Boosting-Based Face Detection and Adaptation

Boosting-Based Face Detection and Adaptation

Author: Matthieu Salzmann

Publisher: Springer Nature

Published: 2022-06-01

Total Pages: 132

ISBN-13: 3031018095

DOWNLOAD EBOOK

Face detection, because of its vast array of applications, is one of the most active research areas in computer vision. In this book, we review various approaches to face detection developed in the past decade, with more emphasis on boosting-based learning algorithms. We then present a series of algorithms that are empowered by the statistical view of boosting and the concept of multiple instance learning. We start by describing a boosting learning framework that is capable to handle billions of training examples. It differs from traditional bootstrapping schemes in that no intermediate thresholds need to be set during training, yet the total number of negative examples used for feature selection remains constant and focused (on the poor performing ones). A multiple instance pruning scheme is then adopted to set the intermediate thresholds after boosting learning. This algorithm generates detectors that are both fast and accurate. We then present two multiple instance learning schemes for face detection, multiple instance learning boosting (MILBoost) and winner-take-all multiple category boosting (WTA-McBoost). MILBoost addresses the uncertainty in accurately pinpointing the location of the object being detected, while WTA-McBoost addresses the uncertainty in determining the most appropriate subcategory label for multiview object detection. Both schemes can resolve the ambiguity of the labeling process and reduce outliers during training, which leads to improved detector performances. In many applications, a detector trained with generic data sets may not perform optimally in a new environment. We propose detection adaption, which is a promising solution for this problem. We present an adaptation scheme based on the Taylor expansion of the boosting learning objective function, and we propose to store the second order statistics of the generic training data for future adaptation. We show that with a small amount of labeled data in the new environment, the detector's performance can be greatly improved. We also present two interesting applications where boosting learning was applied successfully. The first application is face verification for filtering and ranking image/video search results on celebrities. We present boosted multi-task learning (MTL), yet another boosting learning algorithm that extends MILBoost with a graphical model. Since the available number of training images for each celebrity may be limited, learning individual classifiers for each person may cause overfitting. MTL jointly learns classifiers for multiple people by sharing a few boosting classifiers in order to avoid overfitting. The second application addresses the need of speaker detection in conference rooms. The goal is to find who is speaking, given a microphone array and a panoramic video of the room. We show that by combining audio and visual features in a boosting framework, we can determine the speaker's position very accurately. Finally, we offer our thoughts on future directions for face detection. Table of Contents: A Brief Survey of the Face Detection Literature / Cascade-based Real-Time Face Detection / Multiple Instance Learning for Face Detection / Detector Adaptation / Other Applications / Conclusions and Future Work


Face Detection and Adaptation

Face Detection and Adaptation

Author: Cha Zhang

Publisher: Morgan & Claypool Publishers

Published: 2010-10-10

Total Pages: 140

ISBN-13: 1608451348

DOWNLOAD EBOOK

Face detection, because of its vast array of applications, is one of the most active research areas in computer vision. In this book, we review various approaches to face detection developed in the past decade, with more emphasis on boosting-based learning algorithms. We then present a series of algorithms that are empowered by the statistical view of boosting and the concept of multiple instance learning. We start by describing a boosting learning framework that is capable to handle billions of training examples. It differs from traditional bootstrapping schemes in that no intermediate thresholds need to be set during training, yet the total number of negative examples used for feature selection remains constant and focused (on the poor performing ones). A multiple instance pruning scheme is then adopted to set the intermediate thresholds after boosting learning. This algorithm generates detectors that are both fast and accurate. We then present two multiple instance learning schemes for face detection, multiple instance learning boosting (MILBoost) and winner-take-all multiple category boosting (WTA-McBoost). MILBoost addresses the uncertainty in accurately pinpointing the location of the object being detected, while WTA-McBoost addresses the uncertainty in determining the most appropriate subcategory label for multiview object detection. Both schemes can resolve the ambiguity of the labeling process and reduce outliers during training, which leads to improved detector performances. In many applications, a detector trained with generic data sets may not perform optimally in a new environment. We propose detection adaption, which is a promising solution for this problem. We present an adaptation scheme based on the Taylor expansion of the boosting learning objective function, and we propose to store the second order statistics of the generic training data for future adaptation. We show that with a small amount of labeled data in the new environment, the detector's performance can be greatly improved. We also present two interesting applications where boosting learning was applied successfully. The first application is face verification for filtering and ranking image/video search results on celebrities. We present boosted multi-task learning (MTL), yet another boosting learning algorithm that extends MILBoost with a graphical model. Since the available number of training images for each celebrity may be limited, learning individual classifiers for each person may cause overfitting. MTL jointly learns classifiers for multiple people by sharing a few boosting classifiers in order to avoid overfitting. The second application addresses the need of speaker detection in conference rooms. The goal is to find who is speaking, given a microphone array and a panoramic video of the room. We show that by combining audio and visual features in a boosting framework, we can determine the speaker's position very accurately. Finally, we offer our thoughts on future directions for face detection. Table of Contents: A Brief Survey of the Face Detection Literature / Cascade-based Real-Time Face Detection / Multiple Instance Learning for Face Detection / Detector Adaptation / Other Applications / Conclusions and Future Work


Image and Video Technology

Image and Video Technology

Author: Reinhard Klette

Publisher: Springer

Published: 2014-01-31

Total Pages: 534

ISBN-13: 3642538428

DOWNLOAD EBOOK

This book constitutes the thoroughly refereed post-conference proceedings of the 6th Pacific Rim Symposium on Image and Video Technology, PSIVT 2013, held in Guanajuato, México in October/November 2013. The total of 43 revised papers was carefully reviewed and selected from 90 submissions. The papers are organized in topical sections on image/video processing and analysis, image/video retrieval and scene understanding, applications of image and video technology, biomedical image processing and analysis, biometrics and image forensics, computational photography and arts, computer and robot vision, pattern recognition and video surveillance.


Ensemble Machine Learning

Ensemble Machine Learning

Author: Cha Zhang

Publisher: Springer Science & Business Media

Published: 2012-02-17

Total Pages: 332

ISBN-13: 1441993258

DOWNLOAD EBOOK

It is common wisdom that gathering a variety of views and inputs improves the process of decision making, and, indeed, underpins a democratic society. Dubbed “ensemble learning” by researchers in computational intelligence and machine learning, it is known to improve a decision system’s robustness and accuracy. Now, fresh developments are allowing researchers to unleash the power of ensemble learning in an increasing range of real-world applications. Ensemble learning algorithms such as “boosting” and “random forest” facilitate solutions to key computational issues such as face recognition and are now being applied in areas as diverse as object tracking and bioinformatics. Responding to a shortage of literature dedicated to the topic, this volume offers comprehensive coverage of state-of-the-art ensemble learning techniques, including the random forest skeleton tracking algorithm in the Xbox Kinect sensor, which bypasses the need for game controllers. At once a solid theoretical study and a practical guide, the volume is a windfall for researchers and practitioners alike.


Face Geometry and Appearance Modeling

Face Geometry and Appearance Modeling

Author: Zicheng Liu

Publisher: Cambridge University Press

Published: 2011-04-18

Total Pages: 315

ISBN-13: 1139498878

DOWNLOAD EBOOK

Human faces are familiar to our visual systems. We easily recognize a person's face in arbitrary lighting conditions and in a variety of poses; detect small appearance changes; and notice subtle expression details. Can computer vision systems process face images as well as human vision systems can? Face image processing has potential applications in surveillance, image and video search, social networking and other domains. A comprehensive guide to this fascinating topic, this book provides a systematic description of modeling face geometry and appearance from images, including information on mathematical tools, physical concepts, image processing and computer vision techniques, and concrete prototype systems. The book will be an excellent reference for researchers and graduate students in computer vision, computer graphics and multimedia, as well as application developers who would like to gain a better understanding of the state of the art.


ICT Innovations 2015

ICT Innovations 2015

Author: Suzana Loshkovska

Publisher: Springer

Published: 2015-10-03

Total Pages: 304

ISBN-13: 3319257331

DOWNLOAD EBOOK

This book offers a collection of selected papers presented at the Seventh International Conference on ICT Innovations held in October 2015, in Ohrid, Macedonia, with main topic Emerging Technologies for Better Living. The conference gathered academics, professionals and industrial practitioners that work on developing the emerging technologies, systems, applications in the industrial and business arena especially innovative commercial implementations, novel application of technology, and experience in applying recent ICT research advances to practical solutions.


Web-Age Information Management

Web-Age Information Management

Author: Feifei Li

Publisher: Springer

Published: 2014-06-14

Total Pages: 862

ISBN-13: 3319080105

DOWNLOAD EBOOK

This book constitutes the refereed proceedings of the 15th International Conference on Web-Age Information Management, WAIM 2014, held in Macau, China, in June 2014. The 48 revised full papers presented together with 35 short papers were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on information retrieval; recommender systems; query processing and optimization; data mining; data and information quality; information extraction; mobile and pervasive computing; stream, time-series; security and privacy; semantic web; cloud computing; new hardware; crowdsourcing; social computing.


Vision-Based Interaction

Vision-Based Interaction

Author: Ahmed Elgammal

Publisher: Springer Nature

Published: 2022-05-31

Total Pages: 116

ISBN-13: 3031018125

DOWNLOAD EBOOK

In its early years, the field of computer vision was largely motivated by researchers seeking computational models of biological vision and solutions to practical problems in manufacturing, defense, and medicine. For the past two decades or so, there has been an increasing interest in computer vision as an input modality in the context of human-computer interaction. Such vision-based interaction can endow interactive systems with visual capabilities similar to those important to human-human interaction, in order to perceive non-verbal cues and incorporate this information in applications such as interactive gaming, visualization, art installations, intelligent agent interaction, and various kinds of command and control tasks. Enabling this kind of rich, visual and multimodal interaction requires interactive-time solutions to problems such as detecting and recognizing faces and facial expressions, determining a person's direction of gaze and focus of attention, tracking movement of the body, and recognizing various kinds of gestures. In building technologies for vision-based interaction, there are choices to be made as to the range of possible sensors employed (e.g., single camera, stereo rig, depth camera), the precision and granularity of the desired outputs, the mobility of the solution, usability issues, etc. Practical considerations dictate that there is not a one-size-fits-all solution to the variety of interaction scenarios; however, there are principles and methodological approaches common to a wide range of problems in the domain. While new sensors such as the Microsoft Kinect are having a major influence on the research and practice of vision-based interaction in various settings, they are just a starting point for continued progress in the area. In this book, we discuss the landscape of history, opportunities, and challenges in this area of vision-based interaction; we review the state-of-the-art and seminal works in detecting and recognizing the human body and its components; we explore both static and dynamic approaches to "looking at people" vision problems; and we place the computer vision work in the context of other modalities and multimodal applications. Readers should gain a thorough understanding of current and future possibilities of computer vision technologies in the context of human-computer interaction.


Multi-Modal Face Presentation Attack Detection

Multi-Modal Face Presentation Attack Detection

Author: Jun Wan

Publisher: Springer Nature

Published: 2022-05-31

Total Pages: 76

ISBN-13: 3031018249

DOWNLOAD EBOOK

For the last ten years, face biometric research has been intensively studied by the computer vision community. Face recognition systems have been used in mobile, banking, and surveillance systems. For face recognition systems, face spoofing attack detection is a crucial stage that could cause severe security issues in government sectors. Although effective methods for face presentation attack detection have been proposed so far, the problem is still unsolved due to the difficulty in the design of features and methods that can work for new spoofing attacks. In addition, existing datasets for studying the problem are relatively small which hinders the progress in this relevant domain. In order to attract researchers to this important field and push the boundaries of the state of the art on face anti-spoofing detection, we organized the Face Spoofing Attack Workshop and Competition at CVPR 2019, an event part of the ChaLearn Looking at People Series. As part of this event, we released the largest multi-modal face anti-spoofing dataset so far, the CASIA-SURF benchmark. The workshop reunited many researchers from around the world and the challenge attracted more than 300 teams. Some of the novel methodologies proposed in the context of the challenge achieved state-of-the-art performance. In this manuscript, we provide a comprehensive review on face anti-spoofing techniques presented in this joint event and point out directions for future research on the face anti-spoofing field.


Security Technology

Security Technology

Author: Tai-hoon Kim

Publisher: Springer Science & Business Media

Published: 2011-11-29

Total Pages: 249

ISBN-13: 364227188X

DOWNLOAD EBOOK

This book comprises selected papers of the International Conferences, SecTech 2011, held as Part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, in December 2011. The papers presented were carefully reviewed and selected from numerous submissions and focuse on the various aspects of security technology.