ACCV 2014: Computer Vision - ACCV 2014 Workshops pp 602-616 | Cite as
Discovering Person Identity via Large-Scale Observations
Abstract
Person identification is a well studied problem in the last two decades. In a typical automated person identification scenario, the system always contains the prior knowledge, either person-based model or reference mugshot, of the person-of-interest. However, the challenge of automated person identification would increase by multiple folds if the prior information is not available. In today’s world, rich and large quantity of information are easily attainable through the Internet or closed-loop surveillance network. This provides us an opportunity to employ an automated approach to perform person identification with minimum prior knowledge, presume that there are sufficient amount of observations. In this paper, we propose a dominant set based person identification framework to learn the identity of a person through large-scale observations, where each observation contains instances from various modality. Through experiments on two challenging face datasets we show the potential of the proposed approach. We also explore the conditions required to obtain satisfy performance and discuss the potential future research directions.
Keywords
Face Image Person Identification News Video Iris Recognition Face DatasetNotes
Acknowledgment
This research was carried out at the NUS-ZJU Sensor-Enhanced Social Media (SeSaMe) Centre. It is supported by the Singapore National Research Foundation under its International Research Centre @ Singapore Funding Initiative and administered by the Interactive Digital Media Programme Office.
References
- 1.Bowyer, K.W., Hollingsworth, K., Flynn, P.J.: A survey of iris biometrics research: 2008–2010. In: Burge, M.J., Bowyer, K.W. (eds.) Handbook of Iris Recognition, pp. 15–54. Springer, London (2013)CrossRefGoogle Scholar
- 2.Maltoni, D., Maio, D., Jain, A.K., Prabhakar, S.: Handbook of Fingerprint Recognition, 2nd edn. Springer, London (2009)CrossRefGoogle Scholar
- 3.Wong, Y., Harandi, M.T., Sanderson, C.: On robust face recognition via sparse coding: the good, the bad and the ugly. IET Biometrics 3, 176–189 (2014)CrossRefGoogle Scholar
- 4.Zhang, X., Gao, Y.: Face recognition across pose: a review. Pattern Recogn. 42, 2876–2896 (2009)CrossRefGoogle Scholar
- 5.Zhao, W.Y., Chellappa, R., Phillips, P.J., Rosenfeld, A.: Face recognition: a literature survey. ACM Comput. Surv. 35, 399–458 (2003)CrossRefGoogle Scholar
- 6.Liu, L.-F., Jia, W., Zhu, Y.-H.: Survey of gait recognition. In: Huang, D.-S., Jo, K.-H., Lee, H.-H., Kang, H.-J., Bevilacqua, V. (eds.) ICIC 2009. LNCS, vol. 5755, pp. 652–659. Springer, Heidelberg (2009) Google Scholar
- 7.Cardinaux, F., Sanderson, C., Bengio, S.: User authentication via adapted statistical models of face images. IEEE Trans. Sig. Process. 54, 361–373 (2006)CrossRefGoogle Scholar
- 8.Satoh, S., Nakamura, Y., Kanade, T.: Name-it: naming and detecting faces in news videos. IEEE MultiMedia 6, 22–35 (1999)CrossRefGoogle Scholar
- 9.Yang, J., Hauptmann, A.G.: Naming every individual in news video monologues. In: Proceedings of ACM International Conference on Multimedia, pp. 580–587 (2004)Google Scholar
- 10.Houghton, R.: Named faces: putting names to faces. IEEE Intell. Syst. 14, 45–50 (1999)CrossRefGoogle Scholar
- 11.Cho, S.H., Hong, S., Nam, Y.: Association and identification in heterogeneous sensors environment with coverage uncertainty. In: IEEE International Conference on Advanced Video and Signal Based Surveillance, pp. 553–558 (2009)Google Scholar
- 12.Cho, S.H., Hong, S., Moon, N., Park, P., Oh, S.J.: Object association and identification in heterogeneous sensors environment. EURASIP J. Adv. Sig. Process. 2010, 18 p. (2010). Article ID 591582Google Scholar
- 13.Zhou, Z., Zhang, M., Huang, S., Li, Y.: Multi-instance multi-label learning. Artif. Intell. 176, 2291–2320 (2012)CrossRefMATHMathSciNetGoogle Scholar
- 14.Yang, S., Jiang, Y., Zhou, Z.: Multi-instance multi-label learning with weak label. In: International Joint Conference on Artificial Intelligence (2013)Google Scholar
- 15.Heisele, B., Ho, P., Wu, J., Poggio, T.: Face recognition: component-based versus global approaches. Comput. Vis. Image Underst. 91, 6–21 (2003)CrossRefGoogle Scholar
- 16.Doddington, G.R., Przybocki, M.A., Martin, A.F., Reynolds, D.A.: The NIST speaker recognition evaluation - overview, methodology, systems, results, perspective. Speech Commun. 31, 225–254 (2000)CrossRefGoogle Scholar
- 17.Pavan, M., Pelillo, M.: Dominant sets and pairwise clustering. IEEE Trans. Pattern Anal. Mach. Intell. 29, 167–172 (2007)CrossRefGoogle Scholar
- 18.Weibull, J.W.: Evolutionary Game Theory, 1st edn. The MIT Press, Cambridge (1997) Google Scholar
- 19.Georghiades, A.S., Belhumeur, P.N., Kriegman, D.J.: From few to many: illumination cone models for face recognition under variable lighting and pose. IEEE Trans. Pattern Anal. Mach. Intell. 23, 643–660 (2001)CrossRefGoogle Scholar
- 20.Lee, K.C., Ho, J., Kriegman, D.J.: Acquiring linear subspaces for face recognition under variable lighting. IEEE Trans. Pattern Anal. Mach. Intell. 27, 684–698 (2005)CrossRefGoogle Scholar
- 21.Huang, G.B., Ramesh, M., Berg, T., Learned-Miller, E.: Labeled Faces in the Wild: A database for studying face recognition in unconstrained environments. Technical report 07–49, University of Massachusetts, Amherst (2007)Google Scholar