Tracking the same person across multiple cameras is an important task in multi-camera systems. It is also desirable to re-identify the individuals who have been previously seen with a single-camera. This paper address...
详细信息
Tracking the same person across multiple cameras is an important task in multi-camera systems. It is also desirable to re-identify the individuals who have been previously seen with a single-camera. This paper addresses this problem by the re-identification of the same individual in two different datasets, which are both challenging situations from video surveillance system. In this paper, local descriptors are introduced for image description, and support vector machines are employed for high classification performance and so an efficient Bag of Features approach for image presentation. In this way, robustness against low resolution, occlusion and pose, viewpoint and illumination changes is achieved in a very fast way. We get promising results from the evaluation with situations where a number of individuals vary continuously from a multi-camera system.
The reliable estimation of system state in multi-sensor uncertainty is always the hot and knotty issue of nonlinear filtering theory. Aiming to the reasonable utilization of measurement information, a novel multi-sens...
详细信息
Biological characteristics based on face, fingerprint and iris images have been extensively studied and used for the identification in the past few decades. As a new-born method, thermal palm vein pattern is gathering...
详细信息
An accuracy assessment method that integrates segmentation and classification accuracy is proposed to meet the requirements of object-based image analysis. Segmentation errors are measured by establishing the relation...
详细信息
ISBN:
(纸本)9781467301732
An accuracy assessment method that integrates segmentation and classification accuracy is proposed to meet the requirements of object-based image analysis. Segmentation errors are measured by establishing the relationship between pixels and their corresponding segments according to the overlaps of segments and reference polygons. Then, two improved confusion matrices that take the segmentation errors into consideration are used: one for pixel-level classification results, and the other for object-level classification results. A final accuracy assessment combines the statistics of these two confusion matrices. The proposed method can be applied to segmentation scale selection in the hierarchical interpretation system. An experiment on a SPOT5 image demonstrates the effectiveness of this method for segmentation scale selection, which can guide the fusion of objects of different scales to obtain a higher accuracy.
Character information is hard to detect in billet scene images by CCD camera. In this paper, we present a method for detection of billet characters from measurements of recursive segmented image. This recursive segmen...
详细信息
Character information is hard to detect in billet scene images by CCD camera. In this paper, we present a method for detection of billet characters from measurements of recursive segmented image. This recursive segmented method can be used in a wide variety of billet scenes. According to high temperature and complex scene in the rolling line, we use an effective clustering and projection characteristics to determine the terminal condition of recursive segmentation. Then we can label character candidate regions in turn by this effective characteristics, and select the regions we want to achieve. The experiments show that this method makes full use of the characteristics of region and clustering. It can improve the quality of detection, and the detection result meets the need of practical application.
Recently, tracking is regarded as a binary classification problem by discriminative tracking methods. However, such binary classification may not fully handle the outliers, which may cause drifting. In this paper, we ...
详细信息
Recently, tracking is regarded as a binary classification problem by discriminative tracking methods. However, such binary classification may not fully handle the outliers, which may cause drifting. In this paper, we argue that tracking may be regarded as one-class problem, which avoids gathering limited negative samples for background description. Inspired by the fact the positive feature space generated by One-Class SVM is bounded by a closed sphere, we propose a novel tracking method utilizing One-Class SVMs that adopt HOG and 2bit-BP as features, called One-Class SVM Tracker (OCST). Simultaneously an efficient initialization and online updating scheme is also proposed. Extensive experimental results prove that OCST outperforms some state-of-the-art discriminative tracking methods on providing accurate tracking and alleviating serious drifting.
The non-regularized iterative image restoration algorithms have been widely investigated in the literature. In this work, we focus on a common issue of non-regularized iterative methods, the stopping condition. A no-r...
详细信息
The non-regularized iterative image restoration algorithms have been widely investigated in the literature. In this work, we focus on a common issue of non-regularized iterative methods, the stopping condition. A no-reference criterion of optimal stopping condition for non-regularized iterative deconvolution called Total Local Binary patterns (TLBP), which is based on the measurement of varying image texture during the deblurring procedure, is proposed. The metric utilizes the minimum of TLBP that is computed according to the LBP map of the blurred image to obtain the optimal restored image. We applied the Richardson-Lucy (RL) method to test the blurred version of the synthetic images and real images in experiments. Deconvolution experiments for Gaussian and out-offocus blur validate the effectiveness of the proposed method.
The digital system of Archaeological includes multi-scale non-destructive detection of archaeological methods,data mining technologies and the GIS of archaeological *** preservation is not just for the protection of c...
详细信息
The digital system of Archaeological includes multi-scale non-destructive detection of archaeological methods,data mining technologies and the GIS of archaeological *** preservation is not just for the protection of cultural relics has been *** non-destructive detection method to detect archaeological artifacts and clarify the situation of cultural relics buried *** detection data through the using of data mining algorithm make out the archaeological ***,use GIS technology to achieve the detection of data management and integration of data mining methods.A whole system of digital archaeological built on the GIS platform,based on the using of data mining technology to achieve a detection method and archaeological information mapping,the system for the digital archaeology has provided a complete technical support.
Object classification in traffic scene surveillance has been a hot topic in imageprocessing field. A big challenge is that shooting view changes in different scenes, which leads to sharp accuracy decrease since train...
详细信息
Object classification in traffic scene surveillance has been a hot topic in imageprocessing field. A big challenge is that shooting view changes in different scenes, which leads to sharp accuracy decrease since training and test samples do not share the same distribution. Inductive transfer learning methods try to bridge this gap by making use of manually labeled target samples. However, it is in line with reality to conduct unsupervised transfer without manually labeling. In this paper, we propose an intuitive transductive transfer method by transferring instances across view. Experimental results indicate that our method outperforms traditional approaches such as inductive SVM and cluster method, and could even achieve a comparable performance compared with manually labeling approach.
Short message service (SMS) is now an indispensable way of social communication. However the mobile spam is getting increasingly serious, troubling users' daily life and ruining the service quality. We propose a n...
详细信息
ISBN:
(纸本)9781467322164
Short message service (SMS) is now an indispensable way of social communication. However the mobile spam is getting increasingly serious, troubling users' daily life and ruining the service quality. We propose a novel approach for spam message detection based on mining the underlying social network of SMS activities. Comparing with strategies on keywords or flow detection, our network-based approach is more robust and difficult to defeat by human spammers. Various levels of features are employed to describe multiple aspects of the network, such as static structures, node activities and evolving situations. Experimental results on real dataset illustrate effectiveness of various features, showing our promising results.
暂无评论