procedure is repeated ten times
Break-even points for all classes:
Experimental evaluation
University
Of Cagliari
Department of Electrical
and Electronic Engineering
40
Red shirt
Black
trousers
Short
sleeves
Conclusions
University
Of Cagliari
Department of Electrical
and Electronic Engineering
41
What has been done
(i) MCD, a novel dissimilarity-based framework for describing individuals
(ii) an approach based on MCD to speed up any existing person re-
identification method
(iii) a state-of-the-art re-identification method, that combines different
features obtained through the use of MCD
(iv) a method to perform multi-modal person re-identification based on
MCD and using RGB-D cameras, and a novel data set to assess
performance of multi-modal re-identification systems
(v) a method that uses MCD to perform the novel task of “appearance-
based people search”
Conclusions
University
Of Cagliari
Department of Electrical
and Electronic Engineering
42
What to do next (long list…!)
THE FRAMEWORK
(i) explore the commonalities between MCD and Visual Words and Fisher
Vectors
(ii) extend MCD to other domains
MULTIMODAL RE-ID
(i) explore the use of other cues (other anthropometries, skeleton-based
gait…)
(ii) extend the approach to support missing cues
PEOPLE SEARCH
(i) address the problem of ambiguity of concepts
(ii) add semantic interpretation (Natural Language Processing) to support
queries in natural language
University
Of Cagliari
Department of Electrical
and Electronic Engineering
43
QUESTION TIME!

Mais conteúdo relacionado

Mais procurados

TRACKING OF PARTIALLY OCCLUDED OBJECTS IN VIDEO SEQUENCES
TRACKING OF PARTIALLY OCCLUDED OBJECTS IN VIDEO SEQUENCESTRACKING OF PARTIALLY OCCLUDED OBJECTS IN VIDEO SEQUENCES
TRACKING OF PARTIALLY OCCLUDED OBJECTS IN VIDEO SEQUENCESPraveen Pallav
 
IRJET- Image Captioning using Multimodal Embedding
IRJET-  	  Image Captioning using Multimodal EmbeddingIRJET-  	  Image Captioning using Multimodal Embedding
IRJET- Image Captioning using Multimodal EmbeddingIRJET Journal
 
Algorithmic Analysis to Video Object Tracking and Background Segmentation and...
Algorithmic Analysis to Video Object Tracking and Background Segmentation and...Algorithmic Analysis to Video Object Tracking and Background Segmentation and...
Algorithmic Analysis to Video Object Tracking and Background Segmentation and...Editor IJCATR
 
Synthetic training data for deep cn ns in reidentification
Synthetic training data for deep cn ns in reidentificationSynthetic training data for deep cn ns in reidentification
Synthetic training data for deep cn ns in reidentificationAbdulrahman Kerim
 
A comprehensive survey of contemporary
A comprehensive survey of contemporaryA comprehensive survey of contemporary
A comprehensive survey of contemporaryprjpublications
 
AI Use Cases: Special Attention on Semantic Segmentation
AI Use Cases: Special Attention on Semantic SegmentationAI Use Cases: Special Attention on Semantic Segmentation
AI Use Cases: Special Attention on Semantic SegmentationFrederick Apina
 
4 image segmentation through clustering
4 image segmentation through clustering4 image segmentation through clustering
4 image segmentation through clusteringIAEME Publication
 
Fast Person Re-Identification for Intelligent Video Surveillance Systems
Fast Person Re-Identification for Intelligent Video Surveillance SystemsFast Person Re-Identification for Intelligent Video Surveillance Systems
Fast Person Re-Identification for Intelligent Video Surveillance SystemsBahram Lavi
 
DWT-SVD BASED SECURED IMAGE WATERMARKING FOR COPYRIGHT PROTECTION USING VISUA...
DWT-SVD BASED SECURED IMAGE WATERMARKING FOR COPYRIGHT PROTECTION USING VISUA...DWT-SVD BASED SECURED IMAGE WATERMARKING FOR COPYRIGHT PROTECTION USING VISUA...
DWT-SVD BASED SECURED IMAGE WATERMARKING FOR COPYRIGHT PROTECTION USING VISUA...cscpconf
 
Paper id 24201464
Paper id 24201464Paper id 24201464
Paper id 24201464IJRAT
 
Lecture3 xing fei-fei
Lecture3 xing fei-feiLecture3 xing fei-fei
Lecture3 xing fei-feiTianlu Wang
 
Parcel Lot Division with cGAN
Parcel Lot Division with cGANParcel Lot Division with cGAN
Parcel Lot Division with cGANMatthew To
 
REMOVING OCCLUSION IN IMAGES USING SPARSE PROCESSING AND TEXTURE SYNTHESIS
REMOVING OCCLUSION IN IMAGES USING SPARSE PROCESSING AND TEXTURE SYNTHESISREMOVING OCCLUSION IN IMAGES USING SPARSE PROCESSING AND TEXTURE SYNTHESIS
REMOVING OCCLUSION IN IMAGES USING SPARSE PROCESSING AND TEXTURE SYNTHESISIJCSEA Journal
 
IRJET- Real-Time Object Detection using Deep Learning: A Survey
IRJET- Real-Time Object Detection using Deep Learning: A SurveyIRJET- Real-Time Object Detection using Deep Learning: A Survey
IRJET- Real-Time Object Detection using Deep Learning: A SurveyIRJET Journal
 

Mais procurados (19)

HalifaxNGGs
HalifaxNGGsHalifaxNGGs
HalifaxNGGs
 
TRACKING OF PARTIALLY OCCLUDED OBJECTS IN VIDEO SEQUENCES
TRACKING OF PARTIALLY OCCLUDED OBJECTS IN VIDEO SEQUENCESTRACKING OF PARTIALLY OCCLUDED OBJECTS IN VIDEO SEQUENCES
TRACKING OF PARTIALLY OCCLUDED OBJECTS IN VIDEO SEQUENCES
 
IRJET- Image Captioning using Multimodal Embedding
IRJET-  	  Image Captioning using Multimodal EmbeddingIRJET-  	  Image Captioning using Multimodal Embedding
IRJET- Image Captioning using Multimodal Embedding
 
Algorithmic Analysis to Video Object Tracking and Background Segmentation and...
Algorithmic Analysis to Video Object Tracking and Background Segmentation and...Algorithmic Analysis to Video Object Tracking and Background Segmentation and...
Algorithmic Analysis to Video Object Tracking and Background Segmentation and...
 
Synthetic training data for deep cn ns in reidentification
Synthetic training data for deep cn ns in reidentificationSynthetic training data for deep cn ns in reidentification
Synthetic training data for deep cn ns in reidentification
 
A comprehensive survey of contemporary
A comprehensive survey of contemporaryA comprehensive survey of contemporary
A comprehensive survey of contemporary
 
AI Use Cases: Special Attention on Semantic Segmentation
AI Use Cases: Special Attention on Semantic SegmentationAI Use Cases: Special Attention on Semantic Segmentation
AI Use Cases: Special Attention on Semantic Segmentation
 
4 image segmentation through clustering
4 image segmentation through clustering4 image segmentation through clustering
4 image segmentation through clustering
 
40120140505005 2
40120140505005 240120140505005 2
40120140505005 2
 
40120140505005
4012014050500540120140505005
40120140505005
 
Fast Person Re-Identification for Intelligent Video Surveillance Systems
Fast Person Re-Identification for Intelligent Video Surveillance SystemsFast Person Re-Identification for Intelligent Video Surveillance Systems
Fast Person Re-Identification for Intelligent Video Surveillance Systems
 
DWT-SVD BASED SECURED IMAGE WATERMARKING FOR COPYRIGHT PROTECTION USING VISUA...
DWT-SVD BASED SECURED IMAGE WATERMARKING FOR COPYRIGHT PROTECTION USING VISUA...DWT-SVD BASED SECURED IMAGE WATERMARKING FOR COPYRIGHT PROTECTION USING VISUA...
DWT-SVD BASED SECURED IMAGE WATERMARKING FOR COPYRIGHT PROTECTION USING VISUA...
 
Robust Algorithm for Discrete Tomography with Gray Value Estimation
Robust Algorithm for Discrete Tomography with Gray Value EstimationRobust Algorithm for Discrete Tomography with Gray Value Estimation
Robust Algorithm for Discrete Tomography with Gray Value Estimation
 
G04654247
G04654247G04654247
G04654247
 
Paper id 24201464
Paper id 24201464Paper id 24201464
Paper id 24201464
 
Lecture3 xing fei-fei
Lecture3 xing fei-feiLecture3 xing fei-fei
Lecture3 xing fei-fei
 
Parcel Lot Division with cGAN
Parcel Lot Division with cGANParcel Lot Division with cGAN
Parcel Lot Division with cGAN
 
REMOVING OCCLUSION IN IMAGES USING SPARSE PROCESSING AND TEXTURE SYNTHESIS
REMOVING OCCLUSION IN IMAGES USING SPARSE PROCESSING AND TEXTURE SYNTHESISREMOVING OCCLUSION IN IMAGES USING SPARSE PROCESSING AND TEXTURE SYNTHESIS
REMOVING OCCLUSION IN IMAGES USING SPARSE PROCESSING AND TEXTURE SYNTHESIS
 
IRJET- Real-Time Object Detection using Deep Learning: A Survey
IRJET- Real-Time Object Detection using Deep Learning: A SurveyIRJET- Real-Time Object Detection using Deep Learning: A Survey
IRJET- Real-Time Object Detection using Deep Learning: A Survey
 

Destaque (11)

関西CVPR勉強会 2012.10.28
関西CVPR勉強会 2012.10.28関西CVPR勉強会 2012.10.28
関西CVPR勉強会 2012.10.28
 
PhD Day 2011
PhD Day 2011PhD Day 2011
PhD Day 2011
 
re-identification
re-identificationre-identification
re-identification
 
Mp6 PARIS 2.0 (Sept 2009)
Mp6 PARIS 2.0 (Sept 2009)Mp6 PARIS 2.0 (Sept 2009)
Mp6 PARIS 2.0 (Sept 2009)
 
Camera Calibration for Video Surveillance
Camera Calibration for Video SurveillanceCamera Calibration for Video Surveillance
Camera Calibration for Video Surveillance
 
Intelligent Video Surveillance with Cloud Computing
Intelligent Video Surveillance with Cloud ComputingIntelligent Video Surveillance with Cloud Computing
Intelligent Video Surveillance with Cloud Computing
 
Biometric ppt
Biometric pptBiometric ppt
Biometric ppt
 
Human Re-identification using Soft Biometrics in Video Surveillance
Human Re-identification using Soft Biometrics in Video SurveillanceHuman Re-identification using Soft Biometrics in Video Surveillance
Human Re-identification using Soft Biometrics in Video Surveillance
 
Biometrics
BiometricsBiometrics
Biometrics
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 

Semelhante a Dissimilarity-based people re-identification and search for intelligent video surveillance

Analysis and assessment software for multi-user collaborative cognitive radi...
Analysis and assessment software for multi-user collaborative  cognitive radi...Analysis and assessment software for multi-user collaborative  cognitive radi...
Analysis and assessment software for multi-user collaborative cognitive radi...IJECEIAES
 
Anomaly detection using deep learning based model with feature attention
Anomaly detection using deep learning based model with feature attentionAnomaly detection using deep learning based model with feature attention
Anomaly detection using deep learning based model with feature attentionIAESIJAI
 
REVIEW ON OBJECT DETECTION WITH CNN
REVIEW ON OBJECT DETECTION WITH CNNREVIEW ON OBJECT DETECTION WITH CNN
REVIEW ON OBJECT DETECTION WITH CNNIRJET Journal
 
Real Time Object Detection System with YOLO and CNN Models: A Review
Real Time Object Detection System with YOLO and CNN Models: A ReviewReal Time Object Detection System with YOLO and CNN Models: A Review
Real Time Object Detection System with YOLO and CNN Models: A ReviewSpringer
 
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, VOL. 65, NO. 3, M.docx
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, VOL. 65, NO. 3, M.docxIEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, VOL. 65, NO. 3, M.docx
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, VOL. 65, NO. 3, M.docxsheronlewthwaite
 
10.1109@ICCMC48092.2020.ICCMC-000167.pdf
10.1109@ICCMC48092.2020.ICCMC-000167.pdf10.1109@ICCMC48092.2020.ICCMC-000167.pdf
10.1109@ICCMC48092.2020.ICCMC-000167.pdfmokamojah
 
lit review presentation RK SHARMA.pptx
lit review presentation RK SHARMA.pptxlit review presentation RK SHARMA.pptx
lit review presentation RK SHARMA.pptxErsandeepkanaujia
 
EMERGENCY VEHICLE SOUND DETECTION SYSTEMS IN TRAFFIC CONGESTION
EMERGENCY VEHICLE SOUND DETECTION SYSTEMS IN TRAFFIC CONGESTIONEMERGENCY VEHICLE SOUND DETECTION SYSTEMS IN TRAFFIC CONGESTION
EMERGENCY VEHICLE SOUND DETECTION SYSTEMS IN TRAFFIC CONGESTIONIRJET Journal
 
3d object detection and recognition : a review
3d object detection and recognition : a review3d object detection and recognition : a review
3d object detection and recognition : a reviewsyedamashoon
 
15UEC804_Project work_second Review.pptx
15UEC804_Project work_second Review.pptx15UEC804_Project work_second Review.pptx
15UEC804_Project work_second Review.pptxbalum34
 
Applied mathematics
Applied mathematicsApplied mathematics
Applied mathematicsVisionary_
 
Real Time Object Detection with Audio Feedback using Yolo v3
Real Time Object Detection with Audio Feedback using Yolo v3Real Time Object Detection with Audio Feedback using Yolo v3
Real Time Object Detection with Audio Feedback using Yolo v3ijtsrd
 
Stress, strain and orientation fields in deformed FCC polycrystals
 Stress, strain and orientation fields in deformed FCC polycrystals  Stress, strain and orientation fields in deformed FCC polycrystals
Stress, strain and orientation fields in deformed FCC polycrystals Srihari Sundar
 
AN ENERGY AWARE FUZZY APPROACH TO UNEQUAL CLUSTERING IN WIRELESS SENSOR NETWO...
AN ENERGY AWARE FUZZY APPROACH TO UNEQUAL CLUSTERING IN WIRELESS SENSOR NETWO...AN ENERGY AWARE FUZZY APPROACH TO UNEQUAL CLUSTERING IN WIRELESS SENSOR NETWO...
AN ENERGY AWARE FUZZY APPROACH TO UNEQUAL CLUSTERING IN WIRELESS SENSOR NETWO...Amit Kumar
 
RECOGNITION OF CDNA MICROARRAY IMAGE USING FEEDFORWARD ARTIFICIAL NEURAL NETWORK
RECOGNITION OF CDNA MICROARRAY IMAGE USING FEEDFORWARD ARTIFICIAL NEURAL NETWORKRECOGNITION OF CDNA MICROARRAY IMAGE USING FEEDFORWARD ARTIFICIAL NEURAL NETWORK
RECOGNITION OF CDNA MICROARRAY IMAGE USING FEEDFORWARD ARTIFICIAL NEURAL NETWORKijaia
 
User Identity Linkage: Data Collection, DataSet Biases, Method, Control and A...
User Identity Linkage: Data Collection, DataSet Biases, Method, Control and A...User Identity Linkage: Data Collection, DataSet Biases, Method, Control and A...
User Identity Linkage: Data Collection, DataSet Biases, Method, Control and A...IIIT Hyderabad
 

Semelhante a Dissimilarity-based people re-identification and search for intelligent video surveillance (20)

Fm2510101015
Fm2510101015Fm2510101015
Fm2510101015
 
Analysis and assessment software for multi-user collaborative cognitive radi...
Analysis and assessment software for multi-user collaborative  cognitive radi...Analysis and assessment software for multi-user collaborative  cognitive radi...
Analysis and assessment software for multi-user collaborative cognitive radi...
 
ece 4-1 syllubus.pdf
ece 4-1 syllubus.pdfece 4-1 syllubus.pdf
ece 4-1 syllubus.pdf
 
Anomaly detection using deep learning based model with feature attention
Anomaly detection using deep learning based model with feature attentionAnomaly detection using deep learning based model with feature attention
Anomaly detection using deep learning based model with feature attention
 
RESUME
RESUMERESUME
RESUME
 
REVIEW ON OBJECT DETECTION WITH CNN
REVIEW ON OBJECT DETECTION WITH CNNREVIEW ON OBJECT DETECTION WITH CNN
REVIEW ON OBJECT DETECTION WITH CNN
 
Real Time Object Detection System with YOLO and CNN Models: A Review
Real Time Object Detection System with YOLO and CNN Models: A ReviewReal Time Object Detection System with YOLO and CNN Models: A Review
Real Time Object Detection System with YOLO and CNN Models: A Review
 
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, VOL. 65, NO. 3, M.docx
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, VOL. 65, NO. 3, M.docxIEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, VOL. 65, NO. 3, M.docx
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, VOL. 65, NO. 3, M.docx
 
10.1109@ICCMC48092.2020.ICCMC-000167.pdf
10.1109@ICCMC48092.2020.ICCMC-000167.pdf10.1109@ICCMC48092.2020.ICCMC-000167.pdf
10.1109@ICCMC48092.2020.ICCMC-000167.pdf
 
lit review presentation RK SHARMA.pptx
lit review presentation RK SHARMA.pptxlit review presentation RK SHARMA.pptx
lit review presentation RK SHARMA.pptx
 
EMERGENCY VEHICLE SOUND DETECTION SYSTEMS IN TRAFFIC CONGESTION
EMERGENCY VEHICLE SOUND DETECTION SYSTEMS IN TRAFFIC CONGESTIONEMERGENCY VEHICLE SOUND DETECTION SYSTEMS IN TRAFFIC CONGESTION
EMERGENCY VEHICLE SOUND DETECTION SYSTEMS IN TRAFFIC CONGESTION
 
3d object detection and recognition : a review
3d object detection and recognition : a review3d object detection and recognition : a review
3d object detection and recognition : a review
 
15UEC804_Project work_second Review.pptx
15UEC804_Project work_second Review.pptx15UEC804_Project work_second Review.pptx
15UEC804_Project work_second Review.pptx
 
Applied mathematics
Applied mathematicsApplied mathematics
Applied mathematics
 
Opinion and Consensus Dynamics in Tourism Digital Ecosystems
Opinion and Consensus Dynamics in Tourism Digital EcosystemsOpinion and Consensus Dynamics in Tourism Digital Ecosystems
Opinion and Consensus Dynamics in Tourism Digital Ecosystems
 
Real Time Object Detection with Audio Feedback using Yolo v3
Real Time Object Detection with Audio Feedback using Yolo v3Real Time Object Detection with Audio Feedback using Yolo v3
Real Time Object Detection with Audio Feedback using Yolo v3
 
Stress, strain and orientation fields in deformed FCC polycrystals
 Stress, strain and orientation fields in deformed FCC polycrystals  Stress, strain and orientation fields in deformed FCC polycrystals
Stress, strain and orientation fields in deformed FCC polycrystals
 
AN ENERGY AWARE FUZZY APPROACH TO UNEQUAL CLUSTERING IN WIRELESS SENSOR NETWO...
AN ENERGY AWARE FUZZY APPROACH TO UNEQUAL CLUSTERING IN WIRELESS SENSOR NETWO...AN ENERGY AWARE FUZZY APPROACH TO UNEQUAL CLUSTERING IN WIRELESS SENSOR NETWO...
AN ENERGY AWARE FUZZY APPROACH TO UNEQUAL CLUSTERING IN WIRELESS SENSOR NETWO...
 
RECOGNITION OF CDNA MICROARRAY IMAGE USING FEEDFORWARD ARTIFICIAL NEURAL NETWORK
RECOGNITION OF CDNA MICROARRAY IMAGE USING FEEDFORWARD ARTIFICIAL NEURAL NETWORKRECOGNITION OF CDNA MICROARRAY IMAGE USING FEEDFORWARD ARTIFICIAL NEURAL NETWORK
RECOGNITION OF CDNA MICROARRAY IMAGE USING FEEDFORWARD ARTIFICIAL NEURAL NETWORK
 
User Identity Linkage: Data Collection, DataSet Biases, Method, Control and A...
User Identity Linkage: Data Collection, DataSet Biases, Method, Control and A...User Identity Linkage: Data Collection, DataSet Biases, Method, Control and A...
User Identity Linkage: Data Collection, DataSet Biases, Method, Control and A...
 

Último

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Último (20)

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

Dissimilarity-based people re-identification and search for intelligent video surveillance

  • 1. Riccardo Satta riccardo.satta@diee.unica.it Dissimilarity-based people re-identification and search for intelligent video surveillance PhD final dissertation PhD School on Information Engineering April 2013 University Of Cagliari Department of Electrical and Electronic Engineering Pattern Recognition and Applications Lab 1
  • 2. Outline University Of Cagliari Department of Electrical and Electronic Engineering 2 • General context Intelligent Video-Surveillance, and in particular – Person Re-identification – Appearance-based People Search • A framework for constructing descriptors of people – dissimilarity-based representations and their advantages – the Multiple Component Dissimilarity (MCD) framework • MCD and person re-identification • MCD and people search • Discussion and conclusions
  • 3. Intelligent Video Surveillance University Of Cagliari Department of Electrical and Electronic Engineering 3 Machine Learning Biometrics and pattern recognition Novel sensor technologies Useful tools for operators and forensic investigators • person identification • on-line tracking of persons and objects • detection of events of interest • detection of suspicious actions • summarisation of long video footages … Intelligent Video Surveillance
  • 4. University Of Cagliari Department of Electrical and Electronic Engineering Person re-identification Person Re-Identification is the ability to determine if an individual has already been observed over a network of video- surveillance cameras 4 A B Scenarios - on-line (e.g. people tracking among different cameras) - off-line (e.g. retrieve all the frames showing an individual of interest)
  • 5. University Of Cagliari Department of Electrical and Electronic Engineering Person re-identification Face recognition cannot be used - bad quality images (low resolution, blur, …) - unconstrained pose Other cues must be used  clothing appearance (easy to extract, good uniqueness in limited time spans)  other ones (e.g. gait) are impractical in real-world scenarios 5
  • 6. University Of Cagliari Department of Electrical and Electronic Engineering Clothing appearance descriptors 6 Blob detection and tracking BG/FG segmentation Descriptor computation Descriptor = body part subdivision + appearance features Each body part is automatically detected and described separately by e.g. - colour (e.g., histograms) - texture (e.g., DCT, LBP) - local/global features
  • 7. Appearance-based people search University Of Cagliari Department of Electrical and Electronic Engineering 7 Clothing appearance descriptors can enable another useful task, appearance-based people search (a novelty in the literature)  Retrieve images of people via a query expressed as a high-level description of the clothes (es. “people with red shirt and blue trousers”), instead of as an image
  • 8. University Of Cagliari Department of Electrical and Electronic Engineering 8 THE MULTIPLE COMPONENT DISSIMILARITY FRAMEWORK
  • 9. Dissimilarity representations University Of Cagliari Department of Electrical and Electronic Engineering 9 An alternative way [1] to represent objects in pattern recognition, useful when  it is unclear how to choose a features  it is difficult to find a good feature set feature-based representation dissimilarity-based representation Object feature extraction [ x1 x2 … xn ] feature vector prototypes [1] Pekalska and Duin. The Dissimilarity Representation for Pattern Recognition: Foundations and Applications. World Scientific Publishing, 2005 [ d1 d2 … dn ] dissimilarity vector Object dissimilarities computation P1 P2 Pn
  • 10. The Multiple Component Dissimilarity framework University Of Cagliari Department of Electrical and Electronic Engineering 10 Extension of the dissimilarity-based approach to objects represented by - multiple parts - multiple local features (components) Prototypes for body part #1 Prototypes for body part #2 Dissimilarity vectors (one for each body part) Local appearance Global appearance
  • 11. The Multiple Component Dissimilarity framework University Of Cagliari Department of Electrical and Electronic Engineering 11 Prototype construction  From a design set of images of people  various possible approaches, e.g. clustering Clustering-based prototype creation example (two body parts) Design set Create a set of all the components of body part 1 Create a set of all the components of body part 2 Cluster the set Take centroids as prototypes Cluster the set Take centroids as prototypes
  • 12. The Multiple Component Dissimilarity framework University Of Cagliari Department of Electrical and Electronic Engineering 12 MCD representations will be exploited for  person re-identification  appearance-based people search [d1,1 d1,2 d1,3 d1,4 d2,1 d2,2 d2,3 ] [d1,1 d1,2 d1,3 d1,4 d2,1 d2,2 d2,3 ] [d1,1 d1,2 d1,3 d1,4 d2,1 d2,2 d2,3 ] [d1,1 d1,2 d1,3 d1,4 d2,1 d2,2 d2,3 ]
  • 13. University Of Cagliari Department of Electrical and Electronic Engineering 13 MCD FOR PERSON RE-IDENTIFICATION
  • 14. MCD and person re-identification University Of Cagliari Department of Electrical and Electronic Engineering 14 Person re-identification MCD salient features for person re-identification:  a very compact representation descriptors are small real vectors (low storage requirements, fast matching)  dissimilarity vectors are representation-independent they can be used to combine different features and modalities Applications: 1) Speed up person re-identification methods 2) Feature combination for person re-identification 3) Multimodal person re-identification matching ranked list of templates (w.r.t. the degree of similarity) template gallery probe 0.03 0.28 0.33 0.34
  • 15. MCD-based matching University Of Cagliari Department of Electrical and Electronic Engineering 15 A novel weighted Euclidean distance for dissimilarity spaces RATIONALE: - each dissimilarity is a degree of relevance of the corresponding prototype; - lower dissimilarity values carry more information; in fact, they encode the most relevant characteristics of the sample. Weights: where (xi, yi in the range [0,1]) The weighting rule f() is a monotonically increasing function; its choice governs the difference between relevant and non-relevant prototypes x and y: dissimilarity vectors; W such that
  • 16. University Of Cagliari Department of Electrical and Electronic Engineering 16 USING MCD TO SPEED UP EXISTING METHODS
  • 17. MCD to speed up existing methods University Of Cagliari Department of Electrical and Electronic Engineering 17 MCD has been applied to an existing method, MCMimpl [2] MCMimpl in short: part subdivision: torso – legs exploiting symmetry and anti-symmetry properties, discarding head multiple component representation: for each part, randomly taken and partly overlapping patches Four data sets of increasing size: i-LIDS (119 pedestrians) VIPeR-316 (316 pedestrians) VIPeR-474 (474 pedestrians) VIPeR-632 (632 pedestrians) [2] Satta, Fumera, Roli, Cristani, and Murino. A Multiple Component Matching Framework for Person Re- Identification. In: ICIAP, 2011
  • 18. Experimental evaluation University Of Cagliari Department of Electrical and Electronic Engineering 18
  • 19. Experimental evaluation University Of Cagliari Department of Electrical and Electronic Engineering 19 Trade-off between accuracy and computational time It can be shown that the overall re-identification time* in a practical search scenario is much lower when using MCD * sum of processing time plus the average search time spent by the operator
  • 20. Experimental evaluation University Of Cagliari Department of Electrical and Electronic Engineering 20 Impact of the number and source of prototypes
  • 21. University Of Cagliari Department of Electrical and Electronic Engineering 21 USING MCD TO COMBINE FEATURE SETS
  • 22. Fusion of different feature sets by MCD University Of Cagliari Department of Electrical and Electronic Engineering 22 Prototypes in MCD are representation-independent  MCD dissimilarity vectors can be used to combine together different kinds of features, either global or local  each feature set will be responsible for a different sub-set of prototypes
  • 23. Fusion of different feature sets by MCD University Of Cagliari Department of Electrical and Electronic Engineering 23 This technique has been used to combine five different feature sets • RandPatchesHSV • RandPatchesLBP • FCTH [3] • EdgeHistogram [4] • SCD [4] exploiting a 4-body-parts subdivision First two feature sets: 200 prototypes per feature set per body part Last three feature sets: 100 prototypes per feature set per body part 3200 prototypes in total [3] Chatzichristofis and Boutalis. FCTH: Fuzzy Color and Texture Histogram – a Low Level Feature for Accurate Image Retrieval. In: WIAMIS, 2008 [4] Sikora. The MPEG-7 Visual Standard for Content Description – an Overview. IEEE Transactions on Circuits and Systems for Video Technology, 2001
  • 24. Performance of the single feature sets University Of Cagliari Department of Electrical and Electronic Engineering 24 I-LIDS: 119 individuals
  • 25. Comparison with the state-of-the-art University Of Cagliari Department of Electrical and Electronic Engineering 25 Comparison with two state-of-the-art methods - SDALF [5] - CPS [6] [5] Farenzena, Bazzani, Perina, Murino, and Cristani. Person Re-Identification by Symmetry-Driven Accumulation of Local Features. In: CVPR, 2010 [6] Cheng, Cristani, Stoppa, Bazzani, and Murino. Custom Pictorial Structures for Re-Identification. In: BMVC, 2011
  • 26. University Of Cagliari Department of Electrical and Electronic Engineering 26 USING MCD TO PERFORM MULTI-MODAL PERSON RE-IDENTIFICATION
  • 27. Multi-modal person re-identification University Of Cagliari Department of Electrical and Electronic Engineering 27 • Appearance is a widely used cue for person re-identification  other cues (e.g., gait) pose constraints that limit their applicability in real world scenarios • However, the recent introduction of RGB-D sensors makes it possible to extract anthropometric measures that can be combined with appearance Example  MS Kinect™! By processing RGB-D data, it is possible to estimate a 3D model of a person in real-time [7] From this model, one can extract various anthropometric measures (e.g., height, arm length) [7] Shotton, Fitzgibbon, Cook, Sharp, Finocchio, Moore, Kipman, and Blake. Real-time Pose Recognition in Parts from Single Depth Images. In: CVPR, 2011
  • 28. Multi-modal person re-identification University Of Cagliari Department of Electrical and Electronic Engineering 28
  • 29. Multi-modal person re-identification University Of Cagliari Department of Electrical and Electronic Engineering 29 A proper fusion strategy must be used to combine different modalities. Score-level fusion Feature-level fusion - Performance of score-level fusion is affected by the choice of the fusion rule (e.g., mean, min); a suitable choice for re-id is not trivial - Feature-level fusion requires homogeneous features Fusion Modality 1 Matching score Modality 2 Matching score Modality n Matching score Fusion score Modality 1 Modality 2 Modality n Matching
  • 30. Multi-modal person re-identification University Of Cagliari Department of Electrical and Electronic Engineering 30 MCD provides a way to combine non-homogeneous modalities at feature level, by exploiting its representation-independency
  • 31. Multi-modal person re-identification University Of Cagliari Department of Electrical and Electronic Engineering 31 This MCD-based approach has been used to combine appearance with anthropometry Appearance: two descriptors, MCMimpl v2 and SDALF Anthropometry: three measures from the skeleton: - normalised height - normalised average arm length - normalised average leg length MCMimpl v2 SDALF
  • 32. Experimental evaluation University Of Cagliari Department of Electrical and Electronic Engineering 32 Experiments have been carried out on a novel dataset acquired using Kinect cameras, Kinect4REID  video sequences of 80 individuals taken at different locations  different lighting conditions and view points  2 to 7 different video sequences per person  many persons are carrying bags or accessories
  • 33. Experimental evaluation University Of Cagliari Department of Electrical and Electronic Engineering 33 Experiments: one video-sequence per person taken as template, the remaining ones as probe 20 repetitions
  • 34. Experimental evaluation University Of Cagliari Department of Electrical and Electronic Engineering 34 Comparison of MCD-based fusion with other fusion rules Similar results have been obtained with SDALF + Anthropometry
  • 35. University Of Cagliari Department of Electrical and Electronic Engineering 35 USING MCD TO PERFORM APPEARANCE-BASED PEOPLE SEARCH
  • 36. MCD for people search University Of Cagliari Department of Electrical and Electronic Engineering 36 Implementation by MCD: high-level concepts that describe certain clothing characteristics (e.g., “red shirt”) may be encoded by one or more visual prototypes, according to the low-level features and part subdivision used Prototypes (rectangular patches) extracted from a set of 24 people (upper body part) Correlation with the presence of the concept “red shirt”
  • 37. MCD for people search University Of Cagliari Department of Electrical and Electronic Engineering 37 How to implement people search (i) define a set of basic queries (ii) construct a detector for each basic query, using dissimilarity values as input Complex queries can be built by connecting basic ones through Boolean operators, e.g., “red shirt AND (blue trousers OR black trousers)” Detector[ d1 d2 … dn ] SCORE
  • 38. Experimental evaluation University Of Cagliari Department of Electrical and Electronic Engineering 38 Dataset a subset of 512 images taken from the VIPeR data-set, tagged with respect to 14 different basic queries Examples: Three descriptors: i) MCMimpl ii) SDALF iii) MCMimpl-PS, which uses a pictorial structure [8] to subdivide the body into nine parts body subdivision, MCMimpl and SDALF body subdivision, MCMimpl-PS [8] Andriluka, Roth, and Schiele. Pictorial Structures Revisited: People Detection and Articulated Pose Estimation. In: CVPR 2009
  • 39. Experimental evaluation University Of Cagliari Department of Electrical and Electronic Engineering 39 For each basic query: (i) the VIPeR-Tagged is subdivided into a training and a testing sets of equal size (ii) a linear SVM is trained on training images to implement a detector (iii) the P-R curve is evaluated on testing images, by varying the SVM decision threshold This procedure is repeated ten times Break-even points for all classes:
  • 40. Experimental evaluation University Of Cagliari Department of Electrical and Electronic Engineering 40 Red shirt Black trousers Short sleeves
  • 41. Conclusions University Of Cagliari Department of Electrical and Electronic Engineering 41 What has been done (i) MCD, a novel dissimilarity-based framework for describing individuals (ii) an approach based on MCD to speed up any existing person re- identification method (iii) a state-of-the-art re-identification method, that combines different features obtained through the use of MCD (iv) a method to perform multi-modal person re-identification based on MCD and using RGB-D cameras, and a novel data set to assess performance of multi-modal re-identification systems (v) a method that uses MCD to perform the novel task of “appearance- based people search”
  • 42. Conclusions University Of Cagliari Department of Electrical and Electronic Engineering 42 What to do next (long list…!) THE FRAMEWORK (i) explore the commonalities between MCD and Visual Words and Fisher Vectors (ii) extend MCD to other domains MULTIMODAL RE-ID (i) explore the use of other cues (other anthropometries, skeleton-based gait…) (ii) extend the approach to support missing cues PEOPLE SEARCH (i) address the problem of ambiguity of concepts (ii) add semantic interpretation (Natural Language Processing) to support queries in natural language
  • 43. University Of Cagliari Department of Electrical and Electronic Engineering 43 QUESTION TIME!