Tracking Moving Objects in Anonymized Trajectories
Multiple target tracking (MTT) is a well-studied technique in the field of radar technology, which associates anonymized measurements with the appropriate object trajectories. This technique, however, suffers from combinatorial explosion, since each new measurement may potentially be associated with any of the existing tracks. Consequently, the complexity of existing MTT algorithms grows exponentially with the number of objects, rendering them inapplicable to large databases. In this paper, we investigate the feasibility of applying the MTT framework in the context of large trajectory databases. Given a history of object movements, where the corresponding object ids have been removed, our goal is to track the trajectory of every object in the database in successive timestamps. Our main contribution lies in the transition from an exponential solution to a polynomial one. We introduce a novel method that transforms the tracking problem into a min-cost max-flow problem. We then utilize well-known graph algorithms that work in polynomial time with respect to the number of objects. The experimental results indicate that the proposed methods produce high quality results that are comparable with the state-of-the-art MTT algorithms. In addition, our methods reduce significantly the computational cost and scale to a large number of objects.
KeywordsNear Neighbor Object Trajectory Node Potential Residual Network Multiple Hypothesis Tracking
Unable to display preview. Download preview PDF.
- 2.Blackman, S.S.: Multiple-Target Tracking with Radar Applications. Artech House (1986)Google Scholar
- 6.Konstantinova, P., Nikolov, M., Semerdjiev, T.: A study of clustering applied to multiple target tracking algorithm. In: Proc. International Conference on Computer Systems and Technologies (Comp.Sys.Tech.), pp. 1–6 (2004)Google Scholar
- 7.Kubica, J., Moore, A.W., Connolly, A., Jedicke, R.: A multiple tree algorithm for the efficient association of asteroid observations. In: Proc. ACM International Conference on Knowledge Discovery and Data Mining (KDD), pp. 138–146 (2005)Google Scholar
- 8.Hoh, B., Gruteser, M.: Protecting location privacy through path confusion. In: IEEE International Conference on Security and Privacy in Communication Networks (Secure Comm), pp. 194–205 (2005)Google Scholar
- 10.Ahuja, R.K., Magnanti, T.L., Orlin, J.B.: Network Flows: Theory, Algorithms, and Applications. Prentice Hall, Englewood Cliffs (1993)Google Scholar