SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
Shubham Lavania Int. Journal of Engineering Research and Application
ISSN : 2248-9622, Vol. 3, Issue 5, Sep-Oct 2013, pp.1123-1126

RESEARCH ARTICLE

www.ijera.com

OPEN ACCESS

Human Re-Identification In Surveillance Network
Shubham Lavania
Department of Electronics and Communication Enginnering VIT University Vellore, India

Abstract
This paper presents an appearance-based model to address the human re-identification problem. Human reidentification is an important and still unsolved task in computer vision. Re-identification refers to the problem
of establishing correspondence among various observations of the same subject viewed at different time
instances in different camera positions. It can also be defined as the process to match persons observed in non
overlapping camera views with visual features for inter-camera tracking. The ambiguity increases with the
number of candidates to be distinguished. Simple temporal reasoning can simplify the problem by pruning the
candidate set to be matched. In many systems there is a requirement to identify individuals or determine whether
a given individual has already appeared over a network of cameras. The human appearance obtained in one
camera is usually different from the ones obtained in another camera. In order to re-identify people a human
signature should handle difference in illumination pose and camera parameters. The paper focuses on a new
appearance model based on Mean Riemannian Covariance (MRC) patches extracted from tracks of a particular
individual to capturing from a distance even at low resolution without active co-operation of subjects, has
motivated us to use it for re-identification in the computer surveillance network.
Keywords: Re-identification, Riemannian manifold, Human detection, Gait, Phase of motion
extremely difficult. Besides, occlusions (caused by
other people or objects of the scene) and selfI.
INTRODUCTION
occlusions (caused by body parts) make the reRecently, cameras spread out across various
identification problem one of the hardest tasks in the
domains that range from personal computers, video
video surveillance domain. For high level analysis of
games, home surveillance applications,to large
surveillance video, the first step is to track the
camera networks. These camera networks facility
moving subjects in order to get their spatiotemporal
access to sports venue, monitored environments, such
information. Tracking subjects in a video captured
as airports, metro stations or car parks. A natural
from a single camera is usually done by the data
consequence of such situation is a need for an
association technique .However, effective video
automated extraction of high-level semantic
surveillance over a large area requires the use of
information from extremely large volumes of
multiple cameras. In case of overlapping cameras,
recorded video data. In many surveillance systems,
joint camera calibration and spatiotemporal
the most desirable information is knowledge about an
information help to establish the correspondence
identity of a detected object. An appearance-based
between subjects (Khan and Shah, 2006). But if there
approach relies on modeling a human signature using
is no overlap between cameras, the problem of
tracking and detection results. Re-identification
identity management of subjects viewed in different
techniques, which exploit appearance information
cameras at different time instants becomes
using only one image are referred to as single-shot
challenging.
approaches and until now they were the most popular
Identification is the process of recognizing a
methods. Currently, identification accuracy is
subject who has left one camera and then reappeared
improved by integrating information over many
in another camera. The uncertain behavior of subjects
images. The methods, which employ multiple images
across the ‘blind gaps’ makes the task harder.Reof the same person as a training data, are called
identification techniques help to reassign the same
multiple-shot approaches. As re-identification
identity to a subject entering a camera that was
concerns a large sets of individuals acquired from
previously attached to him when exiting a previous
different cameras, we need to provide a distinctive
camera. Thus, re-identification extends tracking
and invariant signature. This signature has to be
beyond blind gaps. Spatiotemporal methods simplify
based on discriminative features to allow browsing
the re-identification procedure. But, they fail to
the most similar signatures over a network of
resolve identity when multiple persons, walking at
cameras. It can be achieved by signature matching,
normal velocity, exit and enter two consecutive
which has to handle differences in illumination, pose
cameras at the same time. To handle this situation
and camera parameters. Note that, intercamera
phase of motion can be used. Phase of motion is
variations in lighting conditions, differences in
defined as the physical shape of a person at a
illumination, different camera parameters, changes in
particular time instant while walking. Multiple
object orientation and object pose make this task
www.ijera.com

1123 | P a g e
Shubham Lavania Int. Journal of Engineering Research and Application
ISSN : 2248-9622, Vol. 3, Issue 5, Sep-Oct 2013, pp.1123-1126
persons exiting a camera at the same time are
unlikely to have the same phase of motion. If the exit
phase of motion and the transition time are known,
the probable entry phase of motion of that person can
be obtained using a phase of motion estimation
model. Thus, phase of motion can resolve the
ambiguity arising due to similar entry/exit time by
multiplepersons.
The major drawback of spatiotemporal and phase of
motion based models is in the assumption on the
behavior of subjects in the blind gap. The subjects are
assumed to walk at normal velocity without any
hindrance in the blind gap which may not always be
valid in reality. In order to handle the abovementioned situations, biometric based features such
as gait can be used for re-identification. Gait of a
person is a periodic activity where each gait cycle
covers two strides: the right foot forward and the left
foot forward. Gait consists of both shape and
dynamics where shape refers to physical build of a
person seen in different gait phases and dynamics
refers to motion dynamics of the person in a gait
cycle.

II.

USE OF TECHNIQUES

The most common way of extracting
appearance models in automatic surveillance systems
is by rst detection of objects in an image, and then by
tracking them using different methods and strategies.
We can detect and track humans using HOG-based
detector and we handle color dissimilarities caused
by camera illumination differences by applying
histogram equalization.
The Histogram of Oriented Gradient (HOG)
based technique to automatically detect humans in
different scenes before their visual signatures are
extracted for re-identication purposes and it also uses
using a Sobel convolution kernel, in a multiresolution framework.
This technique was originally designed to
detect faces using the assumption that facial features
remain approximatively at the same location.
However, locations of human silhouette features do
not remain constant in templates with varying poses
(e.g. knees are constantly changing position when
walking).Hence the algorithm modification was
proposed in the paper[3].According to it at specific
locations around the human silhouette as shown in
figure 2. The most dominant cells used to
characterize human shapes are the 15 most dominant
cells selected among 252 cells covering the human
sample area as discussed in paper[8].These most
dominant cells are the cells having the closest HOG
vector to the mean HOG vector calculated over the
vectors (of the corresponding cell) from a human

www.ijera.com

www.ijera.com

database. The system was trained using 10; 000
positive and 20; 000 negative image samples from
the NICTA database as mentioned in paper[4].
The next step basically involves the Color
normalization One of the most challenging problem
using the color as a feature is that images of the same
object acquired under different cameras show color
dissimilarities.Histogram equalization stretches a
range of histogram to be as close as possible to an
uniform histogram.The approach is based on the idea
that among all possible histograms,an uniformly
distributed histogram has maximum entropy.
Maximizing the entropy of a distribution, we
maximize its information and thus histogram
equalization maximizes the information content of
the output image. We apply the histogram
equalization to each of the color channels (RGB) to
maximize the entropy in each of those channels and
obtain the invariant image
The other technique includes the interfacing
of human reidentification in video by integrating the
face profile and gait the technical approach for the
same is as follows like the gait recognition is an
emerging biometric technology which involves
people being identified purely through the analysis of
the way they walk. While research is still underway,
it has attracted interest as a method of identification
because it is non-invasive and does not require the
subject’s cooperation. Gait recognition could also be
used from a distance, making it well-suited to
identifying perpetrators at a crime scene. But gait
recognition technology is not limited to security
applications – researchers also envision medical
applications for the technology. For example,
recognizing changes in walking patterns early on can
help to identify conditions such as Parkinson’s
disease and multiple sclerosis in their earliest stages.
There are two main types of gait recognition
techniques currently in development. The first, gait
recognition based on the automatic analysis of video
imagery, is the more widely studied and attempted of
the two. Video samples of the subject’s walk are
taken and the trajectories of the joints and angles over
time are analyzed. A mathematical model of the
motion is created, and is subsequently compared
against any other samples in order to determine their
identity.
The second method uses a radar system
much like that used by police officers to identify
speeding cars. The radar records the gait cycle that
the various body parts of the subject create as he or
she walks. This data is then compared to other
samples to identify them.

1124 | P a g e
Shubham Lavania Int. Journal of Engineering Research and Application
ISSN : 2248-9622, Vol. 3, Issue 5, Sep-Oct 2013, pp.1123-1126

www.ijera.com

Fig. 1. PEI images of a subject having 14 key poses. This figure basically lead the emphasis on the gait motion
tracking of the person while walking in different poses and its analysis with the help phase of motion
techniques.

Fig. 2. Mean human image with corresponding edge magnitudes and the 15 most dominant cells. From
the left: the first image shows the mean human image calculated over all positive samples in the database; the
second image shows the corresponding mean edge magnitude response; the third image shows this later image
superposed with the 15 most dominant cells of size 8×8 pixels. The cell bounding boxes are drawn with a color
set by their most dominant edge orientation with the scheme defined in the last image.
experiments show that a joint combination of these
distinctive patchesconstructs a robust invariant
III.
CONCLUSION
human signature, which can handle differences in
In this paper, we have presented a recamera parameters in paper[11]. Therefore the three
identification method thatis able to track moving
techniques are combined together for the resubjects in different locations while observingthem
identification of the human being in the surveillance
through multiple non-overlapping cameras. The
network and the future work will include to
proposed approach is based on a combination of gait,
implement the same techniques in the real world
phase of motion, and the MRC model. The
applications like terrorist and mob identification and
spatiotemporal model islearnt in the training phase
other security hazards which may occur in the public
based on parameters like entry/exitlocations,
places like airports, stations and malls.
velocities, and transition time. Gait based feature
helps insuch scenarios to re-identify him. The
proposed method combining these three features is
REFERENCES
able to track subjects even if they change Speed, or
[1]
Rabiner, L.R., 1989. A tutorial on hidden
stop for some time in the blind gap. The response
markov models and selected applications
time of the combined approach is also quite
inspeech recognition. Proc. IEEE 77 (2),
promising.. Another point of consideration is
257–286.
occlusion, which affects the overall re-identification
[2]
Rahimi, A., Darrell, T., 2004. Simultaneous
accuracy. Previously it has been shown that the
calibration and tracking with a network of
proposed MRC patchescomputed using a Riemannian
non-overlapping sensors. Proc. CVPR 1,
manifold theory can extract essential informationon
187–194.
an appearance of a human and its variability. The
www.ijera.com

1125 | P a g e
Shubham Lavania Int. Journal of Engineering Research and Application
ISSN : 2248-9622, Vol. 3, Issue 5, Sep-Oct 2013, pp.1123-1126
[3]

[4]

[5]

[6]

[7]

[8]

[9]

[10]

[11]

[12]

[13]

www.ijera.com

M. Farenzena, L. Bazzani, A. Perina, V.
Murino, M. Cristani, Person reidentification
by symmetry-driven accumulation of local
features, in: CVPR, 2010.
A. Yilmaz, O. Javed, M. Shah, Object
tracking: A survey, ACM Computer Survey
38. doi: http://doi.acm.org/10.1145/ 1177
352.1177355
Veeraraghavan, A., Srivastava, A., RoyChowdhury, A.K., Chellappa, R., 2009.
Rate- invariant recognition of humans and
their activities.IEEE Trans. Image Process.
18 (6), 1326–1339.
Wechsler, H., 2010. Intelligent biometric
information management.
Intell.Info.
Manage. 2, 499–511.
Huang, X., Boulgouris, N.V., 2009. Modelbased human gait recognition using fusion of
features. In: Proc. IEEE Intl. Conf. on
Acoustics, Speech, and Signal Processing.
Pp.1469–1472.
Slawomirbak,Etineecorvee,Francois Bremon
Boosted human reidentification techniques
using Riemannian manifolds
Javed, O., Shafique, K., Rasheed, Z., Shah,
M.,
2008.
Modeling
inter-camera
spacetimeand appearance relationships for
tracking across non-overlapping views.
Comput.Vision and Image Understanding
109, 146–162.
Kale, A., Sundaresan, A., Rajagopalan,
A.N., Cuntoor, N.P., Roy-Chowdhury,
A.K.,
Kruger,
V.,
Chellappa,
R.,
2004.Identification of humans using gait.
IEEE Trans. Image Proc. 13, 1163–1173.
Kettnaker, V., Zabih, R., 1999. Bayesian
multi-camera surveillance. Proc. CVPR,
117–123.
Aditi roy, Shamik sural,Jayanta Mukherjee
A hierarchical approach combing gait and
phase of motion with spatiotemporal model
with person re-identification
Khan, S.M., Shah, M., 2006. A multiview
approach to tracking people in crowded
scenes using a planar homography
constraint. Proc. ECCV, 133–146.

www.ijera.com

1126 | P a g e

Contenu connexe

Tendances

International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD Editor
 
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
TELKOMNIKA JOURNAL
 
News Letter, object recognition and tracking
News Letter, object recognition and trackingNews Letter, object recognition and tracking
News Letter, object recognition and tracking
Moatasem Chehaiber
 

Tendances (16)

Survey on Human Computer interaction for disabled persons
Survey on Human Computer interaction  for disabled persons Survey on Human Computer interaction  for disabled persons
Survey on Human Computer interaction for disabled persons
 
Secure Authentication System Using Video Surveillance
Secure Authentication System Using Video SurveillanceSecure Authentication System Using Video Surveillance
Secure Authentication System Using Video Surveillance
 
IRJET- Survey on Detection of Crime
IRJET-  	  Survey on Detection of CrimeIRJET-  	  Survey on Detection of Crime
IRJET- Survey on Detection of Crime
 
Transform Domain Based Iris Recognition using EMD and FFT
Transform Domain Based Iris Recognition using EMD and FFTTransform Domain Based Iris Recognition using EMD and FFT
Transform Domain Based Iris Recognition using EMD and FFT
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Biometric Class Attendace System
Biometric Class Attendace SystemBiometric Class Attendace System
Biometric Class Attendace System
 
novel method of identifying fingerprint using minutiae matching in biometric ...
novel method of identifying fingerprint using minutiae matching in biometric ...novel method of identifying fingerprint using minutiae matching in biometric ...
novel method of identifying fingerprint using minutiae matching in biometric ...
 
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
 
News Letter, object recognition and tracking
News Letter, object recognition and trackingNews Letter, object recognition and tracking
News Letter, object recognition and tracking
 
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Detection and Tracking of Objects: A Detailed Study
Detection and Tracking of Objects: A Detailed StudyDetection and Tracking of Objects: A Detailed Study
Detection and Tracking of Objects: A Detailed Study
 
IJET-V2I6P21
IJET-V2I6P21IJET-V2I6P21
IJET-V2I6P21
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Palmprint Identification Based on Principle Line Using Machine Learning Tech...
Palmprint Identification Based on Principle Line Using Machine  Learning Tech...Palmprint Identification Based on Principle Line Using Machine  Learning Tech...
Palmprint Identification Based on Principle Line Using Machine Learning Tech...
 

En vedette

En vedette (6)

50 Essential Content Marketing Hacks (Content Marketing World)
50 Essential Content Marketing Hacks (Content Marketing World)50 Essential Content Marketing Hacks (Content Marketing World)
50 Essential Content Marketing Hacks (Content Marketing World)
 
Prototyping is an attitude
Prototyping is an attitudePrototyping is an attitude
Prototyping is an attitude
 
10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer Experience10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer Experience
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media Plan
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming Convention
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting Personal
 

Similaire à Gj3511231126

Proposed Multi-object Tracking Algorithm Using Sobel Edge Detection operator
Proposed Multi-object Tracking Algorithm Using Sobel Edge Detection operatorProposed Multi-object Tracking Algorithm Using Sobel Edge Detection operator
Proposed Multi-object Tracking Algorithm Using Sobel Edge Detection operator
QUESTJOURNAL
 
Chapter 1_Introduction.docx
Chapter 1_Introduction.docxChapter 1_Introduction.docx
Chapter 1_Introduction.docx
KISHWARYA2
 
A Parametric Approach to Gait Signature Extraction for Human Motion Identific...
A Parametric Approach to Gait Signature Extraction for Human Motion Identific...A Parametric Approach to Gait Signature Extraction for Human Motion Identific...
A Parametric Approach to Gait Signature Extraction for Human Motion Identific...
CSCJournals
 
Schematic model for analyzing mobility and detection of multiple
Schematic model for analyzing mobility and detection of multipleSchematic model for analyzing mobility and detection of multiple
Schematic model for analyzing mobility and detection of multiple
IAEME Publication
 

Similaire à Gj3511231126 (20)

Abstract.docx
Abstract.docxAbstract.docx
Abstract.docx
 
Analysis of Different Techniques for Person Re-Identification: An Assessment
Analysis of Different Techniques for Person Re-Identification: An AssessmentAnalysis of Different Techniques for Person Re-Identification: An Assessment
Analysis of Different Techniques for Person Re-Identification: An Assessment
 
Proposed Multi-object Tracking Algorithm Using Sobel Edge Detection operator
Proposed Multi-object Tracking Algorithm Using Sobel Edge Detection operatorProposed Multi-object Tracking Algorithm Using Sobel Edge Detection operator
Proposed Multi-object Tracking Algorithm Using Sobel Edge Detection operator
 
Human activity detection based on edge point movements and spatio temporal fe...
Human activity detection based on edge point movements and spatio temporal fe...Human activity detection based on edge point movements and spatio temporal fe...
Human activity detection based on edge point movements and spatio temporal fe...
 
A novel enhanced algorithm for efficient human tracking
A novel enhanced algorithm for efficient human trackingA novel enhanced algorithm for efficient human tracking
A novel enhanced algorithm for efficient human tracking
 
Bw33449453
Bw33449453Bw33449453
Bw33449453
 
Chapter 1_Introduction.docx
Chapter 1_Introduction.docxChapter 1_Introduction.docx
Chapter 1_Introduction.docx
 
1879 1885
1879 18851879 1885
1879 1885
 
A Comparison of People Counting Techniques via Video Scene Analysis
A Comparison of People Counting Techniques viaVideo Scene AnalysisA Comparison of People Counting Techniques viaVideo Scene Analysis
A Comparison of People Counting Techniques via Video Scene Analysis
 
bazgir2020.pdf
bazgir2020.pdfbazgir2020.pdf
bazgir2020.pdf
 
bazgir2020.pdf
bazgir2020.pdfbazgir2020.pdf
bazgir2020.pdf
 
ROBUST HUMAN TRACKING METHOD BASED ON APPEARANCE AND GEOMETRICAL FEATURES IN ...
ROBUST HUMAN TRACKING METHOD BASED ON APPEARANCE AND GEOMETRICAL FEATURES IN ...ROBUST HUMAN TRACKING METHOD BASED ON APPEARANCE AND GEOMETRICAL FEATURES IN ...
ROBUST HUMAN TRACKING METHOD BASED ON APPEARANCE AND GEOMETRICAL FEATURES IN ...
 
Robust Human Tracking Method Based on Apperance and Geometrical Features in N...
Robust Human Tracking Method Based on Apperance and Geometrical Features in N...Robust Human Tracking Method Based on Apperance and Geometrical Features in N...
Robust Human Tracking Method Based on Apperance and Geometrical Features in N...
 
Leave a Trace - A People Tracking System Meets Anomaly Detection
Leave a Trace - A People Tracking System Meets Anomaly DetectionLeave a Trace - A People Tracking System Meets Anomaly Detection
Leave a Trace - A People Tracking System Meets Anomaly Detection
 
A Parametric Approach to Gait Signature Extraction for Human Motion Identific...
A Parametric Approach to Gait Signature Extraction for Human Motion Identific...A Parametric Approach to Gait Signature Extraction for Human Motion Identific...
A Parametric Approach to Gait Signature Extraction for Human Motion Identific...
 
Schematic model for analyzing mobility and detection of multiple
Schematic model for analyzing mobility and detection of multipleSchematic model for analyzing mobility and detection of multiple
Schematic model for analyzing mobility and detection of multiple
 
L_3011_62.+1908
L_3011_62.+1908L_3011_62.+1908
L_3011_62.+1908
 
A Hybrid Architecture for Tracking People in Real-Time Using a Video Surveill...
A Hybrid Architecture for Tracking People in Real-Time Using a Video Surveill...A Hybrid Architecture for Tracking People in Real-Time Using a Video Surveill...
A Hybrid Architecture for Tracking People in Real-Time Using a Video Surveill...
 
Pedestrian-traffic Logging Unit with Tailgating DetectionUsingRange Image Sensor
Pedestrian-traffic Logging Unit with Tailgating DetectionUsingRange Image SensorPedestrian-traffic Logging Unit with Tailgating DetectionUsingRange Image Sensor
Pedestrian-traffic Logging Unit with Tailgating DetectionUsingRange Image Sensor
 
Real Time Vision Hand Gesture Recognition Based Media Control via LAN & Wirel...
Real Time Vision Hand Gesture Recognition Based Media Control via LAN & Wirel...Real Time Vision Hand Gesture Recognition Based Media Control via LAN & Wirel...
Real Time Vision Hand Gesture Recognition Based Media Control via LAN & Wirel...
 

Dernier

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Dernier (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Gj3511231126

  • 1. Shubham Lavania Int. Journal of Engineering Research and Application ISSN : 2248-9622, Vol. 3, Issue 5, Sep-Oct 2013, pp.1123-1126 RESEARCH ARTICLE www.ijera.com OPEN ACCESS Human Re-Identification In Surveillance Network Shubham Lavania Department of Electronics and Communication Enginnering VIT University Vellore, India Abstract This paper presents an appearance-based model to address the human re-identification problem. Human reidentification is an important and still unsolved task in computer vision. Re-identification refers to the problem of establishing correspondence among various observations of the same subject viewed at different time instances in different camera positions. It can also be defined as the process to match persons observed in non overlapping camera views with visual features for inter-camera tracking. The ambiguity increases with the number of candidates to be distinguished. Simple temporal reasoning can simplify the problem by pruning the candidate set to be matched. In many systems there is a requirement to identify individuals or determine whether a given individual has already appeared over a network of cameras. The human appearance obtained in one camera is usually different from the ones obtained in another camera. In order to re-identify people a human signature should handle difference in illumination pose and camera parameters. The paper focuses on a new appearance model based on Mean Riemannian Covariance (MRC) patches extracted from tracks of a particular individual to capturing from a distance even at low resolution without active co-operation of subjects, has motivated us to use it for re-identification in the computer surveillance network. Keywords: Re-identification, Riemannian manifold, Human detection, Gait, Phase of motion extremely difficult. Besides, occlusions (caused by other people or objects of the scene) and selfI. INTRODUCTION occlusions (caused by body parts) make the reRecently, cameras spread out across various identification problem one of the hardest tasks in the domains that range from personal computers, video video surveillance domain. For high level analysis of games, home surveillance applications,to large surveillance video, the first step is to track the camera networks. These camera networks facility moving subjects in order to get their spatiotemporal access to sports venue, monitored environments, such information. Tracking subjects in a video captured as airports, metro stations or car parks. A natural from a single camera is usually done by the data consequence of such situation is a need for an association technique .However, effective video automated extraction of high-level semantic surveillance over a large area requires the use of information from extremely large volumes of multiple cameras. In case of overlapping cameras, recorded video data. In many surveillance systems, joint camera calibration and spatiotemporal the most desirable information is knowledge about an information help to establish the correspondence identity of a detected object. An appearance-based between subjects (Khan and Shah, 2006). But if there approach relies on modeling a human signature using is no overlap between cameras, the problem of tracking and detection results. Re-identification identity management of subjects viewed in different techniques, which exploit appearance information cameras at different time instants becomes using only one image are referred to as single-shot challenging. approaches and until now they were the most popular Identification is the process of recognizing a methods. Currently, identification accuracy is subject who has left one camera and then reappeared improved by integrating information over many in another camera. The uncertain behavior of subjects images. The methods, which employ multiple images across the ‘blind gaps’ makes the task harder.Reof the same person as a training data, are called identification techniques help to reassign the same multiple-shot approaches. As re-identification identity to a subject entering a camera that was concerns a large sets of individuals acquired from previously attached to him when exiting a previous different cameras, we need to provide a distinctive camera. Thus, re-identification extends tracking and invariant signature. This signature has to be beyond blind gaps. Spatiotemporal methods simplify based on discriminative features to allow browsing the re-identification procedure. But, they fail to the most similar signatures over a network of resolve identity when multiple persons, walking at cameras. It can be achieved by signature matching, normal velocity, exit and enter two consecutive which has to handle differences in illumination, pose cameras at the same time. To handle this situation and camera parameters. Note that, intercamera phase of motion can be used. Phase of motion is variations in lighting conditions, differences in defined as the physical shape of a person at a illumination, different camera parameters, changes in particular time instant while walking. Multiple object orientation and object pose make this task www.ijera.com 1123 | P a g e
  • 2. Shubham Lavania Int. Journal of Engineering Research and Application ISSN : 2248-9622, Vol. 3, Issue 5, Sep-Oct 2013, pp.1123-1126 persons exiting a camera at the same time are unlikely to have the same phase of motion. If the exit phase of motion and the transition time are known, the probable entry phase of motion of that person can be obtained using a phase of motion estimation model. Thus, phase of motion can resolve the ambiguity arising due to similar entry/exit time by multiplepersons. The major drawback of spatiotemporal and phase of motion based models is in the assumption on the behavior of subjects in the blind gap. The subjects are assumed to walk at normal velocity without any hindrance in the blind gap which may not always be valid in reality. In order to handle the abovementioned situations, biometric based features such as gait can be used for re-identification. Gait of a person is a periodic activity where each gait cycle covers two strides: the right foot forward and the left foot forward. Gait consists of both shape and dynamics where shape refers to physical build of a person seen in different gait phases and dynamics refers to motion dynamics of the person in a gait cycle. II. USE OF TECHNIQUES The most common way of extracting appearance models in automatic surveillance systems is by rst detection of objects in an image, and then by tracking them using different methods and strategies. We can detect and track humans using HOG-based detector and we handle color dissimilarities caused by camera illumination differences by applying histogram equalization. The Histogram of Oriented Gradient (HOG) based technique to automatically detect humans in different scenes before their visual signatures are extracted for re-identication purposes and it also uses using a Sobel convolution kernel, in a multiresolution framework. This technique was originally designed to detect faces using the assumption that facial features remain approximatively at the same location. However, locations of human silhouette features do not remain constant in templates with varying poses (e.g. knees are constantly changing position when walking).Hence the algorithm modification was proposed in the paper[3].According to it at specific locations around the human silhouette as shown in figure 2. The most dominant cells used to characterize human shapes are the 15 most dominant cells selected among 252 cells covering the human sample area as discussed in paper[8].These most dominant cells are the cells having the closest HOG vector to the mean HOG vector calculated over the vectors (of the corresponding cell) from a human www.ijera.com www.ijera.com database. The system was trained using 10; 000 positive and 20; 000 negative image samples from the NICTA database as mentioned in paper[4]. The next step basically involves the Color normalization One of the most challenging problem using the color as a feature is that images of the same object acquired under different cameras show color dissimilarities.Histogram equalization stretches a range of histogram to be as close as possible to an uniform histogram.The approach is based on the idea that among all possible histograms,an uniformly distributed histogram has maximum entropy. Maximizing the entropy of a distribution, we maximize its information and thus histogram equalization maximizes the information content of the output image. We apply the histogram equalization to each of the color channels (RGB) to maximize the entropy in each of those channels and obtain the invariant image The other technique includes the interfacing of human reidentification in video by integrating the face profile and gait the technical approach for the same is as follows like the gait recognition is an emerging biometric technology which involves people being identified purely through the analysis of the way they walk. While research is still underway, it has attracted interest as a method of identification because it is non-invasive and does not require the subject’s cooperation. Gait recognition could also be used from a distance, making it well-suited to identifying perpetrators at a crime scene. But gait recognition technology is not limited to security applications – researchers also envision medical applications for the technology. For example, recognizing changes in walking patterns early on can help to identify conditions such as Parkinson’s disease and multiple sclerosis in their earliest stages. There are two main types of gait recognition techniques currently in development. The first, gait recognition based on the automatic analysis of video imagery, is the more widely studied and attempted of the two. Video samples of the subject’s walk are taken and the trajectories of the joints and angles over time are analyzed. A mathematical model of the motion is created, and is subsequently compared against any other samples in order to determine their identity. The second method uses a radar system much like that used by police officers to identify speeding cars. The radar records the gait cycle that the various body parts of the subject create as he or she walks. This data is then compared to other samples to identify them. 1124 | P a g e
  • 3. Shubham Lavania Int. Journal of Engineering Research and Application ISSN : 2248-9622, Vol. 3, Issue 5, Sep-Oct 2013, pp.1123-1126 www.ijera.com Fig. 1. PEI images of a subject having 14 key poses. This figure basically lead the emphasis on the gait motion tracking of the person while walking in different poses and its analysis with the help phase of motion techniques. Fig. 2. Mean human image with corresponding edge magnitudes and the 15 most dominant cells. From the left: the first image shows the mean human image calculated over all positive samples in the database; the second image shows the corresponding mean edge magnitude response; the third image shows this later image superposed with the 15 most dominant cells of size 8×8 pixels. The cell bounding boxes are drawn with a color set by their most dominant edge orientation with the scheme defined in the last image. experiments show that a joint combination of these distinctive patchesconstructs a robust invariant III. CONCLUSION human signature, which can handle differences in In this paper, we have presented a recamera parameters in paper[11]. Therefore the three identification method thatis able to track moving techniques are combined together for the resubjects in different locations while observingthem identification of the human being in the surveillance through multiple non-overlapping cameras. The network and the future work will include to proposed approach is based on a combination of gait, implement the same techniques in the real world phase of motion, and the MRC model. The applications like terrorist and mob identification and spatiotemporal model islearnt in the training phase other security hazards which may occur in the public based on parameters like entry/exitlocations, places like airports, stations and malls. velocities, and transition time. Gait based feature helps insuch scenarios to re-identify him. The proposed method combining these three features is REFERENCES able to track subjects even if they change Speed, or [1] Rabiner, L.R., 1989. A tutorial on hidden stop for some time in the blind gap. The response markov models and selected applications time of the combined approach is also quite inspeech recognition. Proc. IEEE 77 (2), promising.. Another point of consideration is 257–286. occlusion, which affects the overall re-identification [2] Rahimi, A., Darrell, T., 2004. Simultaneous accuracy. Previously it has been shown that the calibration and tracking with a network of proposed MRC patchescomputed using a Riemannian non-overlapping sensors. Proc. CVPR 1, manifold theory can extract essential informationon 187–194. an appearance of a human and its variability. The www.ijera.com 1125 | P a g e
  • 4. Shubham Lavania Int. Journal of Engineering Research and Application ISSN : 2248-9622, Vol. 3, Issue 5, Sep-Oct 2013, pp.1123-1126 [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] www.ijera.com M. Farenzena, L. Bazzani, A. Perina, V. Murino, M. Cristani, Person reidentification by symmetry-driven accumulation of local features, in: CVPR, 2010. A. Yilmaz, O. Javed, M. Shah, Object tracking: A survey, ACM Computer Survey 38. doi: http://doi.acm.org/10.1145/ 1177 352.1177355 Veeraraghavan, A., Srivastava, A., RoyChowdhury, A.K., Chellappa, R., 2009. Rate- invariant recognition of humans and their activities.IEEE Trans. Image Process. 18 (6), 1326–1339. Wechsler, H., 2010. Intelligent biometric information management. Intell.Info. Manage. 2, 499–511. Huang, X., Boulgouris, N.V., 2009. Modelbased human gait recognition using fusion of features. In: Proc. IEEE Intl. Conf. on Acoustics, Speech, and Signal Processing. Pp.1469–1472. Slawomirbak,Etineecorvee,Francois Bremon Boosted human reidentification techniques using Riemannian manifolds Javed, O., Shafique, K., Rasheed, Z., Shah, M., 2008. Modeling inter-camera spacetimeand appearance relationships for tracking across non-overlapping views. Comput.Vision and Image Understanding 109, 146–162. Kale, A., Sundaresan, A., Rajagopalan, A.N., Cuntoor, N.P., Roy-Chowdhury, A.K., Kruger, V., Chellappa, R., 2004.Identification of humans using gait. IEEE Trans. Image Proc. 13, 1163–1173. Kettnaker, V., Zabih, R., 1999. Bayesian multi-camera surveillance. Proc. CVPR, 117–123. Aditi roy, Shamik sural,Jayanta Mukherjee A hierarchical approach combing gait and phase of motion with spatiotemporal model with person re-identification Khan, S.M., Shah, M., 2006. A multiview approach to tracking people in crowded scenes using a planar homography constraint. Proc. ECCV, 133–146. www.ijera.com 1126 | P a g e