Person re-identification is a crucial task of identifying pedestrians of interest across multiple surveillance camera views. For person re-identification, a pedestrian is usually represented with features extracted fr...
详细信息
High efficient facial image compression is broadly required and challenging for surveillance and security scenarios, while either traditional general image codecs or special facial image compression schemes only heuri...
详细信息
ISBN:
(纸本)9781538644591;9781538644584
High efficient facial image compression is broadly required and challenging for surveillance and security scenarios, while either traditional general image codecs or special facial image compression schemes only heuristically refine codec separately according to face verification accuracy metric. We propose an End-to-End Facial Image Compression (E2EFIC) framework with a novel variable block size Regionally Adaptive Pooling (RAP) module whose parameters can be automatically optimized according to gradient feedback from an integrated semantic distortion metrics, including a successful exploration to apply Generative Adversarial Network (GAN) as metric directly in image compression scheme. The experimental results verify the framework's efficiency by demonstrating performance improvement of 71.41%, 48.28% and 52.67% bitrate saving separately over JPEG2000, WebP and neural network-based codecs under the same face verification accuracy distortion metric. We also evaluate E2EFIC's superior performance gain compared with latest specific facial image codecs.
Surveillance and security scenarios usually require high efficient facial image compression scheme for face recognition and identification. While either traditional general image codecs or special facial image compres...
详细信息
One key challenge to learning-based video compression is that motion predictive coding, a very effective tool for video compression, can hardly be trained into a neural network. In this paper we propose the concept of...
详细信息
SAR image simulation plays a useful role in SAR target interpretation and recognition. The current SAR target simulation methods require high precision of models and simulation parameters, and are only forward process...
详细信息
Interferometric synthetic aperture radar (InSAR) can be used to extract digital elevation model (DEM) with high accuracy. However, the side looking geometry of synthetic aperture radar (SAR) may cause geometric distor...
ISBN:
(数字)9781728129129
ISBN:
(纸本)9781728129136
Interferometric synthetic aperture radar (InSAR) can be used to extract digital elevation model (DEM) with high accuracy. However, the side looking geometry of synthetic aperture radar (SAR) may cause geometric distortions such as shadow and layover in the mountainous terrain, which will reduce the quality of generated DEM. Fusion of two or more different aspects of InSAR data can deal with this problem. We propose an InSAR DEM reconstruction method based on backprojection (BP) algorithm in two converse flights. This method utilizes the feature of BP algorithm that geocoding has been realized in imaging process to simplify the fusion process of multi-aspect InSAR data. In addition, an iterative DEM extraction method is introduced to improve DEM accuracy. Experimental results verify the effectiveness of the proposed method.
Recently, Siamese network based trackers have received tremendous interest for their fast tracking speed and high performance. Despite the great success, this tracking framework still suffers from several limitations....
详细信息
In this paper, we propose a cooperative video transmission scheme in D2D networks. This research is motivated by the growing interests in hybrid digital-analog video transmissions and device-to-device (D2D) communicat...
详细信息
In this paper, we propose a cooperative video transmission scheme in D2D networks. This research is motivated by the growing interests in hybrid digital-analog video transmissions and device-to-device (D2D) communications. The framework of D2D communications can be generally modeled as a three-node network. In this network, coset coding is used to allow the destination to exploit the correlations between the video signals received in two phases. We have done some work of further optimization to improve the video quality at destination in this network. First, we derive a closed form of the reconstruction error at the destination. This provides a theoretical foundation for finding the optimal quantization step size in coset coding. Then, based on the accurate analysis on the coset coding we design a new power allocation algorithm. Experimental results verify that our scheme outperforms the recently proposed WCVC and DCVC.
Observing that Semantic features learned in an image classification task and Appearance features learned in a similarity matching task complement each other, we build a twofold Siamese network, named SA-Siam, for real...
详细信息
暂无评论