Frogeye: Perception of the Slightest Tag Motion Lei Yang, Yong Qi, Jianbing Fang, Xuan Ding, Tianci Liu, Mo Li Tsinghua University, Xi’an Jiaotong University.

Slides:



Advertisements
Similar presentations
Bayesian Belief Propagation
Advertisements

RollCaller: User-Friendly Indoor Navigation System Using Human-Item Spatial Relation Yi Guo, Lei Yang, Bowen Li, Tianci Liu, Yunhao Liu Hong Kong University.
Whole-Home Gesture Recognition Using Wireless Signals —— MobiCom’13 Author: Qifan Pu et al. University of Washington Presenter: Yanyuan Qin & Zhitong Fei.
Selecting the right lens. They come in wide angle, telephoto and zoom. They offer a variety of apertures and handy features. They are also the key to.
BPT2423 – STATISTICAL PROCESS CONTROL
1 Video Processing Lecture on the image part (8+9) Automatic Perception Volker Krüger Aalborg Media Lab Aalborg University Copenhagen
電腦視覺 Computer and Robot Vision I Chapter2: Binary Machine Vision: Thresholding and Segmentation Instructor: Shih-Shinh Huang 1.
Abandoned Object Detection for Public Surveillance Video Student: Wei-Hao Tung Advisor: Jia-Shung Wang Dept. of Computer Science National Tsing Hua University.
Bayesian Robust Principal Component Analysis Presenter: Raghu Ranganathan ECE / CMR Tennessee Technological University January 21, 2011 Reading Group (Xinghao.
Modeling Pixel Process with Scale Invariant Local Patterns for Background Subtraction in Complex Scenes (CVPR’10) Shengcai Liao, Guoying Zhao, Vili Kellokumpu,
Motion Tracking. Image Processing and Computer Vision: 82 Introduction Finding how objects have moved in an image sequence Movement in space Movement.
Motion Detection And Analysis Michael Knowles Tuesday 13 th January 2004.
Probabilistic video stabilization using Kalman filtering and mosaicking.
Face Recognition Using Embedded Hidden Markov Model.
A neural approach to extract foreground from human movement images S.Conforto, M.Schmid, A.Neri, T.D’Alessio Compute Method and Programs in Biomedicine.
A.Kleiner*, N. Behrens** and H. Kenn** Wearable Computing meets MAS: A real-world interface for the RoboCupRescue simulation platform Motivation Wearable.
Highlights Lecture on the image part (10) Automatic Perception 16
CSE 291 Final Project: Adaptive Multi-Spectral Differencing Andrew Cosand UCSD CVRR.
Effective Gaussian mixture learning for video background subtraction Dar-Shyang Lee, Member, IEEE.
Background Subtraction for Urban Traffic Monitoring using Webcams Master Graduation Project Final Presentation Supervisor: Rein van den Boomgaard Mark.
California Car License Plate Recognition System ZhengHui Hu Advisor: Dr. Kang.
Lei Yang, Yekui Chen, Xiang-Yang Li, Chaowei Xiao, Mo Li, Yunhao Liu
Jacinto C. Nascimento, Member, IEEE, and Jorge S. Marques
RFID Object Localization Gabriel Robins and Kirti Chawla Department of Computer Science University of Virginia
Mohammed Rizwan Adil, Chidambaram Alagappan., and Swathi Dumpala Basaveswara.
Innovative RFID Localization System Bassel Tawfik.
Convolutional Neural Networks for Image Processing with Applications in Mobile Robotics By, Sruthi Moola.
OCR GCSE ICT DATA CAPTURE METHODS. LESSON OVERVIEW In this lesson you will learn about the various methods of capturing data.
Object detection, tracking and event recognition: the ETISEO experience Andrea Cavallaro Multimedia and Vision Lab Queen Mary, University of London
A Method for Modeling of Pedestrian Flow in the Obstacle Space using Laser Range Scanners Yoshitaka NAKAMURA †, Yusuke WADA ‡, Teruo HIGASHINO ‡ & Osamu.
Beyond One-dollar Mouse: A Battery-free Device for 3D Human-Computer Interaction via RFID Tags Qiongzheng Lin Lei Yang,Yuxin Sun,Tianci Liu,Xiang-Yang.
Demo. Overview Overall the project has two main goals: 1) Develop a method to use sensor data to determine behavior probability. 2) Use the behavior probability.
Tracking with Unreliable Node Sequences Ziguo Zhong, Ting Zhu, Dan Wang and Tian He Computer Science and Engineering, University of Minnesota Infocom 2009.
A Hybrid Method for achieving High Accuracy and Efficiency in Object Tracking using Passive RFID Lei Yang 1, Jiannong Cao 1, Weiping Zhu 1, and Shaojie.
1 Webcam Mouse Using Face and Eye Tracking in Various Illumination Environments Yuan-Pin Lin et al. Proceedings of the 2005 IEEE Y.S. Lee.
ICT IGCSE.  Introducing or changing a system needs careful planning  Why?
Video Segmentation Prepared By M. Alburbar Supervised By: Mr. Nael Abu Ras University of Palestine Interactive Multimedia Application Development.
Recognizing Action at a Distance Alexei A. Efros, Alexander C. Berg, Greg Mori, Jitendra Malik Computer Science Division, UC Berkeley Presented by Pundik.
Physical-layer Identification of UHF RFID Tags Authors: Davide Zanetti, Boris Danev and Srdjan Capkun Presented by Zhitao Yang 1.
The Secure, Automated Home Project Team: Alec Kulbacki Project Advisor: W. Thomas Miller.
Vehicle Segmentation and Tracking From a Low-Angle Off-Axis Camera Neeraj K. Kanhere Committee members Dr. Stanley Birchfield Dr. Robert Schalkoff Dr.
1 Research Question  Can a vision-based mobile robot  with limited computation and memory,  and rapidly varying camera positions,  operate autonomously.
Tracking and event recognition – the Etiseo experience Son Tran, Nagia Ghanem, David Harwood and Larry Davis UMIACS, University of Maryland.
Expectation-Maximization (EM) Case Studies
Figure ground segregation in video via averaging and color distribution Introduction to Computational and Biological Vision 2013 Dror Zenati.
Marketing Research Approaches. Research Approaches Observational Research Ethnographic Research Survey Research Experimental Research.
Counting How Many Words You Read
Course14 Dynamic Vision. Biological vision can cope with changing world Moving and changing objects Change illumination Change View-point.
Victoria RASCals Star Party 2003 – David Lee. Extending Human Vision Film and Sensors The Limitations of Human Vision Physiology of the Human Eye Film.
Effective Anomaly Detection with Scarce Training Data Presenter: 葉倚任 Author: W. Robertson, F. Maggi, C. Kruegel and G. Vigna NDSS
BackPos: Anchor-free Backscatter Positioning for RFID Tags with High Accuracy Tianci Liu, Lei Yang, Qiongzheng Lin, Yi Guo, Yunhao Liu.
Welcome To Digibroadcast Company Limited. We are authorised dealer of Panasonic Camcorder, buying through DigiBroadcast will remain a fruitful purchase.
Portable Camera-Based Assistive Text and Product Label Reading From Hand-Held Objects for Blind Persons.
General Lab Report Instructions The speed of light and radio wave propagation.
Motion tracking TEAM D, Project 11: Laura Gui - Timisoara Calin Garboni - Timisoara Peter Horvath - Szeged Peter Kovacs - Debrecen.
Motion Estimation of Moving Foreground Objects Pierre Ponce ee392j Winter March 10, 2004.
Over the recent years, computer vision has started to play a significant role in the Human Computer Interaction (HCI). With efficient object tracking.
Student Gesture Recognition System in Classroom 2.0 Chiung-Yao Fang, Min-Han Kuo, Greg-C Lee, and Sei-Wang Chen Department of Computer Science and Information.
Experience Report: System Log Analysis for Anomaly Detection
Heechul Han and Kwanghoon Sohn
Image quality and Performance Characteristics
RF2ID: A Reliable Middleware Framework for RFID Deployment
Injong Rhee ICMCS’98 Presented by Wenyu Ren
OCR GCSE ICT Data capture methods.
Enhanced-alignment Measure for Binary Foreground Map Evaluation
A New Approach to Track Multiple Vehicles With the Combination of Robust Detection and Two Classifiers Weidong Min , Mengdan Fan, Xiaoguang Guo, and Qing.
Combating Tag Cloning with COTS RFID Devices
How clearly does your work flow and tell a story?
RFID Object Localization
RIO: A Pervasive RFID-based Touch Gesture Interface
Presentation transcript:

Frogeye: Perception of the Slightest Tag Motion Lei Yang, Yong Qi, Jianbing Fang, Xuan Ding, Tianci Liu, Mo Li Tsinghua University, Xi’an Jiaotong University INFOCOM

Background – RFID technology TAGSREADERApplications

RFID Overview Portal Conveyor/Assembly line Access control Livestock Payment devices Logistics Passport Automobile immobilizers 5¢5¢

MOTIVATION – SECURING VALUABLE OBJECTS  The most common solution is to equip artifacts with various security sensors, such as displacement sensor, tension sensor, vibration sensors and so on. As long as the artifacts are moved, alert is reported.  These sensors are very expensive and difficult to be deployed.  Camera surveillance is another attractive option  Suffer from dead corners and dependence of the light.  The most common solution is to equip artifacts with various security sensors, such as displacement sensor, tension sensor, vibration sensors and so on. As long as the artifacts are moved, alert is reported.  These sensors are very expensive and difficult to be deployed.  Camera surveillance is another attractive option  Suffer from dead corners and dependence of the light. The Art of Securing Pricelessness

MOTIVATION – MINING CONSUMER’S BEHAVIOR What are the really popular products?  In an effort to help supermarkets understand their consumer’s shopping behaviors, a large number of data mining techniques have been studied.  However, those technique are confined to the purchased data.  In most of time, the consumer takes their interested goods off the shelf for details but does not purchase them finally due to price.  RFID technology offers an opportunity to collect these behaviors.

How to perceive the tag’s motion? At first glance, there is no any connection between the above two scenarios. Actually, both of them focus on the surveillance of tag motions: The first needs an alert when valuable objects are moved; the second requires behavior records when the products are taken off the shelf. Our goal is to perceive the tag’s motion to determine whether the object is moved. Our approach is not for localization

Opportunity – Being hypersensitive

Challenge – The Weak Stability Observation 2: The result is not as stable as expected, because the value occupies several units even when the tag remains in a same distance. We call this phenomenon weak stability. Observation 2: The result is not as stable as expected, because the value occupies several units even when the tag remains in a same distance. We call this phenomenon weak stability.

Which causes the weak stability Which causes the weak stability ? Thermal vibration: The electronic component’s thermal noise brings strength changes. Interference: when the strength is interfered, its changes are as significant as when the tag is moved. It is easy to mistakenly consider a stationary object moved.

Modeling the Thermal Vibration Gaussian Model : We believe this model is reasonable because a lot of natured phenomena follows the Gaussian distribution, especially thermal noise from internal electronic components, which mainly contribute the vibration.

Modeling the Interference This phenomenon is mainly explained by the multipath effect. There exist several paths for the backscattered signal propagating from tag to reader. The signal strength propagating through different paths varies a lot due to the path length. When the interference object gets close to the tag, it may block some propagation paths and leads to the propagation jumping among the multiple paths, resulting in the strength transmission from one level to another.

Modeling the Interference From a long-term perspective, the strength exhibits multimodal characteristics where the distribution is likely composed of multiple Gaussian models.

Basic Idea Our basic idea is to detect the ‘significant’ changes of the backscattered signal for perception of tag motion. There is a high probability that the tag moved when its strength changed significantly. We find our problem is very similar to the foreground detection in computer vision, which is to segment the foreground pixels that “significantly differ” between the last image of sequence and the previous images.

Workflow

Preprocessing

Strength Image Construction In the image, each row is uniquely mapped to a same tag. The mapping fashion between the tags and rows is arbitrary as long as their mapping remains constant during the processing. Each column represents a read cycle. The whole image contains a total of m columns. Formally, given a strength image, the element x_ij represents a read strength from the tag i collected in the j^th read cycle of the frame. In the image, each row is uniquely mapped to a same tag. The mapping fashion between the tags and rows is arbitrary as long as their mapping remains constant during the processing. Each column represents a read cycle. The whole image contains a total of m columns. Formally, given a strength image, the element x_ij represents a read strength from the tag i collected in the j^th read cycle of the frame.

Why we convert the strength flow to a visual image? No any connections between them??

RATIONALE BEHIND Optical System RFID System

MOTION DETECTION IN COMPUTER VISION Frame Differencing The result is interesting and inspiring

MoG based Foreground Detection Background learning Background detecting frames The details can be referred to the paper.

Motion Refining – collateral motion

Implementation & Evaluation We deploy one reader and 100 tags our noisy office room to evaluate the false positives. We attach tags on a toy train to measure the false negatives. The train moves along an oval track in a constant speed.

Evaluation the accuracy is up to 92.34% while the false positive is suppressed under 0.5%.

Sensitivity The average Minimum Perception displacement equals 6cm.

Evaluation

Conclusion  In this paper, our major contributions are summarized as follows:  We conduct statistical analysis of strength collected in a real-life office, showing that the strength are hypersensitive to tags’ positions, but suffers from weak stability where the strength values are highly clustered in a small range due to thermal noise, and enhanced or weakened due to multi-path effect. We present a MOG method to characterize the weak stability.  We propose Frogeye, to perceive the sight of the tag motion. This approach takes a snapshot of tags’ positions through their backscattered strength very several read cycles, producing a sequence of strength frames.  We implement the system using pure COTS RFID devices and evaluate it at various parameter choices.

Thanks ! Q&A