Professor: S. J. Wang Student : Y. S. Wang

Slides:



Advertisements
Similar presentations
Context-based object-class recognition and retrieval by generalized correlograms by J. Amores, N. Sebe and P. Radeva Discussion led by Qi An Duke University.
Advertisements

Face Alignment by Explicit Shape Regression
Presented by Xinyu Chang
A NOVEL LOCAL FEATURE DESCRIPTOR FOR IMAGE MATCHING Heng Yang, Qing Wang ICME 2008.
Learning Visual Similarity Measures for Comparing Never Seen Objects Eric Nowak, Frédéric Jurie CVPR 2007.
Mixture of trees model: Face Detection, Pose Estimation and Landmark Localization Presenter: Zhang Li.
Announcements Final Exam May 13th, 8 am (not my idea).
University of Pennsylvania 1 GRASP CIS 580 Machine Perception Fall 2004 Jianbo Shi Object recognition.
Metrics, Algorithms & Follow-ups Profile Similarity Measures Cluster combination procedures Hierarchical vs. Non-hierarchical Clustering Statistical follow-up.
Groups of Adjacent Contour Segments for Object Detection Vittorio Ferrari Loic Fevrier Frederic Jurie Cordelia Schmid.
Ghunhui Gu, Joseph J. Lim, Pablo Arbeláez, Jitendra Malik University of California at Berkeley Berkeley, CA
Contour Based Approaches for Visual Object Recognition Jamie Shotton University of Cambridge Joint work with Roberto Cipolla, Andrew Blake.
Object Detection by Matching Longin Jan Latecki. Contour-based object detection Database shapes: …..
Student: Yao-Sheng Wang Advisor: Prof. Sheng-Jyh Wang ARTICULATED HUMAN DETECTION 1 Department of Electronics Engineering National Chiao Tung University.
Content Based Image Clustering and Image Retrieval Using Multiple Instance Learning Using Multiple Instance Learning Xin Chen Advisor: Chengcui Zhang Department.
Recognition using Regions CVPR Outline Introduction Overview of the Approach Experimental Results Conclusion.
Hierarchical Region-Based Segmentation by Ratio-Contour Jun Wang April 28, 2004 Course Project of CSCE 790.
Announcements Final Exam May 16 th, 8 am (not my idea). Practice quiz handout 5/8. Review session: think about good times. PS5: For challenge problems,
A new face detection method based on shape information Pattern Recognition Letters, 21 (2000) Speaker: M.Q. Jing.
1 Interest Operators Find “interesting” pieces of the image –e.g. corners, salient regions –Focus attention of algorithms –Speed up computation Many possible.
1 Learning to Detect Objects in Images via a Sparse, Part-Based Representation S. Agarwal, A. Awan and D. Roth IEEE Transactions on Pattern Analysis and.
A Study of Approaches for Object Recognition
Generic Object Detection using Feature Maps Oscar Danielsson Stefan Carlsson
1 Interest Operator Lectures lecture topics –Interest points 1 (Linda) interest points, descriptors, Harris corners, correlation matching –Interest points.
Object Class Recognition Using Discriminative Local Features Gyuri Dorko and Cordelia Schmid.
Fitting a Model to Data Reading: 15.1,
Student: Hsu-Yung Cheng Advisor: Jenq-Neng Hwang, Professor
Cliff Rhyne and Jerry Fu June 5, 2007 Parallel Image Segmenter CSE 262 Spring 2007 Project Final Presentation.
Image Matching via Saliency Region Correspondences Alexander Toshev Jianbo Shi Kostas Daniilidis IEEE Conference on Computer Vision and Pattern Recognition.
Predicting Matchability - CVPR 2014 Paper -
Multiple Object Class Detection with a Generative Model K. Mikolajczyk, B. Leibe and B. Schiele Carolina Galleguillos.
1 Interest Operators Find “interesting” pieces of the image Multiple possible uses –image matching stereo pairs tracking in videos creating panoramas –object.
(Fri) Young Ki Baik Computer Vision Lab.
כמה מהתעשייה? מבנה הקורס השתנה Computer vision.
Distinctive Image Features from Scale-Invariant Keypoints By David G. Lowe, University of British Columbia Presented by: Tim Havinga, Joël van Neerbos.
Data mining and machine learning A brief introduction.
1 Interest Operators Harris Corner Detector: the first and most basic interest operator Kadir Entropy Detector and its use in object recognition SIFT interest.
Recognition and Matching based on local invariant features Cordelia Schmid INRIA, Grenoble David Lowe Univ. of British Columbia.
Presented by Tienwei Tsai July, 2005
Jifeng Dai 2011/09/27.  Introduction  Structural SVM  Kernel Design  Segmentation and parameter learning  Object Feature Descriptors  Experimental.
1 Lecture 10 Clustering. 2 Preview Introduction Partitioning methods Hierarchical methods Model-based methods Density-based methods.
Building local part models for category-level recognition C. Schmid, INRIA Grenoble Joint work with G. Dorko, S. Lazebnik, J. Ponce.
A Statistical Approach to Speed Up Ranking/Re-Ranking Hong-Ming Chen Advisor: Professor Shih-Fu Chang.
Spatio-temporal constraints for recognizing 3D objects in videos Nicoletta Noceti Università degli Studi di Genova.
Automatic Minirhizotron Root Image Analysis Using Two-Dimensional Matched Filtering and Local Entropy Thresholding Presented by Guang Zeng.
80 million tiny images: a large dataset for non-parametric object and scene recognition CS 4763 Multimedia Systems Spring 2008.
Chapter 9 DTW and VQ Algorithm  9.1 Basic idea of DTW  9.2 DTW algorithm  9.3 Basic idea of VQ  9.4 LBG algorithm  9.5 Improvement of VQ.
School of Engineering and Computer Science Victoria University of Wellington Copyright: Peter Andreae, VUW Image Recognition COMP # 18.
21 June 2009Robust Feature Matching in 2.3μs1 Simon Taylor Edward Rosten Tom Drummond University of Cambridge.
Human pose recognition from depth image MS Research Cambridge.
Local invariant features Cordelia Schmid INRIA, Grenoble.
Genetic algorithms (GA) for clustering Pasi Fränti Clustering Methods: Part 2e Speech and Image Processing Unit School of Computing University of Eastern.
CVPR2013 Poster Detecting and Naming Actors in Movies using Generative Appearance Models.
Ivica Dimitrovski 1, Dragi Kocev 2, Suzana Loskovska 1, Sašo Džeroski 2 1 Faculty of Electrical Engineering and Information Technologies, Department of.
Zeidat&Eick, MLMTA, Las Vegas K-medoid-style Clustering Algorithms for Supervised Summary Generation Nidal Zeidat & Christoph F. Eick Dept. of Computer.
Category Independent Region Proposals Ian Endres and Derek Hoiem University of Illinois at Urbana-Champaign.
Machine Learning and Data Mining Clustering (adapted from) Prof. Alexander Ihler TexPoint fonts used in EMF. Read the TexPoint manual before you delete.
Object Recognition by Discriminative Combinations of Line Segments and Ellipses Alex Chia ^˚ Susanto Rahardja ^ Deepu Rajan ˚ Maylor Leung ˚ ^ Institute.
Multi-view Traffic Sign Detection, Recognition and 3D Localisation Radu Timofte, Karel Zimmermann, and Luc Van Gool.
SUMMERY 1. VOLUMETRIC FEATURES FOR EVENT DETECTION IN VIDEO correlate spatio-temporal shapes to video clips that have been automatically segmented we.
Genetic Algorithms for clustering problem Pasi Fränti
Does one size really fit all? Evaluating classifiers in a Bag-of-Visual-Words classification Christian Hentschel, Harald Sack Hasso Plattner Institute.
Deformation Modeling for Robust 3D Face Matching Xioguang Lu and Anil K. Jain Dept. of Computer Science & Engineering Michigan State University.
S.R.Subramanya1 Outline of Vector Quantization of Images.
Shape matching and object recognition using shape contexts
TOP DM 10 Algorithms C4.5 C 4.5 Research Issue:
CSE 455 – Guest Lectures 3 lectures Contact Interest points 1
PRAKASH CHOCKALINGAM, NALIN PRADEEP, AND STAN BIRCHFIELD
Introduction to Object Tracking
Recognition and Matching based on local invariant features
Presentation transcript:

Professor: S. J. Wang Student : Y. S. Wang Object Recognition by Discriminative Combinations of Line Segments, Ellipses and Appearance Features Professor: S. J. Wang Student : Y. S. Wang

Outline Background System Overview Shape-Token Code-Book of Shape-Token Code-Word Combination Hybrid Detector Experimental Result Conclusion 這是今天的outline,首先我會介紹為何會有這篇論文,這篇論文的目標,會遇到的困難,本篇論文所提出的方法。 本篇論文所reference到的方法,最後在介紹一些實驗結果,以及conclusion。

Background Contour Based Detection Method Problem of Contour Fragment: Storage requirement is large for training. Slow matching speed. Not scale invariant. Solution provided is Shape-Token.

System Overview

Shape Token What is Shape-Tokens? Constructing Shape-Tokens Describing Shape-Tokens Matching Shape-Tokens

What is Shape-Tokens? Use the combination of line and ellipse to represent the contour fragments. Line for line. Ellipse for curve. Example: Why shape-tokens? Several parameters are enough for us to describe the contour fragment.

Constructing Shape-Tokens Extract Shape Primitives of line segments and ellipses by [16] [17]. Pairing reference primitive to its neighboring primitive. Different type combination: Take ellipse as reference. Same type combination: Consider each as reference in turn. Three types of Shape-Tokens: Line-Line, Ellipse-Line, Ellipse-Ellipse.

Constructing Shape-Tokens Line-Line Combine neighboring line which has any point falling in trapezium searching area. Ellipse-Line & Ellipse-Ellipse Circular Search Area. Consider primitives has any point within searching area and weakly is connected to reference ellipse. Ellipse的neighbor需要兩個條件,第一個必須有point存在於search area裡,第二個是weakly connected的特性 此特性是指今天先把整張map都用前面提到的梯形方法來做相連形成LEM(line edge map),然後某一線段可在LEM上找到一條path與橢圓相連接,則稱這條線滿足weak connectivity。 Indep. with orientation to avoid missing neighbors when pose of an object changes.

Describing Shape-Tokens 𝜽 : Orientation of a Primitive. 𝒗 𝒙 𝒗 𝒚 : Unit vector from center of reference primitive to center of its neighbor. 𝒉 : Distance between centers of primitives. 𝒍 𝒘 : Length and Width for each primitives.

Matching Shape-Tokens Dissimilarity Measure (Shape Distance)

Matching Shape-Tokens More general for multiple scale matching Normalize descriptor against object scale 𝑏 𝑠

Codebook of Shape-Tokens Extracting Shape-Tokens inside bounding boxes of training images. Producing Code-words Clustering by Shape Clustering by Relative Positions Selecting representative code-words into codebook for specific target object.

K-Medoid Method Similar to the k-means method. Procedure: Randomly select k of the n data points as medoids. Associate each data point to the closest medoid. For each medoid m For each non-medoid data point o Swap m and o and compute the total cost of the configuration. Select the configuration with the lowest cost. Repeat the steps above until there is no change in the medoid.

K-Medoid Method First two steps

K-Medoid Method Third to Fourth step

Clustering by Shape Method: Use k-medoid method to cluster the shape- tokens for each type separately. Repeat the step above until the dissimilarity value for each cluster is lower then a specific threshold. Metric: Dissimilarity Value: average shape distance between the medoid and its members. Threshold: 20% of the maximum of D(.).

Clustering by relative positions Target: Partition the clusters obtained from previous step by 𝑥 to attain sub-clusters whose members have similar shape and position relative to the centroid of object. 𝑥 : vector direct from object centroid to the shape-token centroid. Method: Mean-Shift.

Candidate Code-Word 𝜑 Medoid for each sub-cluster. Parameters: Shape Distance Threshold 𝜏 : Mean shape distance of the cluster plus one standard deviation. Relative Position Center 𝑐 : Mean of vectors 𝑥 of the sub-clusters members. Radius 𝑟 : Euclidean distance between 𝑐 to 𝑥 of each sub-cluster member plus one standard deviation.

Candidate Code-Words Example: the Weizmann horse dataset.

Selecting Candidates into Codebook Intuition: Size of cluster. Problem: Lots of selected candidates belong to background clutter. What kind of candidates we prefer ? Distinctive Shape. Flexible enough to accommodate intra-class variations. Precise Location for its members.

Selecting Candidates into Codebook Instead of using cluster size directly, the author scores each candidate by a product “𝑡” consists of three values. Intra-cluster shape similarity value “𝑑−𝜏” where 𝑑 is the maximum of the range of shape distance for the type of candidate currently considered. The number of unique training bounding boxes its members are extracted from. Its value of 1 𝑟 .

Selecting Candidates into Codebook One more problem left: If use 𝑡 to choose the candidate directly, it may cause not ideal spatial distribution. Solution: Radial Ranking Method

Selecting Candidates into Codebook Example: the Weizmann horse dataset.

Code-Word Combination Why code-word combination ? One can use a single code-word that is matched in test image to predict object location. => Less discriminative and easy to matched in background. Instead, a combination of several code-words can be more discriminative.

Code-Word Combination Matching a code-word combination Way to match code-word combination. Finding all matched code-word combinations in training images Exhaustive set of code-word combinations. Learning discriminative xCC (x-codeword combination)

Matching a Code-Word Combination Criteria: Shape Constraint : Shape distance between each code-word and shape-token in image should be less then shape distance threshold 𝜏 . Geometric Constraint: Centroid prediction by all code-words in the combination concur.

Matching a Code-Word Combination Example:

Finding all matched code-word combinations in training images Goal: Finding an exhaustive set of possible candidates of code-word combinations. Method: (Similar to Sliding-Window Search) For each candidate window at scale 𝑠 and location 𝑥 in image I, we try to find there is any match for each code-word or not. And the combination of each matched code-word will be a possible combination candidate.

Finding all matched code-word combinations in training images Specify a variable 𝑅 𝑖 ( 𝑠 , 𝑥 ) to represent the matching condition of a specific code- word 𝛾 𝑖 .

Finding all matched code-word combinations in training images If 𝑅 𝑖 ( 𝑠 , 𝑥 )< ∞ ,then we say that the code-word 𝛾 𝑖 is matched at scale 𝑠 and location 𝑥 . Any combination of these matched code- word will produce a candidate combination. Why not consider the geometric constraint?

Finding all matched code-word combinations in training images

Learning Discriminative xCC We’d like to obtain a xCC which satisfies the following three constraint. Shape Constraint : Highly related Code-Book Establishment Geometric Constraint: Object Location Agreement. Structural Constraint : Reasonable code-word combination for different poses of object.

Learning Discriminative xCC Example:

Learning Discriminative xCC Binary Tree to represent a xCC. Each node is a decision statement:

Learning Discriminative xCC AdaBoost Training Procedure to produce one xCC from each iteration. The Binary Tree depth “k” can be obtained by 3-fold cross validation.

Learning Discriminative xCC Example:

Learning Discriminative xCC Example:

Learning Discriminative xCC Example:

Hybrid Detector xMCC Incorporating SIFT as appearance information to enhance the performance. Procedure: (same as previous section)

Hybrid Detector xMCC Example:

Hybrid Detector xMCC Example:

Hybrid Detector xMCC Example:

Experimental Result Contour only result under viewpoint change. (train on side-view only)

Experimental Result Contour only result for discriminating similar shape object classes.

Experimental Result Compare with Shotton [6] on Weizmann Horse test set. Shotton [6]: Use contour fragment, fixed number of code-words for each combination.

Experimental Result Weizmann Horse Test Set.

Experimental Result Graz-17 classes.

Experimental Result Graz-17 dataset.

Experimental Result Hybrid-Method result

Conclusion This article provide a contour based method that exploits very simple and generic shape primitives of line segments and ellipses for image classification and object detection. Novelty: Shape-Token to reduce the time cost for matching and the need of memory storage. No restriction on the number of shape-tokens for combinations. Allow combination of different feature types.