University of Zagreb, Faculty of Electrical Engineering and Computing

Slides:



Advertisements
Similar presentations
Image Retrieval With Relevant Feedback Hayati Cam & Ozge Cavus IMAGE RETRIEVAL WITH RELEVANCE FEEDBACK Hayati CAM Ozge CAVUS.
Advertisements

Caroline Rougier, Jean Meunier, Alain St-Arnaud, and Jacqueline Rousseau IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 21, NO. 5,
Interactively Co-segmentating Topically Related Images with Intelligent Scribble Guidance Dhruv Batra, Carnegie Mellon University Adarsh Kowdle, Cornell.
Human Pose detection Abhinav Golas S. Arun Nair. Overview Problem Previous solutions Solution, details.
S I E M E N S C O R P O R A T E R E S E A R C H 1 1 A Seeded Image Segmentation Framework Unifying Graph Cuts and Random Walker Which Yields A New Algorithm.
GrabCut Interactive Image (and Stereo) Segmentation Carsten Rother Vladimir Kolmogorov Andrew Blake Antonio Criminisi Geoffrey Cross [based on Siggraph.
GrabCut Interactive Foreground Extraction using Iterated Graph Cuts Carsten Rother Vladimir Kolmogorov Andrew Blake Microsoft Research Cambridge-UK.
A Gimp Plugin that uses “GrabCut” to perform image segmentation
Graph-Based Image Segmentation
Stephen J. Guy 1. Photomontage Photomontage GrabCut – Interactive Foreground Extraction 1.
Texture Segmentation Based on Voting of Blocks, Bayesian Flooding and Region Merging C. Panagiotakis (1), I. Grinias (2) and G. Tziritas (3)
Human-Computer Interaction Human-Computer Interaction Segmentation Hanyang University Jong-Il Park.
GrabCut Interactive Image (and Stereo) Segmentation Joon Jae Lee Keimyung University Welcome. I will present Grabcut – an Interactive tool for foreground.
Efficient Moving Object Segmentation Algorithm Using Background Registration Technique Shao-Yi Chien, Shyh-Yih Ma, and Liang-Gee Chen, Fellow, IEEE Hsin-Hua.
CS335 Principles of Multimedia Systems Content Based Media Retrieval Hao Jiang Computer Science Department Boston College Dec. 4, 2007.
Robust Object Segmentation Using Adaptive Thresholding Xiaxi Huang and Nikolaos V. Boulgouris International Conference on Image Processing 2007.
Region-Level Motion- Based Background Modeling and Subtraction Using MRFs Shih-Shinh Huang Li-Chen Fu Pei-Yung Hsiao 2007 IEEE.
Advanced Topics in Computer Vision Spring 2006 Video Segmentation Tal Kramer, Shai Bagon Video Segmentation April 30 th, 2006.
A neural approach to extract foreground from human movement images S.Conforto, M.Schmid, A.Neri, T.D’Alessio Compute Method and Programs in Biomedicine.
SWE 423: Multimedia Systems Project #1: Image Segmentation Using Graph Theory.
Jacinto C. Nascimento, Member, IEEE, and Jorge S. Marques
Speaker: Chi-Yu Hsu Advisor: Prof. Jian-Jung Ding Leveraging Stereopsis for Saliency Analysis, CVPR 2012.
Webcam-synopsis: Peeking Around the World Young Ki Baik (CV Lab.) (Fri)
Face Detection using the Viola-Jones Method
Interactive Image Segmentation of Non-Contiguous Classes using Particle Competition and Cooperation Fabricio Breve São Paulo State University (UNESP)
3D LayoutCRF Derek Hoiem Carsten Rother John Winn.
Feature and object tracking algorithms for video tracking Student: Oren Shevach Instructor: Arie nakhmani.
Lecture 5. Morphological Image Processing. 10/6/20152 Introduction ► ► Morphology: a branch of biology that deals with the form and structure of animals.
Hands segmentation Pat Jangyodsuk. Motivation Alternative approach of finding hands Instead of finding bounding box, classify each pixel whether they’re.
Takuya Matsuo, Norishige Fukushima and Yutaka Ishibashi
Detecting Pedestrians Using Patterns of Motion and Appearance Paul Viola Microsoft Research Irfan Ullah Dept. of Info. and Comm. Engr. Myongji University.
Object Stereo- Joint Stereo Matching and Object Segmentation Computer Vision and Pattern Recognition (CVPR), 2011 IEEE Conference on Michael Bleyer Vienna.
5. SUMMARY & CONCLUSIONS We have presented a coarse to fine minimization framework using a coupled dual ellipse model to form a subspace constraint that.
Video Segmentation Prepared By M. Alburbar Supervised By: Mr. Nael Abu Ras University of Palestine Interactive Multimedia Application Development.
A Face processing system Based on Committee Machine: The Approach and Experimental Results Presented by: Harvest Jang 29 Jan 2003.
3d Pose Detection Used by Kinect
A Tutorial on using SIFT Presented by Jimmy Huff (Slightly modified by Josiah Yoder for Winter )
CS654: Digital Image Analysis Lecture 28: Advanced topics in Image Segmentation Image courtesy: IEEE, IJCV.
POSTER TEMPLATE BY: Background Objectives Psychophysical Experiment Smoothness Features Project Pipeline and outlines The purpose.
Lukáš Neumann and Jiří Matas Centre for Machine Perception, Department of Cybernetics Czech Technical University, Prague 1.
Data Mining for Surveillance Applications Suspicious Event Detection Dr. Bhavani Thuraisingham.
ESPL 1 Motivation Problem: Amateur photographers often take low- quality pictures with digital still camera Personal use Professionals who need to document.
WCPM 1 Chang-Tsun Li Department of Computer Science University of Warwick UK Image Clustering Based on Camera Fingerprints.
Implementing the By: Matthew Marsh Supervisors: Prof Shaun Bangay Mrs Adele Lobb segmentation technique as a plugin for the GIMP.
Lecture(s) 3-4. Morphological Image Processing. 3/13/20162 Introduction ► ► Morphology: a branch of biology that deals with the form and structure of.
AUTOMATING GRAB-CUT FOR SINGLE- OBJECT FOREGROUND IMAGES Eugene Weiss Computer Vision Stanford University December 14, 2011 Eugene Weiss
Rich feature hierarchies for accurate object detection and semantic segmentation 2014 IEEE Conference on Computer Vision and Pattern Recognition Ross Girshick,
Motion tracking TEAM D, Project 11: Laura Gui - Timisoara Calin Garboni - Timisoara Peter Horvath - Szeged Peter Kovacs - Debrecen.
Technological Uncanny K. S'hell, C Kurtz, N. Vincent et E. André et M. Beugnet 1.
Student Gesture Recognition System in Classroom 2.0 Chiung-Yao Fang, Min-Han Kuo, Greg-C Lee, and Sei-Wang Chen Department of Computer Science and Information.
REAL-TIME DETECTOR FOR UNUSUAL BEHAVIOR
Data Mining for Surveillance Applications Suspicious Event Detection
Marked Point Processes for Crowd Counting
Yun-FuLiu Jing-MingGuo Che-HaoChang
FORMAL SYSTEM DEVELOPMENT METHODOLOGIES
V. Mezaris, I. Kompatsiaris, N. V. Boulgouris, and M. G. Strintzis
Historic Document Image De-Noising using Principal Component Analysis (PCA) and Local Pixel Grouping (LPG) Han-Yang Tang1, Azah Kamilah Muda1, Yun-Huoy.
Dingding Liu* Yingen Xiong† Linda Shapiro* Kari Pulli†
Data Mining for Surveillance Applications Suspicious Event Detection
David Harwin Adviser: Petros Faloutsos
“The Truth About Cats And Dogs”
CS Digital Image Processing Lecture 5
PRAKASH CHOCKALINGAM, NALIN PRADEEP, AND STAN BIRCHFIELD
Hand Recognition using Geometric Classifiers
Lecture 31: Graph-Based Image Segmentation
“grabcut”- Interactive Foreground Extraction using Iterated Graph Cuts
Data Mining for Surveillance Applications Suspicious Event Detection
Saliency Optimization from Robust Background Detection
Unfolding with system identification
Department of Computer Science Ben-Gurion University of the Negev
Presentation transcript:

University of Zagreb, Faculty of Electrical Engineering and Computing Automated Segmentation of Humans in Videos for Soft- and Non-Biometric De-identification Tomislav Hrkać University of Zagreb, Faculty of Electrical Engineering and Computing Unska 3, 10 000 Zagreb, Croatia

Context: de-identification Security cameras Privacy concerns De-identification Biometric Soft biometric Non-biometric Important first step: Person detection Input: image or video sequence Persons detection Identifier segmentation Output: de- identified content De-identifying transformation

Pedestrian segmentation Output of human detector – bounding boxes around humans More precise localisation of persons needed

GrabCut algorithm Semi-authomatic algorithm Minimal user input Easily combined with background subtraction to acheive full authomatic character

GrabCut algorithm In theory – very good results In reality, however... Three types of problems: “Cutting through” at the high contrast boundary Snapping to high contrast in the background Enclosing concavities

GrabCut– how does it work? Preliminary BG and FG specs -> GMM models Segmentation as energy minimization: E = U + V Minimization by graph cuts Iterative procedure: refining BG and FG models in each step “data term” “smoothnes term”

GrabCut – details Data term: Smoothnes term:

Our modifications to GrabCut Preliminary step: find out the rough object boundary based on background subtraction followed by morphological post-processing Modified GrabCut: Weighted modeling of FG and BG Modification to the data term U to take into account preliminary classification Modification to the smoothness term V to discourage boundaries far from the preliminary boundary

Modifications – details (1/3) Weighted modeling of BG and FG Originally each pixel initially classified as BG or FG contributes equally to BG/FG GMM models Instead, we propose to build GMMs by weighting the contribution of each pixel based on its distance from the preliminary boundary

Modifications – details (2/3) Modification of the data term Originally: Modified:

Modifications – details (3/3) Modification of the smoothness term Originally: Modified:

Results (1/3) Qualitative evaluation (Left –input image; middle – GrabCut; right- our method)

Results (2/3) Quantitative evaluation (CDnet2014 Pedestrian dataset)

Results (3/3) Quantitative evaluation (CDnet2014 Pedestrian dataset)

Conclusion We proposed fully authomatic video foreground segmentation, based on GrabCut, initialized by background subtraction mask the more relevant GMM models of foreground and background are built by weighing pixel contribution depending on their distance from the boundary of the object prior the data and smoothness term of the energy equation are modified in a way that discourages placing boundaries far from the object prior boundary. Evaluation on the CDNet 2014 Pedestrian Dataset: significant improvement of recall slight drop in precision much better F1 measure Further experimentation and investigation of possible improvements needed

Acknowledgments This work has been supported by the Croatian Science Foundation, within the project “De-identification Methods for Soft and Non-Biometric Identifiers” (DeMSI, UIP-11-2013-1544), and by the COST Action IC1206 “De-Identification for Privacy Protection in Multimedia Content”. This support is gratefully acknowledged