Abstract

Nowadays, a large network of cameras is predominantly used in public places which provide enormous video data. These data are monitored manually and may be utilized only when the need arises to ascertain the facts. Automating the system can improve the quality of surveillance and be useful for high-level surveillance tasks like person identification, suspicious activity detection or undesirable event prediction for timely alerts. In this paper, we proposed a model that can Re-identify a person from a single camera tracking environment. This system will automatically extract face features of the person and generate the Unique Id for each person when it enters for the first time in the monitored area. Its face features are stored in the database which will help to Re-identify the person whenever the same person appears again. The challenges faced by the system are occlusion, pose, light conditions, and face orientation. The proposed system highlights, effect of different deep neural networks for Person Re-identification and compares based on the accuracy, GPU usage, Speed, Number of faces detected by overcoming the challenges like illumination and occlusion. The advantage of the system is it doesn′t require the database of people in advance for recognition and it will be helpful for criminal identification for crime control and prevention.

Highlights

  • 'HHS )DFLDO )HDWXUH%DVHG UHLGHQWLILFDWLRQ LV WKH WHFKQLTXH RI UHFRJQL]LQJ WKH SHUVRQ EDVHG RQ KLV ,G ZKLFK ZDV DVVLJQHG EDVHG RQ KLV SUHYLRXV DSSHDUDQFH 2XU KXPDQ EUDLQ FDQ UHFRJQL]H WKH XQNQRZQ SHUVRQ ZKLFK ZDV VHHQ SUHYLRXVO\ 6LPLODUO\ ZH FDQ GHYHORS D V\VWHP ZKLFK FDQ UHFRJQL]H D SHUVRQ ZLWK KLV XQLTXH LG EDVHG RQ KLV SUHYLRXV DSSHDUDQFH LQ FDPHUD DXWRPDWLFDOO\ +XPDQV FDQ UHFRJQL]H VWUDQJHUV E\ IDFH KHLJKW ERG\ VWUXFWXUH VNLQ FRORU DQG KDLU FRORU 2XW RI DOO SHRSOH.

  • :H KDYH DOVR GRQH UHVHDUFK RQ *HQHULF 2EMHFW 'HWHFWLRQ>@DQG IDFH GHWHFWLRQ WHFKQLTXHV>@>@>@ XVLQJ 'HHS OHDUQLQJ ZKLFK KHOS WR LGHQWLI\ PXOWLSOH SHUVRQ IDFHV LQ D YLGHREDVHG GDWD %DVHG RQ WKH UHVHDUFK ZH FRQFOXGHG WR FRPSDUH WKH SHUIRUPDQFH RI WKUHH ZHOO NQRZQ PHWKRGV +LVWRJUDP RI 2ULHQWHG JUDGLHQWV +2* &RQYROXWLRQ 1HXUDO 1HWZRUN &11 DQG 07&11 ZLWK )DFH1HW IRU IDFH LGHQWLILFDWLRQ DQG 690 PRGHO IRU UHFRJQLWLRQ XVLQJ IDFHV HPEHGGLQJV

  •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

Read more

Summary

Introduction

'HHS )DFLDO )HDWXUH%DVHG UHLGHQWLILFDWLRQ LV WKH WHFKQLTXH RI UHFRJQL]LQJ WKH SHUVRQ EDVHG RQ KLV ,G ZKLFK ZDV DVVLJQHG EDVHG RQ KLV SUHYLRXV DSSHDUDQFH 2XU KXPDQ EUDLQ FDQ UHFRJQL]H WKH XQNQRZQ SHUVRQ ZKLFK ZDV VHHQ SUHYLRXVO\ 6LPLODUO\ ZH FDQ GHYHORS D V\VWHP ZKLFK FDQ UHFRJQL]H D SHUVRQ ZLWK KLV XQLTXH LG EDVHG RQ KLV SUHYLRXV DSSHDUDQFH LQ FDPHUD DXWRPDWLFDOO\ +XPDQV FDQ UHFRJQL]H VWUDQJHUV E\ IDFH KHLJKW ERG\ VWUXFWXUH VNLQ FRORU DQG KDLU FRORU 2XW RI DOO SHRSOH.

Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call