Skip to main content

Deep Learning in Person Re-identification for Cyber-Physical Surveillance Systems

  • Chapter
  • First Online:
Book cover Deep Learning Applications for Cyber Security

Abstract

The Cyber-physical Systems (CPS) are a combination of integrated physical processes, networking and computation to be minored and controlled y embedded subsystems via networked systems with feedback loops to change their behaviour when needed. Whilst the increased use of CPS brings more threats to the public, and thus security problems in this area have become a global issue to make it necessary to develop new approaches for securing CPS. The CPS utilise three-level architecture based on the respective functions of each layer: the perception layer, the transmission layer, and the application layer. Security in specific, CPS applications is currently the most important security objective of CPS because it offers the importance of CPS in its improving functionality

This chapter focuses on the application aspect which is more related to people’s daily lives, and will present a real-time system including distributed multi-camera system that integrates computing and communicating capabilities with monitoring on people in the physical world, namely person re-identification in the cyber-physical surveillance systems. The increasing sophistication and diversity of threats to public security have been causing a critical demand for the development and deployment of reliable, secure, and time-efficient visual intelligent surveillance systems in smart cities. For example, visual surveillance for indoor environments, like metro stations, plays an important role both in the assurance of safety conditions for the public and in the management of the transport network. Recent progress in computer vision techniques and related visual analytics offers new prospects for an intelligent surveillance system. A major recent development is the massive success resulting from using deep learning techniques to enable a significant boosting to visual analysis performance and initiate new research directions to understand visual content. For example, convolutional neural networks have demonstrated superiority on modelling high-level visual concepts. It is expected that the development of deep learning and its related visual analytic methodologies would further influence the field of intelligent surveillance systems. In view of the high demand for a prevalent surveillance system by the metropolis communities, this chapter will introduce recent research based on deep neural networks and pipelines to the practitioners and human investigators undertaking forensic and security analysis of large volumes of open-world CCTV video data sourced from a large distributed multi-camera network covering complex urban environments with transport links. This chapter will address the challenges of using deep learning and related techniques to understand and promote the use of ubiquitous intelligent surveillance systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ahmed E, Jones M, Marks TK (2015) An improved deep learning architecture for person re-identification. In: CVPR

    Google Scholar 

  2. Arandjelovic R, Gronat P, Torii A, Pajdla T, Sivic J (2016) NetVLAD: CNN architecture for weakly supervised place recognition. In: Computer Vision and Pattern Recognition

    Google Scholar 

  3. Ashibani Y, Mahmoud QH (2017) Cyber physical systems security: analysis, challenges and solutions. Comput Secur 68:81–97

    Article  Google Scholar 

  4. Bak S, Carr P (2017) One-shot metric learning for person re-identification. In: CVPR

    Google Scholar 

  5. Bazzani L, Cristani M, Perina A, Murino V (2012) Multiple-shot person re-identification by chromatic and epitomic analyses. Pattern Recogn 33(7):898–903

    Article  Google Scholar 

  6. Bhabad MA, Scholar P (2015) Internet of things: architecture, security issues and countermeasure. Int J Comput Appl 125(4):1–4

    Google Scholar 

  7. Chen D, Yuan Z, Chen B, Zhang N (2016) Similarity learning with spatial constraints for person re-identification. In: CVPR, pp 1268–1277

    Google Scholar 

  8. Chen SZ, Guo CC, Lai JH (2016) Deep ranking for re-identification via joint representation learning. IEEE Trans Image Process 25(5):2353–2367

    Article  MathSciNet  Google Scholar 

  9. Cheng D, Gong Y, Zhou S, Wang J, Zhang N (2016) Person re-identification by multi-channel parts-based CNN with improved triplet loss function. In: CVPR, pp 1335–1344

    Google Scholar 

  10. Cho YJ, Yoon KJ (2016) Improving person re-identification via pose-aware multi-shot matching. In: IEEE Conference on Computer Vision and Pattern Recognition

    Google Scholar 

  11. Chung D, Tahboub K, Delp EJ (2017) A two stream siamese convolutional neural network for person re-identification. In: International Conference on Computer Vision

    Google Scholar 

  12. Davis JV, Kulis B, Jain P, Sra S, Dhillon IS (2007) Information-theoretic metric learning. In: ICML

    Google Scholar 

  13. Fan H, Zheng L, Yan C, Yang Y (2018) Unsupervised person re-identification: clustering and fine-tuning. ACM Trans Multimed Comput Commun Appl 14(4):Article 83:1–18

    Article  Google Scholar 

  14. Farenzena M, Bazzani L, Perina A, Murino V, Cristani M (2010) Person re-identification by symmetry-driven accumulation of local features. In: CVPR

    Google Scholar 

  15. Feichtenhofer C, Pinz A, Zisserman A (2016) Convolutional two-stream network fusion for video action recognition. In: CVPR

    Google Scholar 

  16. Girdhar R, Ramanan D, Gupta A, Sivic J, Russell B (2017) Actionvlad: learning spatio-temporal aggregation for action classification. In: Computer Vision and Pattern Recognition

    Google Scholar 

  17. Gong S, Christani M, Loy CC, Hospedales TM (2014) Person re-identification. Springer, London

    Book  Google Scholar 

  18. Goodfellow IJ, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, Courville A, Bengio Y (2014) Generative adversarial nets. In: NIPS

    Google Scholar 

  19. Gray D, Brennan S, Tao H (2007) Evaluating appearance models for recognition, reacquisition, and tracking. In: Proceedings of International Workshop on Performance Evaluation for Tracking and Surveillance

    Google Scholar 

  20. Gray D, Tao H (2008) Viewpoint invariant pedestrian recognition with an ensemble of localized features. In: ECCV

    Google Scholar 

  21. Guillaumin M, Verbeek J, Schmid C (2009) Is that you? Metric learning approaches for face identification. In: ICCV

    Google Scholar 

  22. Joachims T, Finley T, Yu CNJ (2009) Cutting-plance training of structural SVMS. J Mach Learn Res 77:27–59

    Article  Google Scholar 

  23. Kedem D, Tyree S, Sha F, Lanckriet GR, Weinberger KQ (2012) Non-linear metric learning. In: NIPS

    Google Scholar 

  24. Kingma DP, Welling M (2014) Auto-encoding variational bayes. In: ICLR

    Google Scholar 

  25. Klaser A, Marszaek M, Shmid C (2008) A spatio-temporal descriptor based on 3d-gradients. In: British Machine Vision Conference

    Google Scholar 

  26. Kostinger M, Hirzer M, Wohlhart P, Roth PM, Bischof H (2012) Large scale metric learning from equivalence constraints. In: CVPR

    Google Scholar 

  27. Krizhevsky A, Sutskever I, Hinton GE (2012) Imagenet classification with deep convolutional neural networks. In: Advances in Neural Information Processing Systems

    Google Scholar 

  28. Lai H, Pan Y, Liu Y, Yan S (2015) Simultaneous feature learning and hash coding with deep neural networks. In: CVPR

    Google Scholar 

  29. Law MT, Thome N, Cord M (2013) Quadruplet-wise image similarity learning. In: ICCV

    Google Scholar 

  30. Li D, Chen X, Zhang Z, Huang K (2017) Learning deep context-aware features over body and latent parts for person re-identification. In: CVPR

    Google Scholar 

  31. Li W, Wang X (2013) Locally alligned feature transforms across views. In: CVPR

    Google Scholar 

  32. Li W, Zhao R, Tang X, Wang X (2014) Deepreid: Deep filter pairing neural network for person re-identification. In: CVPR

    Google Scholar 

  33. Li W, Zhu X, Gong S (2017) Person re-identification by deep joint learning of multi-loss classification. In: IJCAI

    Google Scholar 

  34. Li Z, Chang S, Liang F, Huang TS, Cao L, Smith J (2013) Learning locally-adaptive decision functions for person verification. In: CVPR

    Google Scholar 

  35. Liao S, Hu Y, Zhu X, Li SZ (2015) Person re-identification by local maximal occurrence representation and metric learning. In: CVPR, pp 2197–2206

    Google Scholar 

  36. Liao S, Li SZ (2015) Efficient psd constrained asymmetric metric learning for person re-identification. In: ICCV

    Google Scholar 

  37. Lisanti G, Masi I, Del Bimbo A, Bagdanov, AD (2015) Person re-identification by iterative re-weighted sparse ranking. IEEE Trans Pattern Anal Mach Intell 37(8):1629–1642

    Article  Google Scholar 

  38. McFee B, Lanckriet GRG (2010) Metric learning to rank. In: ICML

    Google Scholar 

  39. McLaughlin N, del Rincon JM, Miller P (2016) Recurrent convolutional network for video-based person re-identification. In: CVPR

    Google Scholar 

  40. Mignon A, Jurie F (2012) PCCA: a new approach for distance learning from sparse pairwise constraints. In: CVPR, pp 2666–2672

    Google Scholar 

  41. Ouyang W, Wang X (2013) Joint deep learning for pedestrian detection. In: ICCV

    Google Scholar 

  42. Paisitkriangkrai S, Shen C, van den Hengel A (2015) Learning to rank in person re-identification with metric ensembles. In: CVPR

    Google Scholar 

  43. Pedagadi S, Orwell J, Velastin S, Boghossian B (2013) Local fisher discriminant analysis for pedestrian re-identification. In: CVPR

    Google Scholar 

  44. Peng P, Xiang T, Wang Y, Pontil M, Gong S, Huang T, Tian Y (2016) Unsupervised cross-dataset transfer learning for person re-identification. In: CVPR

    Google Scholar 

  45. Prosser B, Zheng WS, Gong S, Xiang T, Mary Q (2010) Person re-identification by support vector ranking. In: BMVC

    Google Scholar 

  46. Radford A, Metz L, Chintala S (2015) Unsupervised representation learning with deep convolutional generative adversarial networks. arXiv:1511.06434

    Google Scholar 

  47. Schwartz W, Davis L (2009) Learning discriminative appearance-based models using partial least squares. In: Proceedings of SIBGRAPI

    Google Scholar 

  48. Scovanner P, Ali S, Shah M (2007) A 3-dimensional sift descriptor and its application to action recognition. In: ACM Multimedia

    Google Scholar 

  49. Shi H, Yang Y, Zhu X, Liao S, Lei Z, Zheng W, Li SZ (2016) Embedding deep metric for person re-identification: a study against large variations. In: ECCV, pp 732–748

    Google Scholar 

  50. Simonyan K, Zisserman A (2015) Very deep convolutional networks for large-scale image recognition. In: ICLR

    Google Scholar 

  51. Song HO, Xiang Y, Jegelka S, Savarese S (2016) Deep metric learning via lifted structured feature embedding. In: CVPR

    Google Scholar 

  52. Sun Y, Wang X, Tang X (2014) Deep learning face representation from predicting 10,000 classes. In: CVPR

    Google Scholar 

  53. Sun Y, Zheng L, Deng W, Wang S (2017) SVDnet for pedestrian retrieval. In: ICCV

    Google Scholar 

  54. Tsochantaridis I, Hofman T, Joachims T, Altun Y (2004) Support vector machine learning for interdependent and structured output spaces. In: ICML

    Google Scholar 

  55. Varior RR, Haloi M, Wang G (2016) Gated siamese convolutional neural network architecture for human re-identification. In: ECCV, pp 791–808

    Google Scholar 

  56. Varior RR, Shuai B, Lu J, Xu D, Wang G (2016) A siamese long short-term memory architecture for human re-identification. In: ECCV, pp 135–153

    Google Scholar 

  57. Wang F, Zuo W, Lin L, Zhang D, Zhang L (2016) Joint learning of single-image and cross-image representations for person re-identification. In: CVPR, pp 1288–1296

    Google Scholar 

  58. Wang H, Gong S, Xiang T (2014) Unsupervised learning of generative topic saliency for person re-identification. In: BMVC

    Google Scholar 

  59. Wang L, Xiong Y, Wang Z, Qiao Y, Lin D, Tang X, Gool LV (2016) Temporal segment networks: towards good practices for deep action recognition. In: ECCV

    Google Scholar 

  60. Wang N, Yeung D (2013) Learning a deep compact image representation for visual tracking. In: NIPS

    Google Scholar 

  61. Wang T, Gong S, Zhu X, Wang S (2014) Person re-identification by video ranking. In: ECCV

    Google Scholar 

  62. Wang X, Doretto G, Sebastian T, Rittscher J, Tu P (2007) Shape and appearance context modeling. In: ICCV

    Google Scholar 

  63. Weinberger K, Blitzer J, Saul L (2006) Distance metric learning for large margin nearest neighbor classification. In: NIPS

    Google Scholar 

  64. Wilson D, Martinez T (2003) The general inefficiency of batch training for gradient decent learning. Neural Netw 16(10):1429–1451

    Article  Google Scholar 

  65. Wu L, Shen C, van den Hengel A (2016) Deep recurrent convolutional networks for video-based person re-identification: an end-to-end approach. In: arXiv: 1606.01609

    Google Scholar 

  66. Wu L, Shen C, van den Hengel A (2016) Personnet: Person re-identification with deep convolutional neural networks. In: CoRR abs/1601.07255

    Google Scholar 

  67. Wu L, Shen C, van den Hengel A (2017) Deep linear discriminant analysis on fisher networks: a hybrid architecture for person re-identification. Pattern Recogn 65:238–250

    Article  Google Scholar 

  68. Wu L, Wang Y, Gao J, Li X (2018) Deep adaptive feature embedding with local sample distributions for person re-identification. Pattern Recogn 73:275–288

    Article  Google Scholar 

  69. Wu L, Wang Y, Gao J, Li X (2018) What-and-where to look: deep siamese attention networks for video-based person re-identification. IEEE Trans Multimedia. https://doi.org/10.1109/TMM.2018.2877886

    Article  Google Scholar 

  70. Wu L, Wang Y, Ge Z, Hu Q, Li X (2018) Structured deep hashing with convolutional neural networks for fast person re-identification. Comput Vis Image Underst 167:63–73

    Article  Google Scholar 

  71. Wu L, Wang Y, Li X, Gao J (2018) Deep attention-based spatially recursive networks for fine-grained visual recognition. IEEE Trans Cybern 99:1–12

    Google Scholar 

  72. Wu L, Wang Y, Li X, Gao J (2018) What-and-where to match: deep spatially multiplicative integration networks for person re-identification. Pattern Recogn 76:727–738

    Article  Google Scholar 

  73. Wu L, Wang Y, Shao L (2019) Cycle-consistent deep generative hashing for cross-modal retrieval. IEEE Trans Image Process 28(4):1602–1612

    Article  MathSciNet  Google Scholar 

  74. Wu Y, Mukunoki M, Funatomi T, Minoh M, Lao S (2011) Optimizing mean reciprocal rank for person re-identification. In: Advanced Video and Signal-Based Surveillance

    Google Scholar 

  75. Xiao T, Li H, Ouyang W (2016) Learning deep feature representations with domain guided dropout for person re-identification. In: CVPR, pp 1249–1258

    Google Scholar 

  76. Xiong F, Gou M, Camps O, Sznaier M (2014) Person re-identification using kernel-based metric learning methods. In: ECCV

    Google Scholar 

  77. Xu S, Cheng Y, Gu K, Yang Y, Chang S, Zhou P (2017) Jointly attentive spatial-temporal pooling networks for video-based person re-identification. In: ICCV

    Google Scholar 

  78. Yan Y, Ni B, Song Z, Ma C, Yan Y, Yang X (2016) Person re-identification via recurrent feature aggregation. In: ECCV

    Google Scholar 

  79. Yu HX, Wu A, Zheng WS (2017) Cross-view asymmetric metric learning for unsupervised person re-identification. In: ICCV

    Google Scholar 

  80. Zhang C, Wu L, Wang Y (2018) Crossing generative adversarial networks for cross-view person re-identification. In: arXiv:1801.01760

    Google Scholar 

  81. Zhang L, Xiang T, Gong S (2016) Learning a discriminative null space for person re-identification. In: CVPR

    Google Scholar 

  82. Zhang R, Lin L, Zuo W, Zhang L (2015) Bit-scalable deep hashing with regularized similarity learning for image retrieval and person re-identification. IEEE Trans Image Process 24(12):4766–4779

    Article  MathSciNet  Google Scholar 

  83. Zhao F, Huang Y, Wang L, Tan T (2015) Deep semantic ranking based hashing for multi-label image retrieval. In: CVPR

    Google Scholar 

  84. Zhao H, Tian M, Sun S, Shao J, Yan J, Yi S, Wang X, Tang X (2017) Spindle net: person re-identification with human body region guided feature decomposition and fusion. In: CVPR

    Google Scholar 

  85. Zhao L, Li X, Zhuang Y, Wang J (2017) Deeply-learned part-aligned representations for person re-identification. In: ICCV

    Google Scholar 

  86. Zhao R, Ouyang W, Wang X (2013) Person re-identification by salience matching. In: ICCV

    Google Scholar 

  87. Zhao R, Ouyang W, Wang X (2013) Unsupervised salience learning for person re-identification. In: CVPR

    Google Scholar 

  88. Zhao R, Ouyang W, Wang X (2014) Learning mid-level filters for person re-identification. In: CVPR

    Google Scholar 

  89. Zheng L, Huang Y, Lu H, Yang Y (2017) Pose invariant embedding for deep person re-identification. arXiv:1701.07732

    Google Scholar 

  90. Zheng L, Shen L, Tian L, Wang S, Wang J, Tian Q (2015) Scalable person re-identification: a benchmark. In: ICCV

    Google Scholar 

  91. Zheng WS, Gong S, Xiang T (2011) Person re-identification by probabilistic relative distance comparison. In: CVPR

    Google Scholar 

  92. Zheng WS, Gong S, Xiang T (2016) Towards open-world person re-identification by one-shot group-based verification. TPAMI 38(3), 591–606

    Article  Google Scholar 

  93. Zheng X, Ouyang W, Wang X (2013) Multi-stage contextual deep learning for pedestrian detection. In: ICCV

    Google Scholar 

  94. Zhou Z, Huang Y, Wang W, Wang L, Tan T (2017) See the forest for the trees: joint spatial and temporal recurrent neural networks for video-based person re-identification. In: CVPR

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lin Wu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Wu, L., Lovell, B.C., Wang, Y. (2019). Deep Learning in Person Re-identification for Cyber-Physical Surveillance Systems. In: Alazab, M., Tang, M. (eds) Deep Learning Applications for Cyber Security. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-030-13057-2_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-13057-2_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-13056-5

  • Online ISBN: 978-3-030-13057-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics