iccv iccv2013 iccv2013-350 knowledge-graph by maker-knowledge-mining

350 iccv-2013-Relative Attributes for Large-Scale Abandoned Object Detection


Source: pdf

Author: Quanfu Fan, Prasad Gabbur, Sharath Pankanti

Abstract: Effective reduction of false alarms in large-scale video surveillance is rather challenging, especially for applications where abnormal events of interest rarely occur, such as abandoned object detection. We develop an approach to prioritize alerts by ranking them, and demonstrate its great effectiveness in reducing false positives while keeping good detection accuracy. Our approach benefits from a novel representation of abandoned object alerts by relative attributes, namely staticness, foregroundness and abandonment. The relative strengths of these attributes are quantified using a ranking function[19] learnt on suitably designed low-level spatial and temporal features.These attributes of varying strengths are not only powerful in distinguishing abandoned objects from false alarms such as people and light artifacts, but also computationally efficient for large-scale deployment. With these features, we apply a linear ranking algorithm to sort alerts according to their relevance to the end-user. We test the effectiveness of our approach on both public data sets and large ones collected from the real world.

Reference: text


Summary: the most important sentenses genereted by tfidf model

sentIndex sentText sentNum sentScore

1 com Abstract Effective reduction of false alarms in large-scale video surveillance is rather challenging, especially for applications where abnormal events of interest rarely occur, such as abandoned object detection. [sent-10, score-0.832]

2 We develop an approach to prioritize alerts by ranking them, and demonstrate its great effectiveness in reducing false positives while keeping good detection accuracy. [sent-11, score-0.878]

3 Our approach benefits from a novel representation of abandoned object alerts by relative attributes, namely staticness, foregroundness and abandonment. [sent-12, score-1.292]

4 The relative strengths of these attributes are quantified using a ranking function[19] learnt on suitably designed low-level spatial and temporal features. [sent-13, score-0.358]

5 These attributes of varying strengths are not only powerful in distinguishing abandoned objects from false alarms such as people and light artifacts, but also computationally efficient for large-scale deployment. [sent-14, score-1.056]

6 With these features, we apply a linear ranking algorithm to sort alerts according to their relevance to the end-user. [sent-15, score-0.722]

7 Introduction We present a robust and efficient approach to prioritize alerts in abandoned object detection (AOD) for large scale video surveillance. [sent-18, score-1.164]

8 An abandoned object tends to indicate high staticness (S), foregroundness (F) and abandonment (A). [sent-28, score-1.157]

9 These high-level attributes are then fed to a second level ranker to prioritize the importance (I) of an object. [sent-30, score-0.229]

10 Secondly, many other things can be confused with abandoned objects. [sent-35, score-0.503]

11 2) are considered as true drops, which account for only a tiny portion of the total number of alerts triggered in a system. [sent-41, score-0.591]

12 Such an extremely high imbalance between true and false alarms demands the system to have good hit rates while at the same time working at low FPRs. [sent-42, score-0.274]

13 In this paper, we address the challenges aforementioned 2736 by prioritizing abandoned object alerts using ranking techniques. [sent-43, score-1.196]

14 Ranking is well suited for the problem of AOD , where false alarms dominate detection results. [sent-44, score-0.276]

15 It has the ability to move up alerts of higher importance to the top of the adjudication process while significantly suppressing false alarms. [sent-45, score-0.664]

16 In order to make alert prioritization feasible, we first propose a novel representation of abandoned objects by visual attributes, namely, staticness, foregroundness and abandonment. [sent-46, score-0.869]

17 In general, abandoned objects are essentially foreground objects that remain motionless over a certain period of time in the scene. [sent-47, score-0.631]

18 One more attribute that abandoned objects possess uniquely is abandonment, which is referred to in [9] as some associated human activity or behavior around an object just before it is dropped and left in isolation. [sent-52, score-0.64]

19 Motivated by the recent work of relative attributes by Parikh and Grauman [19], we further specify the relative strengths of these attributes on different types of alerts raised by various objects in the scene, and apply the technique of [19] to score the attributes. [sent-53, score-1.031]

20 As demonstrated later, these high-level semantic features are intuitively discriminative in separating abandoned objects from other types of alerts. [sent-54, score-0.545]

21 Since static objects are of primary interest in AOD, we integrate the tracker with the approach of [8] which models temporarily static objects by a finite state machine. [sent-57, score-0.375]

22 This information enables effective extraction of spatio-temporal features for staticness and abandonment analysis. [sent-59, score-0.45]

23 We finally use these learnt attributes as input to a ranker to sort alerts by importance. [sent-61, score-0.778]

24 The degree of importance for an alert is given in the order of bags > people > other alerts. [sent-62, score-0.297]

25 Here bags refer to true abandoned objects or true alerts. [sent-63, score-0.682]

26 We enforce such a relationship of ordering between alerts in the ranker largely because people are the most confusing alerts to bags and other alerts such as light artifacts and shadows are of the least interest to the users. [sent-64, score-2.012]

27 We again adopt the technique of [19] for alert ranking due to its simplicity and efficiency. [sent-65, score-0.268]

28 To the best of our knowledge, this work is the first to propose a general representation of abandoned objects by quantifiable visual attributes. [sent-69, score-0.545]

29 While some of these attributes (or concepts) have been tried in previous work [9] for false alarm reduction, they were used qualitatively and mostly in a heuristic way. [sent-70, score-0.285]

30 In our experiments, we thoroughly validated the effectiveness and robustness of our approach under various challenging urban scenarios, using both public data sets with staged drops and a data set collected from deployed cameras including natural drops. [sent-72, score-0.315]

31 Some work such as [25, 7] focus on detection of abandoned and removed objects, but these approaches usually do not handle lighting changes very well or are susceptible to low texturedness and cluttered background. [sent-78, score-0.568]

32 The idea of tracking has been applied to abandoned objection detection in [23, 6, 13] for owner identification. [sent-79, score-0.642]

33 Recently, some works have attempted to address the issue of false positives in a more systematic way to meet the requirement of large-scale deployment of abandoned object detection. [sent-83, score-0.692]

34 For example, in [9], a sequence of robust filters were developed to address different types of false alarms by doing foreground and abandonment analysis. [sent-84, score-0.525]

35 Abandoned Object Alerts In the context of PETS2006 [3], an abandoned object is defined as an item of luggage that has been left behind by its owner. [sent-88, score-0.606]

36 In this work, we consider abandoned objects as stationary objects that are physically isolated from other foreground objects in the scene for some time. [sent-89, score-0.724]

37 In practice, in addition to bags or luggage, interesting drops picked up by a system include natural items such as bikes, garbage cans and traffic cones (Fig. [sent-91, score-0.296]

38 For convenience, we refer to all of them as bags (or true drops) in this paper as opposed to false alarms described below. [sent-93, score-0.359]

39 Among false alarms, people and quick lighting changes are two dominant sources (Fig. [sent-94, score-0.247]

40 2), followed by shadows and ghosts (spurious foreground objects detected after temporarily static objects move again in a scene). [sent-95, score-0.401]

41 This technique features a finite state machine (FSM) that tracks temporarily static objects robustly even under occlusion. [sent-100, score-0.232]

42 Figure 2: Typical abandoned object alerts in video surveillance. [sent-103, score-1.1]

43 a) a sample staged drop from PETS2006 b) a sample staged drop from iLIDS c) two natural drops (trash cans and traffic cones) d) a non-occluded sitting person e) an occluded sitting person f) a light artifact 4. [sent-104, score-0.414]

44 The superscript ’+’ denotes the class of true drops and ’-’ denotes false alarms. [sent-106, score-0.275]

45 We take a similar approach here and design three physically expressible features (attributes) that seem plausible for abandoned object detection. [sent-117, score-0.568]

46 Specifically, our attributes are called staticness, foregroundness and abandonment, as mentioned previously. [sent-118, score-0.297]

47 Similarly, foregroundness refers to the distinctiveness of the object relative to the background based on its appearance. [sent-120, score-0.269]

48 Finally, abandonment expresses the notion of the object being left in isolation after remaining in possession or vicinity of some other entity. [sent-121, score-0.298]

49 In our work, the level of abandonment for an object is related to the magnitude of external motion around the object right before it is left in isolation. [sent-122, score-0.301]

50 In such a way, we bypass the problem of solving the challenge of owner identification and tracking in crowded scenes and instead focus on analyzing the motion around the abandonment of an object. [sent-123, score-0.409]

51 It is possible to describe the relative strengths of different kinds of objects associated with alerts in terms of the above attributes (Table 1). [sent-124, score-0.802]

52 We expect that a truly abandoned object (B+) such as a bag or a piece of luggage remains static in the scene for a long time (high staticness), is very different from the background (high foregroundness) and has been previously in the possession of its owner (high abandonment). [sent-125, score-0.909]

53 In addition, he can be part of a group initially in the scene and isolated later exhibiting abandonment somewhere between a bag and a static background (medium abandonment). [sent-128, score-0.396]

54 Similarly other situations associated with false alarms such as lighting changes (L−), shadows (S−) and ghosts (G−) exhibit different degrees of the proposed attributes and hence different relative rankings as shown in Table 1. [sent-129, score-0.638]

55 3 shows a small sample of our data points represented in the relative attributes space (3D) as learned by attribute rankers (Section 5). [sent-132, score-0.231]

56 Figure 3 : Attribute scores of staticness (ST), foregroundness (FG) and × abandonment (AB) learned from two data sets CITY and S-iLIDS for bags(◦), people(+), lighting artifacts( ), shadows (? [sent-134, score-0.739]

57 Ranking Using Relative Attributes We adopt the relative attribute framework [19] to rank order our data points in terms of their degree of staticness, foregroundness and abandonment. [sent-137, score-0.329]

58 Object Tracking And Low-level Features One of the main challenges is to deal with alerts raised by people, which often exhibit high similarity to abandoned objects. [sent-153, score-1.104]

59 Two useful clues for separating people from bags are how an object arrives at the current location and how it remains static in the same location. [sent-154, score-0.29]

60 Even if one can only track an object for a short period of time prior to its being static, such informa- tion turns out to be helpful for staticness and abandonment analysis when combined with other BGS-related information, as described later. [sent-157, score-0.528]

61 Different from other tracking-based approaches [23], tracking in our approach is not intended to identify the owner of an abandoned object. [sent-158, score-0.614]

62 Instead it aims to provide sufficient evidence for differentiating people from truly static objects for the purpose of suppressing false alarms. [sent-159, score-0.362]

63 For the purpose of abandonment analysis, we further search for the blob Ra that maximally overlaps with Re right before the object gets tracked by the mini-tracker. [sent-184, score-0.301]

64 | |Le − Ls | |; the total length of the track; the aspect ratio of the static region; the ratio of the area of the static region over that of the start region, i. [sent-195, score-0.222]

65 solid box (red or blue): abandoned object; yellow box: the start position of an object; cyan box: the foreground object from which the object is split. [sent-213, score-0.635]

66 For foreground analysis, we directly adopt the feature set developed in [9], which has demonstrated superior performance in separating foreground objects and background artifacts related to lighting changes. [sent-215, score-0.242]

67 The features described above are used as input for the attribute ranker discussed in Section 5 to compute the ranking scores of staticness, foregroundness and abandonment. [sent-217, score-0.436]

68 Alert Ranking We design a second level ranker to sort alerts using the attribute scores learnt previously in Section 5. [sent-221, score-0.734]

69 In practice, some types of false alarms are more important than others to the end user. [sent-222, score-0.248]

70 It is found that investigating irrelevant alerts caused by shadows and lighting artifacts leads to wasteful utilization of a security officer’s time and effort. [sent-223, score-0.692]

71 While alerts raised by activities of people in the scene are also less interesting, investigating such alerts sometimes can be useful in detecting potentially harmful situations. [sent-224, score-1.225]

72 Moreover, people alerts present more ambiguity to true drops than other alerts (see Fig. [sent-225, score-1.297]

73 This suggests a relative ordering of alerts themselves based on both their relevance to the end user and their separability, i. [sent-227, score-0.662]

74 We enforce such a relationship of ordering between alerts in a ranker. [sent-230, score-0.576]

75 Due to its simplicity and efficiency, we adopt the technique of [19] again for alert ranking by treating relevance as one single attribute. [sent-231, score-0.311]

76 The data set has a total of 60 staged drops, and was selected in a way to ensure that the baseline approach used for comparison can detect a reasonably good portion of the drops in the video. [sent-245, score-0.229]

77 The second is a challenging data set( CITY) used in [9], containing 255 staged drops within over 70 hours of video footage captured from 30 cameras in typical urban scenarios such as streets and parks. [sent-246, score-0.361]

78 Note that the number of bags may be smaller than the number of drops in Table 2 due to detection failures in [8]. [sent-255, score-0.24]

79 The first one is an alert ranker using high-level attributes (HL-RANK) as described in Section 7, and the other two are basically binary SVMs using low-level features (LL-SVM) and high-level attributes (HL-SVM) respectively. [sent-261, score-0.447]

80 The two SVMs treat bags as positive labels and other alerts as negative and are trained with a linear kernel. [sent-262, score-0.627]

81 At the same recall, all our approaches show a significant reduction of false alarms in comparison with the baseline. [sent-281, score-0.248]

82 7 shows some examples of true and false positive alerts detected by our system(HL-RANK). [sent-316, score-0.69]

83 Our approach is able to eliminate difficult people alerts such as those two illustrated in the top of the figure. [sent-317, score-0.602]

84 As a comparison, all our proposed approaches yield very few false alarms (high precision). [sent-325, score-0.248]

85 Natural drops vary from staged ones in many aspects. [sent-331, score-0.229]

86 Note that NATS only includes few natural drops and we do not expect that our approaches can rank them as high as those staged drops, so it makes sense in this case to evaluate the ranking quality of our ap- × proaches with MAP or NDCG [14]. [sent-343, score-0.376]

87 To better understand how much our system can benefit from a ranking technique, we turned HL-RANK into a classifier by thresholding the ranking scores by 0. [sent-350, score-0.256]

88 In Table 5, HL-RANK demonstrates clear advantages over the baseline by reducing half of the false alarms while still achieving a comparable detection rate with the baseline. [sent-352, score-0.276]

89 2742 Figure 7: Example alerts provided by our system. [sent-360, score-0.542]

90 The top row shows correct detections while the bottom row illustrates false detections (a false positive is highlighted with a red bounding box around the image while a green box indicates a false negative). [sent-361, score-0.406]

91 Conclusions We propose a novel approach to abandoned object detection using the framework of relative attributes. [sent-366, score-0.608]

92 Specifically, we design three physically interpretable attributes (staticness, foregroundness and abandonment) to characterize different kinds of alerts raised by various objects in the scene. [sent-367, score-0.97]

93 We learn ranking functions for each of the attributes to rank order the alerts based on their strengths on the correspond- ing attributes. [sent-368, score-0.864]

94 The attributes are used as input to an alert prioritization method which performs a ranking using alert importance. [sent-369, score-0.525]

95 Discrimination of abandoned and stolen object based on active contours. [sent-414, score-0.537]

96 Modeling oftemporarily static objects for robust abandoned object detection in urban [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] surveillance. [sent-419, score-0.759]

97 Robust foreground and abandonment analysis for large-scale abandoned object detection. [sent-424, score-0.814]

98 A localized approach to abandoned luggage detection with foreground-mask sampling. [sent-444, score-0.6]

99 Feature extraction techniques for abandoned object classification in video surveillance. [sent-472, score-0.558]

100 Real-time detection of abandoned and removed objects in complex environments. [sent-512, score-0.573]


similar papers computed by tfidf model

tfidf for this paper:

wordName wordTfidf (topN-words)

[('alerts', 0.542), ('abandoned', 0.503), ('abandonment', 0.233), ('staticness', 0.217), ('foregroundness', 0.17), ('drops', 0.127), ('attributes', 0.127), ('alert', 0.127), ('alarms', 0.126), ('aod', 0.124), ('false', 0.122), ('ranking', 0.117), ('static', 0.111), ('fsm', 0.108), ('staged', 0.102), ('city', 0.091), ('bags', 0.085), ('owner', 0.082), ('ghosts', 0.069), ('luggage', 0.069), ('ranker', 0.066), ('crowded', 0.065), ('avss', 0.063), ('attribute', 0.061), ('shadows', 0.06), ('people', 0.06), ('artifacts', 0.053), ('strengths', 0.048), ('harmful', 0.046), ('tpr', 0.046), ('track', 0.044), ('foreground', 0.044), ('relevance', 0.043), ('relative', 0.043), ('objects', 0.042), ('urban', 0.041), ('nats', 0.041), ('ibm', 0.04), ('lighting', 0.037), ('tracker', 0.036), ('alarm', 0.036), ('ndcg', 0.036), ('bikes', 0.036), ('prioritize', 0.036), ('raised', 0.035), ('blob', 0.034), ('ordering', 0.034), ('object', 0.034), ('temporarily', 0.033), ('positives', 0.033), ('orderings', 0.032), ('fpr', 0.032), ('physically', 0.031), ('bgs', 0.031), ('cans', 0.031), ('loitering', 0.031), ('possession', 0.031), ('rvilfamnpekr', 0.031), ('subway', 0.031), ('bag', 0.03), ('weather', 0.03), ('rankings', 0.03), ('rank', 0.03), ('tracking', 0.029), ('cones', 0.029), ('quick', 0.028), ('light', 0.028), ('detection', 0.028), ('prioritization', 0.027), ('urgent', 0.027), ('scenarios', 0.027), ('truly', 0.027), ('surveillance', 0.026), ('true', 0.026), ('trash', 0.025), ('ilids', 0.025), ('movement', 0.025), ('degree', 0.025), ('traffic', 0.024), ('technique', 0.024), ('busy', 0.024), ('exhibit', 0.024), ('learnt', 0.023), ('public', 0.023), ('tps', 0.023), ('interpretable', 0.023), ('triggered', 0.023), ('rs', 0.023), ('tracks', 0.022), ('scores', 0.022), ('cameras', 0.022), ('background', 0.022), ('video', 0.021), ('watson', 0.021), ('streets', 0.021), ('industry', 0.021), ('sort', 0.02), ('stationary', 0.02), ('box', 0.02), ('pets', 0.019)]

similar papers list:

simIndex simValue paperId paperTitle

same-paper 1 1.0000002 350 iccv-2013-Relative Attributes for Large-Scale Abandoned Object Detection

Author: Quanfu Fan, Prasad Gabbur, Sharath Pankanti

Abstract: Effective reduction of false alarms in large-scale video surveillance is rather challenging, especially for applications where abnormal events of interest rarely occur, such as abandoned object detection. We develop an approach to prioritize alerts by ranking them, and demonstrate its great effectiveness in reducing false positives while keeping good detection accuracy. Our approach benefits from a novel representation of abandoned object alerts by relative attributes, namely staticness, foregroundness and abandonment. The relative strengths of these attributes are quantified using a ranking function[19] learnt on suitably designed low-level spatial and temporal features.These attributes of varying strengths are not only powerful in distinguishing abandoned objects from false alarms such as people and light artifacts, but also computationally efficient for large-scale deployment. With these features, we apply a linear ranking algorithm to sort alerts according to their relevance to the end-user. We test the effectiveness of our approach on both public data sets and large ones collected from the real world.

2 0.11592255 52 iccv-2013-Attribute Adaptation for Personalized Image Search

Author: Adriana Kovashka, Kristen Grauman

Abstract: Current methods learn monolithic attribute predictors, with the assumption that a single model is sufficient to reflect human understanding of a visual attribute. However, in reality, humans vary in how they perceive the association between a named property and image content. For example, two people may have slightly different internal models for what makes a shoe look “formal”, or they may disagree on which of two scenes looks “more cluttered”. Rather than discount these differences as noise, we propose to learn user-specific attribute models. We adapt a generic model trained with annotations from multiple users, tailoring it to satisfy user-specific labels. Furthermore, we propose novel techniques to infer user-specific labels based on transitivity and contradictions in the user’s search history. We demonstrate that adapted attributes improve accuracy over both existing monolithic models as well as models that learn from scratch with user-specific data alone. In addition, we show how adapted attributes are useful to personalize image search, whether with binary or relative attributes.

3 0.10421946 31 iccv-2013-A Unified Probabilistic Approach Modeling Relationships between Attributes and Objects

Author: Xiaoyang Wang, Qiang Ji

Abstract: This paper proposes a unified probabilistic model to model the relationships between attributes and objects for attribute prediction and object recognition. As a list of semantically meaningful properties of objects, attributes generally relate to each other statistically. In this paper, we propose a unified probabilistic model to automatically discover and capture both the object-dependent and objectindependent attribute relationships. The model utilizes the captured relationships to benefit both attribute prediction and object recognition. Experiments on four benchmark attribute datasets demonstrate the effectiveness of the proposed unified model for improving attribute prediction as well as object recognition in both standard and zero-shot learning cases.

4 0.091331221 380 iccv-2013-Semantic Transform: Weakly Supervised Semantic Inference for Relating Visual Attributes

Author: Sukrit Shankar, Joan Lasenby, Roberto Cipolla

Abstract: Relative (comparative) attributes are promising for thematic ranking of visual entities, which also aids in recognition tasks [19, 23]. However, attribute rank learning often requires a substantial amount of relational supervision, which is highly tedious, and apparently impracticalfor realworld applications. In this paper, we introduce the Semantic Transform, which under minimal supervision, adaptively finds a semantic feature space along with a class ordering that is related in the best possible way. Such a semantic space is found for every attribute category. To relate the classes under weak supervision, the class ordering needs to be refined according to a cost function in an iterative procedure. This problem is ideally NP-hard, and we thus propose a constrained search tree formulation for the same. Driven by the adaptive semantic feature space representation, our model achieves the best results to date for all of the tasks of relative, absolute and zero-shot classification on two popular datasets.

5 0.086654998 399 iccv-2013-Spoken Attributes: Mixing Binary and Relative Attributes to Say the Right Thing

Author: Amir Sadovnik, Andrew Gallagher, Devi Parikh, Tsuhan Chen

Abstract: In recent years, there has been a great deal of progress in describing objects with attributes. Attributes have proven useful for object recognition, image search, face verification, image description, and zero-shot learning. Typically, attributes are either binary or relative: they describe either the presence or absence of a descriptive characteristic, or the relative magnitude of the characteristic when comparing two exemplars. However, prior work fails to model the actual way in which humans use these attributes in descriptive statements of images. Specifically, it does not address the important interactions between the binary and relative aspects of an attribute. In this work we propose a spoken attribute classifier which models a more natural way of using an attribute in a description. For each attribute we train a classifier which captures the specific way this attribute should be used. We show that as a result of using this model, we produce descriptions about images of people that are more natural and specific than past systems.

6 0.085755371 53 iccv-2013-Attribute Dominance: What Pops Out?

7 0.077999175 54 iccv-2013-Attribute Pivots for Guiding Relevance Feedback in Image Search

8 0.077534549 242 iccv-2013-Learning People Detectors for Tracking in Crowded Scenes

9 0.071578637 204 iccv-2013-Human Attribute Recognition by Rich Appearance Dictionary

10 0.070750318 111 iccv-2013-Detecting Dynamic Objects with Multi-view Background Subtraction

11 0.066003099 58 iccv-2013-Bayesian 3D Tracking from Monocular Video

12 0.065150611 449 iccv-2013-What Do You Do? Occupation Recognition in a Photo via Social Context

13 0.062233865 378 iccv-2013-Semantic-Aware Co-indexing for Image Retrieval

14 0.061842266 445 iccv-2013-Visual Reranking through Weakly Supervised Multi-graph Learning

15 0.061006602 168 iccv-2013-Finding the Best from the Second Bests - Inhibiting Subjective Bias in Evaluation of Visual Tracking Algorithms

16 0.059639648 157 iccv-2013-Fast Face Detector Training Using Tailored Views

17 0.058197077 238 iccv-2013-Learning Graphs to Match

18 0.055165004 7 iccv-2013-A Deep Sum-Product Architecture for Robust Facial Attributes Analysis

19 0.053237129 160 iccv-2013-Fast Object Segmentation in Unconstrained Video

20 0.053202733 237 iccv-2013-Learning Graph Matching: Oriented to Category Modeling from Cluttered Scenes


similar papers computed by lsi model

lsi for this paper:

topicId topicWeight

[(0, 0.129), (1, 0.033), (2, -0.007), (3, -0.05), (4, 0.074), (5, -0.025), (6, -0.044), (7, -0.033), (8, 0.064), (9, 0.098), (10, -0.023), (11, -0.002), (12, 0.029), (13, 0.003), (14, -0.021), (15, -0.017), (16, 0.016), (17, 0.058), (18, -0.038), (19, -0.001), (20, -0.054), (21, 0.014), (22, -0.015), (23, -0.043), (24, -0.017), (25, 0.035), (26, 0.012), (27, -0.032), (28, 0.0), (29, -0.015), (30, 0.003), (31, 0.039), (32, 0.006), (33, -0.01), (34, 0.035), (35, 0.015), (36, 0.073), (37, -0.01), (38, -0.014), (39, 0.019), (40, 0.03), (41, 0.042), (42, -0.059), (43, 0.005), (44, -0.039), (45, 0.002), (46, 0.042), (47, 0.013), (48, 0.015), (49, 0.029)]

similar papers list:

simIndex simValue paperId paperTitle

same-paper 1 0.89574593 350 iccv-2013-Relative Attributes for Large-Scale Abandoned Object Detection

Author: Quanfu Fan, Prasad Gabbur, Sharath Pankanti

Abstract: Effective reduction of false alarms in large-scale video surveillance is rather challenging, especially for applications where abnormal events of interest rarely occur, such as abandoned object detection. We develop an approach to prioritize alerts by ranking them, and demonstrate its great effectiveness in reducing false positives while keeping good detection accuracy. Our approach benefits from a novel representation of abandoned object alerts by relative attributes, namely staticness, foregroundness and abandonment. The relative strengths of these attributes are quantified using a ranking function[19] learnt on suitably designed low-level spatial and temporal features.These attributes of varying strengths are not only powerful in distinguishing abandoned objects from false alarms such as people and light artifacts, but also computationally efficient for large-scale deployment. With these features, we apply a linear ranking algorithm to sort alerts according to their relevance to the end-user. We test the effectiveness of our approach on both public data sets and large ones collected from the real world.

2 0.72976434 53 iccv-2013-Attribute Dominance: What Pops Out?

Author: Naman Turakhia, Devi Parikh

Abstract: When we look at an image, some properties or attributes of the image stand out more than others. When describing an image, people are likely to describe these dominant attributes first. Attribute dominance is a result of a complex interplay between the various properties present or absent in the image. Which attributes in an image are more dominant than others reveals rich information about the content of the image. In this paper we tap into this information by modeling attribute dominance. We show that this helps improve the performance of vision systems on a variety of human-centric applications such as zero-shot learning, image search and generating textual descriptions of images.

3 0.71946484 399 iccv-2013-Spoken Attributes: Mixing Binary and Relative Attributes to Say the Right Thing

Author: Amir Sadovnik, Andrew Gallagher, Devi Parikh, Tsuhan Chen

Abstract: In recent years, there has been a great deal of progress in describing objects with attributes. Attributes have proven useful for object recognition, image search, face verification, image description, and zero-shot learning. Typically, attributes are either binary or relative: they describe either the presence or absence of a descriptive characteristic, or the relative magnitude of the characteristic when comparing two exemplars. However, prior work fails to model the actual way in which humans use these attributes in descriptive statements of images. Specifically, it does not address the important interactions between the binary and relative aspects of an attribute. In this work we propose a spoken attribute classifier which models a more natural way of using an attribute in a description. For each attribute we train a classifier which captures the specific way this attribute should be used. We show that as a result of using this model, we produce descriptions about images of people that are more natural and specific than past systems.

4 0.69709438 31 iccv-2013-A Unified Probabilistic Approach Modeling Relationships between Attributes and Objects

Author: Xiaoyang Wang, Qiang Ji

Abstract: This paper proposes a unified probabilistic model to model the relationships between attributes and objects for attribute prediction and object recognition. As a list of semantically meaningful properties of objects, attributes generally relate to each other statistically. In this paper, we propose a unified probabilistic model to automatically discover and capture both the object-dependent and objectindependent attribute relationships. The model utilizes the captured relationships to benefit both attribute prediction and object recognition. Experiments on four benchmark attribute datasets demonstrate the effectiveness of the proposed unified model for improving attribute prediction as well as object recognition in both standard and zero-shot learning cases.

5 0.6911298 52 iccv-2013-Attribute Adaptation for Personalized Image Search

Author: Adriana Kovashka, Kristen Grauman

Abstract: Current methods learn monolithic attribute predictors, with the assumption that a single model is sufficient to reflect human understanding of a visual attribute. However, in reality, humans vary in how they perceive the association between a named property and image content. For example, two people may have slightly different internal models for what makes a shoe look “formal”, or they may disagree on which of two scenes looks “more cluttered”. Rather than discount these differences as noise, we propose to learn user-specific attribute models. We adapt a generic model trained with annotations from multiple users, tailoring it to satisfy user-specific labels. Furthermore, we propose novel techniques to infer user-specific labels based on transitivity and contradictions in the user’s search history. We demonstrate that adapted attributes improve accuracy over both existing monolithic models as well as models that learn from scratch with user-specific data alone. In addition, we show how adapted attributes are useful to personalize image search, whether with binary or relative attributes.

6 0.67750639 449 iccv-2013-What Do You Do? Occupation Recognition in a Photo via Social Context

7 0.63549989 285 iccv-2013-NEIL: Extracting Visual Knowledge from Web Data

8 0.62319249 380 iccv-2013-Semantic Transform: Weakly Supervised Semantic Inference for Relating Visual Attributes

9 0.59977365 7 iccv-2013-A Deep Sum-Product Architecture for Robust Facial Attributes Analysis

10 0.58882689 416 iccv-2013-The Interestingness of Images

11 0.57212299 204 iccv-2013-Human Attribute Recognition by Rich Appearance Dictionary

12 0.54655081 54 iccv-2013-Attribute Pivots for Guiding Relevance Feedback in Image Search

13 0.53233999 242 iccv-2013-Learning People Detectors for Tracking in Crowded Scenes

14 0.52735132 87 iccv-2013-Conservation Tracking

15 0.52303702 58 iccv-2013-Bayesian 3D Tracking from Monocular Video

16 0.52095181 445 iccv-2013-Visual Reranking through Weakly Supervised Multi-graph Learning

17 0.51107895 192 iccv-2013-Handwritten Word Spotting with Corrected Attributes

18 0.50305676 418 iccv-2013-The Way They Move: Tracking Multiple Targets with Similar Appearance

19 0.50014526 406 iccv-2013-Style-Aware Mid-level Representation for Discovering Visual Connections in Space and Time

20 0.48909453 246 iccv-2013-Learning the Visual Interpretation of Sentences


similar papers computed by lda model

lda for this paper:

topicId topicWeight

[(2, 0.06), (7, 0.011), (12, 0.03), (26, 0.068), (31, 0.033), (42, 0.114), (64, 0.088), (73, 0.03), (77, 0.299), (89, 0.139), (98, 0.013)]

similar papers list:

simIndex simValue paperId paperTitle

same-paper 1 0.75165552 350 iccv-2013-Relative Attributes for Large-Scale Abandoned Object Detection

Author: Quanfu Fan, Prasad Gabbur, Sharath Pankanti

Abstract: Effective reduction of false alarms in large-scale video surveillance is rather challenging, especially for applications where abnormal events of interest rarely occur, such as abandoned object detection. We develop an approach to prioritize alerts by ranking them, and demonstrate its great effectiveness in reducing false positives while keeping good detection accuracy. Our approach benefits from a novel representation of abandoned object alerts by relative attributes, namely staticness, foregroundness and abandonment. The relative strengths of these attributes are quantified using a ranking function[19] learnt on suitably designed low-level spatial and temporal features.These attributes of varying strengths are not only powerful in distinguishing abandoned objects from false alarms such as people and light artifacts, but also computationally efficient for large-scale deployment. With these features, we apply a linear ranking algorithm to sort alerts according to their relevance to the end-user. We test the effectiveness of our approach on both public data sets and large ones collected from the real world.

2 0.68726993 142 iccv-2013-Ensemble Projection for Semi-supervised Image Classification

Author: Dengxin Dai, Luc Van_Gool

Abstract: This paper investigates the problem of semi-supervised classification. Unlike previous methods to regularize classifying boundaries with unlabeled data, our method learns a new image representation from all available data (labeled and unlabeled) andperformsplain supervised learning with the new feature. In particular, an ensemble of image prototype sets are sampled automatically from the available data, to represent a rich set of visual categories/attributes. Discriminative functions are then learned on these prototype sets, and image are represented by the concatenation of their projected values onto the prototypes (similarities to them) for further classification. Experiments on four standard datasets show three interesting phenomena: (1) our method consistently outperforms previous methods for semi-supervised image classification; (2) our method lets itself combine well with these methods; and (3) our method works well for self-taught image classification where unlabeled data are not coming from the same distribution as la- beled ones, but rather from a random collection of images.

3 0.67976975 83 iccv-2013-Complementary Projection Hashing

Author: Zhongming Jin, Yao Hu, Yue Lin, Debing Zhang, Shiding Lin, Deng Cai, Xuelong Li

Abstract: Recently, hashing techniques have been widely applied to solve the approximate nearest neighbors search problem in many vision applications. Generally, these hashing approaches generate 2c buckets, where c is the length of the hash code. A good hashing method should satisfy the following two requirements: 1) mapping the nearby data points into the same bucket or nearby (measured by xue long l i opt . ac . cn @ a(a)b(b) the Hamming distance) buckets. 2) all the data points are evenly distributed among all the buckets. In this paper, we propose a novel algorithm named Complementary Projection Hashing (CPH) to find the optimal hashing functions which explicitly considers the above two requirements. Specifically, CPHaims at sequentiallyfinding a series ofhyperplanes (hashing functions) which cross the sparse region of the data. At the same time, the data points are evenly distributed in the hypercubes generated by these hyperplanes. The experiments comparing with the state-of-the-art hashing methods demonstrate the effectiveness of the proposed method.

4 0.66635203 180 iccv-2013-From Where and How to What We See

Author: S. Karthikeyan, Vignesh Jagadeesh, Renuka Shenoy, Miguel Ecksteinz, B.S. Manjunath

Abstract: Eye movement studies have confirmed that overt attention is highly biased towards faces and text regions in images. In this paper we explore a novel problem of predicting face and text regions in images using eye tracking data from multiple subjects. The problem is challenging as we aim to predict the semantics (face/text/background) only from eye tracking data without utilizing any image information. The proposed algorithm spatially clusters eye tracking data obtained in an image into different coherent groups and subsequently models the likelihood of the clusters containing faces and text using afully connectedMarkov Random Field (MRF). Given the eye tracking datafrom a test image, itpredicts potential face/head (humans, dogs and cats) and text locations reliably. Furthermore, the approach can be used to select regions of interest for further analysis by object detectors for faces and text. The hybrid eye position/object detector approach achieves better detection performance and reduced computation time compared to using only the object detection algorithm. We also present a new eye tracking dataset on 300 images selected from ICDAR, Street-view, Flickr and Oxford-IIIT Pet Dataset from 15 subjects.

5 0.65788847 181 iccv-2013-Frustratingly Easy NBNN Domain Adaptation

Author: Tatiana Tommasi, Barbara Caputo

Abstract: Over the last years, several authors have signaled that state of the art categorization methods fail to perform well when trained and tested on data from different databases. The general consensus in the literature is that this issue, known as domain adaptation and/or dataset bias, is due to a distribution mismatch between data collections. Methods addressing it go from max-margin classifiers to learning how to modify the features and obtain a more robust representation. The large majority of these works use BOW feature descriptors, and learning methods based on imageto-image distance functions. Following the seminal work of [6], in this paper we challenge these two assumptions. We experimentally show that using the NBNN classifier over existing domain adaptation databases achieves always very strong performances. We build on this result, and present an NBNN-based domain adaptation algorithm that learns iteratively a class metric while inducing, for each sample, a large margin separation among classes. To the best of our knowledge, this is the first work casting the domain adaptation problem within the NBNN framework. Experiments show that our method achieves the state of the art, both in the unsupervised and semi-supervised settings.

6 0.63731772 141 iccv-2013-Enhanced Continuous Tabu Search for Parameter Estimation in Multiview Geometry

7 0.63353956 85 iccv-2013-Compositional Models for Video Event Detection: A Multiple Kernel Learning Latent Variable Approach

8 0.59055114 338 iccv-2013-Randomized Ensemble Tracking

9 0.58995372 127 iccv-2013-Dynamic Pooling for Complex Event Recognition

10 0.58801603 417 iccv-2013-The Moving Pose: An Efficient 3D Kinematics Descriptor for Low-Latency Action Recognition and Detection

11 0.58730328 359 iccv-2013-Robust Object Tracking with Online Multi-lifespan Dictionary Learning

12 0.58219326 240 iccv-2013-Learning Maximum Margin Temporal Warping for Action Recognition

13 0.58180493 124 iccv-2013-Domain Transfer Support Vector Ranking for Person Re-identification without Target Camera Label Information

14 0.5814991 380 iccv-2013-Semantic Transform: Weakly Supervised Semantic Inference for Relating Visual Attributes

15 0.58135182 442 iccv-2013-Video Segmentation by Tracking Many Figure-Ground Segments

16 0.58123267 86 iccv-2013-Concurrent Action Detection with Structural Prediction

17 0.5807879 215 iccv-2013-Incorporating Cloud Distribution in Sky Representation

18 0.57911968 188 iccv-2013-Group Sparsity and Geometry Constrained Dictionary Learning for Action Recognition from Depth Maps

19 0.57894474 328 iccv-2013-Probabilistic Elastic Part Model for Unsupervised Face Detector Adaptation

20 0.57848489 44 iccv-2013-Adapting Classification Cascades to New Domains