Computer Science ›› 2020, Vol. 47 ›› Issue (6): 164-169.doi: 10.11896/jsjkx.190500013

• Computer Graphics & Multimedia • Previous Articles     Next Articles

Person Re -identification Fusing Viewpoint Mechanism and Pose Estimation

PEI Jia-zhen, XU Zeng-chun, HU Ping   

  1. College of Computer Science and Technology,Nanjing Tech University,Nanjing 211816,China
  • Received:2019-05-05 Online:2020-06-15 Published:2020-06-10
  • About author:PEI Jia-zhen,born in 1995,master.His main research interests include person re-identification,computer vision and deep learning.
    XU Zeng-chun,born in 1973,engineer.Her main research interests include computer science and technology,wireless sensor networks and intelligence computation.
  • Supported by:
    This work was supported by the National Natural Science Foundation of China (61672279),National Key R&D Program of China (2017YFC0805605) and Key R&D Program of Jiangsu Province (BE2017617)

Abstract: Person re-identification is a very challenging task in video surveillance.Person have significant changes in appearance due to occlusion and differences in illumination,posture and perspective,which will ultimately have a great impact on the accuracy of person re-identification.To overcome these difficulties,this paper proposes a method for person re-identification based on viewpoint mechanism and pose estimation.First,the pose estimation algorithm Openpose is used to locate the joint points of person.Then,view discrimination is performed on the image to obtain viewpoint information.Local regions based on viewpoint information and joint point locations is proposed to generate a partial image.Next,the global image and the partial image are input into the CNN simultaneously to extract features.Finally,in order to obtain a more robust feature representation,the feature fusion network is used to fuse the global and local features.Experimental results show that the proposed method has higher person re-identification accuracy.On CHUK03 dataset,the value of rank1 reaches 71.3%,and on Market1501 dataset and DukeMTMC-reID dataset,the mAP reaches 63.2% and 60.5%,respectively.Therefore,the proposed methokd can well cope with person attitude changes,pose changes and other issues.

Key words: Camera viewpoint, Pose estimation, Deep learning, Person re-identification, Feature fusion

CLC Number: 

  • TP391
[1]ZHENG L,SHEN L,TIAN L,et al.Scalable Person Re-identification:A Benchmark[C]//2015 IEEE International Conference on Computer Vision (ICCV).IEEE Computer Society,2015:1116-1124.
[2]LI W,ZHAO R,XIAO T,et al.DeepReID:Deep Filter Pairing Neural Network for Person Re-identification[C]//2014 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).IEEE Computer Society,2014:152-159.
[3]RISTANI E,SOLERA F,ZOU R,et al.Performance measures and a data set for multi-target,multi-camera Tracking[C]//European Conference on Computer Vision workshop on Benchmarking Multi-Target Tracking.2016:17-35.
[4]LIAO S,HU Y,ZHU N X,et al.Person re-identification by Local Maximal Occurrence representation and metric learning[C]//2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).IEEE Computer Society,2015:2197-2206.
[5]JOSE C,FLEURET F.Scalable metric learning via weighted approximate rank component analysis[C]//European Conference on Computer Vision.Cham:Springer,2016:875-890.
[6]LIAO S,LI S Z.Efficient PSD Constrained Asymmetric Metric Learning for Person Re-identification[C]//2015 IEEE International Conference on Computer Vision (ICCV).IEEE Computer Society,2015:3685-3693.
[7]YI D,LEI Z,LIAO S,et al.Deep Metric Learning for Person Re-identification[C]//2014 22nd International Conference on Pattern Recognition (ICPR).IEEE Computer Society,2014:34-39.
[8]VARIOR R R,SHUAI B,LU J W,et al.A siamese long short-term memory architecture for human re-identification[C]//European Conference on Computer Vision.Cham:Springer,2016:135-153.
[9]VARIOR R R,HALOI M,WANG G.Gated siamese convolutional neural network architecture for human re-identification[C]//European Conference on Computer Vision.Cham:Springer,2016:791-808.
[10]DING S,LIN L,WANG G,et al.Deep feature learning with relative distance comparison for person re-identification[J].Pattern Recognition,2015,48(10):2993-3003.
[11]WANG F,ZUO W,LIN L,et al.Joint learning of single-image and cross-image representations for person re-identification[C]//2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).IEEE Computer Society,2016:1288-1296.
[12]ZHENG L,HUANG Y,LU H,et al.Pose Invariant Embedding for Deep Person Re-identification[C]//2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).IEEE Computer Society,2017:1456-1465.
[13]ZHAO H,TIAN M,SUN S,et al.Spindle Net:Person Re-identification with Human Body Region Guided Feature Decomposition and Fusion[C]//2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).IEEE Computer Society,2017:1077-1085.
[14]WANG H,LIU Z F,FANG B F,et al.Human pose estimation based on constellation tree structure appearance model[J].Computer Science,2014,41(3):76-79.
[15]LI D,ZHANG Z,CHEN X,et al.A Richly Annotated Dataset for Pedestrian Attribute Recognition[C]//2016 IEEEConfe-rence on Computer Vision and Pattern Recognition (CVPR).IEEE Computer Society,2016.
[16]CAO Z,SIMON T,WEI S E,et al.Realtime multi-person 2D pose estimation using part affinity fields[C]//IEEE Conference on Computer Vision & Pattern Recognition.IEEE,2017:1302-1310.
[17]ZHANG L,XIANG T,GONG S.Learning a Discriminative Null Space for Person Re-identification[C]//2016 IEEE Conference on Computer Vision and Pattern Recognition.IEEE,2016:1239-1248.
[18]MATSUKAWA T,OKABE T,SUZUKI E,et al.Hierarchical Gaussian Descriptor for Person Re-identification[C]//2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).IEEE,2016:1363-1372.
[19]SCHUMANN A,STIEFELHAGEN R.Person Re-identification by Deep Learning Attribute-Complementary Information[C]//2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).IEEE Computer Society,2017:1435-1443.
[20]ZHENG Z,ZHENG L,YANG Y.Unlabeled samples generate d by GAN improve the person re-identification baseline in vitro[C]//IEEE International Conference on Computer Vision.IEEE Computer Society,2017:3774-3782.
[21]SUN Y,ZHENG L,DENG W,et al.SVDNet for Pedestrian Retrieval[C]//IEEE International Conference on Computer Vision.Piscataway:IEEE,2017:3820-3828.
[1] WANG Rui-ping, JIA Zhen, LIU Chang, CHEN Ze-wei, LI Tian-rui. Deep Interest Factorization Machine Network Based on DeepFM [J]. Computer Science, 2021, 48(1): 226-232.
[2] ZHANG Fan, HE Wen-qi, JI Hong-bing, LI Dan-ping, WANG Lei. Multi-view Dictionary-pair Learning Based on Block-diagonal Representation [J]. Computer Science, 2021, 48(1): 233-240.
[3] YU Wen-jia, DING Shi-fei. Conditional Generative Adversarial Network Based on Self-attention Mechanism [J]. Computer Science, 2021, 48(1): 241-246.
[4] TONG Xin, WANG Bin-jun, WANG Run-zheng, PAN Xiao-qin. Survey on Adversarial Sample of Deep Learning Towards Natural Language Processing [J]. Computer Science, 2021, 48(1): 258-267.
[5] DING Yu, WEI Hao, PAN Zhi-song, LIU Xin. Survey of Network Representation Learning [J]. Computer Science, 2020, 47(9): 52-59.
[6] HE Xin, XU Juan, JIN Ying-ying. Action-related Network:Towards Modeling Complete Changeable Action [J]. Computer Science, 2020, 47(9): 123-128.
[7] YE Ya-nan, CHI Jing, YU Zhi-ping, ZHAN Yu-liand ZHANG Cai-ming. Expression Animation Synthesis Based on Improved CycleGan Model and Region Segmentation [J]. Computer Science, 2020, 47(9): 142-149.
[8] DENG Liang, XU Geng-lin, LI Meng-jie, CHEN Zhang-jin. Fast Face Recognition Based on Deep Learning and Multiple Hash Similarity Weighting [J]. Computer Science, 2020, 47(9): 163-168.
[9] BAO Yu-xuan, LU Tian-liang, DU Yan-hui. Overview of Deepfake Video Detection Technology [J]. Computer Science, 2020, 47(9): 283-292.
[10] YUAN Ye, HE Xiao-ge, ZHU Ding-kun, WANG Fu-lee, XIE Hao-ran, WANG Jun, WEI Ming-qiang, GUO Yan-wen. Survey of Visual Image Saliency Detection [J]. Computer Science, 2020, 47(7): 84-91.
[11] WANG Wen-dao, WANG Run-ze, WEI Xin-lei, QI Yun-liang, MA Yi-de. Automatic Recognition of ECG Based on Stacked Bidirectional LSTM [J]. Computer Science, 2020, 47(7): 118-124.
[12] LIU Yan, WEN Jing. Complex Scene Text Detection Based on Attention Mechanism [J]. Computer Science, 2020, 47(7): 135-140.
[13] ZHANG Zhi-yang, ZHANG Feng-li, TAN Qi, WANG Rui-jin. Review of Information Cascade Prediction Methods Based on Deep Learning [J]. Computer Science, 2020, 47(7): 141-153.
[14] JIANG Wen-bin, FU Zhi, PENG Jing, ZHU Jian. 4Bit-based Gradient Compression Method for Distributed Deep Learning System [J]. Computer Science, 2020, 47(7): 220-226.
[15] CHEN Jin-yin, ZHANG Dun-Jie, LIN Xiang, XU Xiao-dong and ZHU Zi-ling. False Message Propagation Suppression Based on Influence Maximization [J]. Computer Science, 2020, 47(6A): 17-23.
Full text



[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75 .
[2] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[3] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[4] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[5] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99 .
[6] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105 .
[7] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111 .
[8] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[9] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121 .
[10] WANG Zhen-chao, HOU Huan-huan and LIAN Rui. Path Optimization Scheme for Restraining Degree of Disorder in CMT[J]. Computer Science, 2018, 45(4): 122 -125 .