Human Identification From a Distance D. Adjeroh, B. Cukic, M. Gautam, L. Hornak, A. Ross Lane Department of CSEE West Virginia University NC-BSI, December.

Slides:



Advertisements
Similar presentations
L. Nadel – Intl Workshop on Usability and Biometrics June 23-24, Usability Considerations for Face Image Capture at U.S. Ports of Entry NIST International.
Advertisements

By: Mani Baghaei Fard.  During recent years number of moving vehicles in roads and highways has been considerably increased.
ETISEO Project Corpus data - Video sequences contents - Silogic provider.
Kien A. Hua Division of Computer Science University of Central Florida.
Face Recognition. Introduction Why we are interested in face recognition? Why we are interested in face recognition? Passport control at terminals in.
It’s 5 times greater. It’s 10 times greater. It’s 20 times greater.
Sequence-to-Sequence Alignment and Applications. Video > Collection of image frames.
By : Adham Suwan Mohammed Zaza Ahmed Mafarjeh. Achieving Security through Kinect using Skeleton Analysis (ASKSA)
Kernel-based tracking and video patch replacement Igor Guskov
IIIT Hyderabad Pose Invariant Palmprint Recognition Chhaya Methani and Anoop Namboodiri Centre for Visual Information Technology IIIT, Hyderabad, INDIA.
3D M otion D etermination U sing µ IMU A nd V isual T racking 14 May 2010 Centre for Micro and Nano Systems The Chinese University of Hong Kong Supervised.
Global Security. OVERVIEW Discoverii represents day/night vision technology platform that combines an innovative, near infra-red, continuous-wave laser.
Recognition of Traffic Lights in Live Video Streams on Mobile Devices
A Study of Approaches for Object Recognition
Multiple View Geometry Marc Pollefeys University of North Carolina at Chapel Hill Modified by Philippos Mordohai.
Comparison and Combination of Ear and Face Images in Appearance-Based Biometrics IEEE Trans on PAMI, VOL. 25, NO.9, 2003 Kyong Chang, Kevin W. Bowyer,
Biomedical Image Analysis and Machine Learning BMI 731 Winter 2005 Kun Huang Department of Biomedical Informatics Ohio State University.
A Brief Survey on Face Recognition Systems Amir Omidvarnia March 2007.
Dan Schonfeld Co-Director, Multimedia Communications Laboratory Professor, Departments of ECE, CS & Bioengineering University of Illinois at Chicago.
Evaluation of Viewport Size and Curvature of Large, High-Resolution Displays Lauren Shupp, Robert Ball, John Booker, Beth Yost, Chris North Virginia Polytechnic.
Computer Vision and Data Mining Research Projects Longin Jan Latecki Computer and Information Sciences Dept. Temple University
Distinctive Image Features from Scale-Invariant Keypoints By David G. Lowe, University of British Columbia Presented by: Tim Havinga, Joël van Neerbos.
G52IIP, School of Computer Science, University of Nottingham What we will learn … Topics relate to the use of computer to Acquire/generate Process/manipulate/store.
Components of a computer vision system
Fault Tolerant Sensor Network for Border Activity Detection B. Cukic, V. Kulathumani, A. Ross Lane Department of CSEE West Virginia University NC-BSI,
Image Formation. Input - Digital Images Intensity Images – encoding of light intensity Range Images – encoding of shape and distance They are both a 2-D.
Zhengyou Zhang Microsoft Research Digital Object Identifier: /MMUL Publication Year: 2012, Page(s): Professor: Yih-Ran Sheu Student.
Vehicle License Plate Detection Algorithm Based on Statistical Characteristics in HSI Color Model Instructor : Dr. K. R. Rao Presented by: Prasanna Venkatesh.
Video Based Palmprint Recognition Chhaya Methani and Anoop M. Namboodiri Center for Visual Information Technology International Institute of Information.
Digital Image Processing & Analysis Dr. Samir H. Abdul-Jauwad Electrical Engineering Department King Fahd University of Petroleum & Minerals.
Biometric Measures for Human Identification
Factors affecting CT image RAD
1 Digital Image Processing Dr. Saad M. Saad Darwish Associate Prof. of computer science.
80 million tiny images: a large dataset for non-parametric object and scene recognition CS 4763 Multimedia Systems Spring 2008.
Team 5 Wavelets for Image Fusion Xiaofeng “Sam” Fan Jiangtao “Willy” Kuang Jason “Jingsu” West.
Computer Vision Lecture #10 Hossam Abdelmunim 1 & Aly A. Farag 2 1 Computer & Systems Engineering Department, Ain Shams University, Cairo, Egypt 2 Electerical.
Tracking and event recognition – the Etiseo experience Son Tran, Nagia Ghanem, David Harwood and Larry Davis UMIACS, University of Maryland.
Image Registration with Hierarchical B-Splines Z. Xie and G. Farin.
March 31, 1998NSF IDM 98, Group F1 Group F Multi-modal Issues, Systems and Applications.
Soft Biometrics 苏毅婧. Outline Introduction Application Case study.
Telescopes Resolution - Degree to which fine detail can be distinguished Resolution - Degree to which fine detail can be distinguished Fundamentally an.
Multimedia Systems and Communication Research Multimedia Systems and Communication Research Department of Electrical and Computer Engineering Multimedia.
NC-BSI: TASK 3.5: Reduction of False Alarm Rates from Fused Data Problem Statement/Objectives Research Objectives Intelligent fusing of data from hybrid.
Data Mining for Surveillance Applications Suspicious Event Detection Dr. Bhavani Thuraisingham.
WCPM 1 Chang-Tsun Li Department of Computer Science University of Warwick UK Image Clustering Based on Camera Fingerprints.
Real-Time Lens Blur Effects and Focus Control Sungkil Lee, Elmar Eisemann, and Hans-Peter Seidel Sunyeong Kim Nov. 23 nd
Properties of Telescopes. Magnification Magnification is how much larger an image in a telescope is when compared to when the object is seen by the naked.
1 05 December 2008 Still Face Challenge Problem Multiple Biometric Grand Challenge Preliminary Results of Version 1.
1שידור ווידיאו ואודיו ברשת האינטרנט Dr. Ofer Hadar Communication Systems Engineering Department Ben-Gurion University of the Negev URL:
Visual Information Processing. Human Perception V.S. Machine Perception  Human perception: pictorial information improvement for human interpretation.
REAL-TIME DETECTOR FOR UNUSUAL BEHAVIOR
Data Mining for Surveillance Applications Suspicious Event Detection
High Resolution Cameras
Intelligent Face Recognition
Deeply learned face representations are sparse, selective, and robust
Spatio-temporal Segmentation of Video by Hierarchical Mean Shift Analysis Daniel DeMenthon SMVP 2002.
EE663-Digital Image Processing & Analysis Dr. Samir H
TS5 vs TS3 (Lince vs Lupa) 5µ pixel vs 14µ pixel June 2016.
Factors that Influence the Geometric Detection Pattern of Vehicle-based Licence Plate Recognition Systems Martin Rademeyer Thinus Booysen, Arno Barnard.
Data Mining for Surveillance Applications Suspicious Event Detection
Security Systems Business Division Panasonic System Networks Co., Ltd.
Introduction Computer vision is the analysis of digital images
Reflections Reflect the object in the x axis
What is this, or what are these?
Data Mining for Surveillance Applications Suspicious Event Detection
IT523 Digital Image Processing
Introduction Computer vision is the analysis of digital images
Unrolling the shutter: CNN to correct motion distortions
Presentation transcript:

Human Identification From a Distance D. Adjeroh, B. Cukic, M. Gautam, L. Hornak, A. Ross Lane Department of CSEE West Virginia University NC-BSI, December 2008

NC – BSI Problem Statement Surveillance datasets acquired at border zones offer an opportunity to recognize individuals from a distance rather than requiring close visual inspection. The project will develop methods for human identification from surveillance videos. Methodology Develop a hierarchical approach to human recognition from a distance. Define event clustering in joint biometric – surveillance space. Search methods: from events to biometric profiles and vice versa.

NC – BSI Image Quality at a Distance High Sensitivity to Motion blur: because of long focal distance Out-of-focus Blur: because of small DOF Distortion due to lens Low pixel count: (sensor resolution is limited) Magnification blur (due to high magnification) (66×, 50m) (109×, 100m)(153×, 150m)(284×, 300m) Note: (magnification, distance) approximately the same resolution: 60 pixels between the eyes.

NC – BSI Surveillance Applications Outdoor Location 100x – 100m75x – 50m 200x – 200m300x – 300m Range finder Telescope

NC – BSI Effect of Frame Resolution Rank 1 CMC curves 60 pixels 35 pixels 85 pixels 10x, 52f10x, 31f15x, 31f

NC – BSI Effect of Illumination CMCs Rank 1 100% roof light50% roof lightNo roof light Degradations in high magnification images: Sensor noise Magnification blur Motion blur Out of focus blur Zoom blur Atmospheric blur Illumination Contrast Resolution Probes: 20x magnification 52 feet, 50 pixels inter-eye distance

NC – BSI Soft biometric traits Jain et al, “Utilizing soft biometric traits for person authentication”, Proc. International Conference on Biometric Authentication (ICBA), Hong Kong, July 2004

NC – BSI Combining Face & Soft Biometrics

NC – BSI Human Metrology 2D Model –Available from video –Possible multiple views in surveillance MAT Representation –Medial Axis Transform –Less detailed, but may be adequate for required representation Decorated MAT Representation (for 2D) MAT Representation (1D) Multiresolution MATs 2D measurements superimposed on 3D images (3D images from Allen et al, 2004)

NC – BSI Extending the Application Envelope: Virtual Identities in Space/Time Correlate Two Surveillance Videos Between Aldgate East and Liverpool Street tube stations Between Russell Square and King's Cross tube stations At Edgware Road tube station On bus at Tavistock Square

NC – BSI Extending the Application Envelope (2)

NC – BSI Biometric Surveillance Space

NC – BSI Decomposing a Video Stream

NC – BSI Retrieval/Analysis Paradigms

NC – BSI Leverage The Center for Identification Technology Research (NSF I/UCRC). Biometrics: Performance, Security and Social Impact, (NSF and DHS – Human Factors) Biometric recognition from video streams, data collection. Night time biometrics (ONR). Video/image compression.

NC – BSI Deliverables Years 2-6: Architecture of the joint identity-surveillance space, Efficient segmentation and labeling algorithms, Fusion algorithms for identification from surveillance video, Storage and retrieval architecture. System evaluation.