skip to main content
10.1145/2808492.2808513acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicimcsConference Proceedingsconference-collections
research-article

A general method for sensitive identification detection in the terrorist video

Published: 19 August 2015 Publication History

Abstract

With the continuous development of image recognition(IR) technology, it has been widely applied to the different fields. In this paper, we present a general method for sensitive identification detection(logo detection and masked men recognition) in the terrorist video under the cluttered scenes. We firstly created a specific image dataset which contains 5000 logo images of various terrorist groups and 5000 head images of masked men that are taken from different surroundings with different angle and intensity of illumination. Then, a Haar-like wavelet representation and a novel gradient histogram(HOG-like) feature are used to capture the structural similarities between the target images. Furthermore, two classifiers are created to detect the logo image and the head of masked men. Finally, the faces of masked men are recognized by using a method based on local pixel difference(LPD). Experimental results demonstrate the effectiveness of the proposed method.

References

[1]
N. Dalal and B. Triggs. Histograms of oriented gradients for human detection. In Computer Vision and Pattern Recognition, 2005. CVPR 2005. IEEE Computer Society Conference on, volume 1, pages 886--893. IEEE, 2005.
[2]
O. Déniz, G. Bueno, J. Salido, and F. De la Torre. Face recognition using histograms of oriented gradients. Pattern Recognition Letters, 32(12):1598--1603, 2011.
[3]
P. Dollar, C. Wojek, B. Schiele, and P. Perona. Pedestrian detection: An evaluation of the state of the art. Pattern Analysis and Machine Intelligence, IEEE Transactions on, 34(4):743--761, 2012.
[4]
X. Jing, S. Li, C. Lan, D. Zhang, J. Yang, and Q. Liu. Color image canonical correlation analysis for face feature extraction and recognition. Signal Processing, 91(8):2132--2140, 2011.
[5]
S. Liao, A. K. Jain, and S. Z. Li. Partial face recognition: Alignment-free approach. Pattern Analysis and Machine Intelligence, IEEE Transactions on, 35(5):1193--1205, 2013.
[6]
H. Liu, T. Xu, X. Wang, and Y. Qian. Related hog features for human detection using cascaded adaboost and svm classifiers. In Advances in Multimedia Modeling, pages 345--355. Springer, 2013.
[7]
W. Ouyang and X. Wang. Single-pedestrian detection aided by multi-pedestrian detection. In Computer Vision and Pattern Recognition (CVPR), 2013 IEEE Conference on, pages 3198--3205. IEEE, 2013.
[8]
C. P. Papageorgiou, M. Oren, and T. Poggio. A general framework for object detection. In Computer vision, 1998. sixth international conference on, pages 555--562. IEEE, 1998.
[9]
C. X. Ries and R. Lienhart. A survey on visual adult image recognition. Multimedia tools and applications, 69(3):661--688, 2014.
[10]
K. Simonyan and A. Zisserman. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556, 2014.
[11]
C. Stauffer and W. E. L. Grimson. Adaptive background mixture models for real-time tracking. In Computer Vision and Pattern Recognition, 1999. IEEE Computer Society Conference on., volume 2. IEEE, 1999.
[12]
K.-K. Sung and T. Poggio. Example-based learning for view-based human face detection. Pattern Analysis and Machine Intelligence, IEEE Transactions on, 20(1):39--51, 1998.
[13]
X. Tan, S. Chen, Z.-H. Zhou, and J. Liu. Face recognition under occlusions and variant expressions with partial similarity. Information Forensics and Security, IEEE Transactions on, 4(2):217--230, 2009.
[14]
X. Tan, S. Chen, Z.-H. Zhou, and F. Zhang. Recognizing partially occluded, expression variant faces from single training image per person with som and soft k-nn ensemble. Neural Networks, IEEE Transactions on, 16(4):875--886, 2005.
[15]
K. Tieu and P. Viola. Boosting image retrieval. International Journal of Computer Vision, 56(1-2):17--36, 2004.
[16]
Z. Tu. Probabilistic boosting-tree: Learning discriminative models for classification, recognition, and clustering. In Computer Vision, 2005. ICCV 2005. Tenth IEEE International Conference on, volume 2, pages 1589--1596. IEEE, 2005.
[17]
P. Viola and M. J. Jones. Robust real-time face detection. International journal of computer vision, 57(2):137--154, 2004.
[18]
X. Wei, C. Li, Z. Lei, D. Yi, and S. Li. Dynamic image-to-class warping for occluded face recognition. 2014.
[19]
C. Wojek and B. Schiele. A performance evaluation of single and multi-feature people detection. In Pattern Recognition, pages 82--91. Springer, 2008.
[20]
A. Y. Yang, Z. Zhou, A. G. Balasubramanian, S. S. Sastry, and Y. Ma. Fast-minimization algorithms for robust face recognition. Image Processing, IEEE Transactions on, 22(8):3234--3246, 2013.

Index Terms

  1. A general method for sensitive identification detection in the terrorist video

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      ICIMCS '15: Proceedings of the 7th International Conference on Internet Multimedia Computing and Service
      August 2015
      397 pages
      ISBN:9781450335287
      DOI:10.1145/2808492
      • General Chairs:
      • Ramesh Jain,
      • Shuqiang Jiang,
      • Program Chairs:
      • John Smith,
      • Jitao Sang,
      • Guohui Li
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 19 August 2015

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. image recognition
      2. logo detection
      3. masked men recognition

      Qualifiers

      • Research-article

      Conference

      ICIMCS '15

      Acceptance Rates

      ICIMCS '15 Paper Acceptance Rate 20 of 128 submissions, 16%;
      Overall Acceptance Rate 163 of 456 submissions, 36%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • 0
        Total Citations
      • 99
        Total Downloads
      • Downloads (Last 12 months)2
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 15 Sep 2024

      Other Metrics

      Citations

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media