Computer Science ›› 2019, Vol. 46 ›› Issue (11A): 260-263.

• Pattern Recognition & Image Processing • Previous Articles     Next Articles

Face Clustering Algorithm Based on Context Constraints

LUO Heng-li, WANG Wen-bo, GE Hong-kong   

  1. (School of Computer Science and Technology,Nanjing University of Aeronautics and Astronautics,Nanjing 211106,China)
  • Online:2019-11-10 Published:2019-11-20

Abstract: Face clustering which aims to automatically divide face images of the same identity into the same cluster,can be applied in a wide range of applications such as face annotation,image management,etc.The traditional face clustering algorithms can achieve good precision,but low recall.To handle this issue,this paper proposed a novel clustering algorithm with triangular constraints and context constraints.The proposed algorithm based on conditional random field model takes triangular constraints as well as common context constraints into accountin images.During the clustering iteration and after preliminary clustering,maximum similarity and people co-occurrence constraints are considered to merge the initial clusters.Experimental results reveal that the proposed face clustering algorithm can group faces efficiently,and improve recall with the high precision,and accordingly enhance the overall clustering performance.

Key words: Face clustering, Conditional random field, Triangular constraints, Context constraints

CLC Number: 

  • TP391.4
[1]VRETOS N,SOLACHIDIS V,PITAS I.A mutual information based face clustering algorithm for movie content analysis[J].Image & Vision Computing,2011,29(10):693-705.
[2]ZHANG Y,TANG Z,WU B,et al.A Coupled Hidden Conditional Random Field Model for Simultaneous Face Clustering and Naming in Videos[J].IEEE Transactions on Image Processing A Publication of the IEEE Signal Processing Society,2016,25(12):5780-5792.
[3]SCHROFF F,KALENICHENKO D,PHILBIN J.Facenet:A unified embedding for face recognition and clustering[C]∥Proceedings of the IEEE Conference on Computervision and Pattern Recognition.2015:815-823.
[4]ZHANG Z P,LUO P,CHEN C L,et al.Joint face representation adaptation and clustering invideos[C]∥European Conference on Computer Vision.Springer,2016:236-251.
[5]SUN Y,CHEN Y H,WANG X G,et al.Deep learning face representation by joint identificationverification[C]∥Advances in Neural Information Processing Systems.2014:1988-1996.
[6]TURK M,PENTLAND A.Eigenfaces for recognition[J].JCogn Neurosci,1991,3(1):71-86.
[7]AHONEN T,HADID A,PIETIKAINEN M.Face Description with Local Binary Patterns:Application to Face Recognition[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,2006,28(12):2037-2041.
[8]TAN H,YANG B,MA Z.Face recognition based on the fusion of global and local HOG features of face images[J].IET Computer Vision,2014,8(3):224-234.
[9]SUN Y,WMG X,TANG X.Deep learning face representationfrom predicting10,000 classes[C]∥Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition.2014:1891-1898.
[10]http://cmusatyalab.github.io/openface.
[11]MACQUEEN J.Some Methods for Classification and Analysis ofMultiVariate Observations[C]∥Proc of Berkeley Symposium on Mathematical Statistics & Probability.1965.
[12]FREY B J,DUECK D.Clustering by Passing Messages Between Data Points[J].Science,2007,315(5814):972-976.
[13]SHI J,MALIK J.Normalized cuts and image segmentation[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,2000,22(8):888-905.
[14]NG A Y,JORDAN M I,WEISS Y.Y:On spectral clustering:analysis and an algorithm[J].Proc Nips,2001,14:849-856.
[15]RODRIGUEZ A,LAIO A.Mechine learning,Clustering by fast search and find of density peaks[J].Science,2014,344(6191):1492.
[16]SHI Y,OTTO C,JAIN A K.Face Clustering:Representation and Pairwise Constraints[J].IEEE Transactions on Information Forensics & Security,2017,PP(99):1-1.
[17]GALLAGHER A C,CHEN T.Clothing cosegmentation for recognizing people[C]∥IEEE Conference on Computer Vision and Pattern Recognition,2008(CVPR 2008).IEEE,2008.
[18]https://github.com/seetaface/SeetaFaceEngine.
[19]AMIGÓE,GONZALO J,ARTILES J,et al.A comparison of extrinsic clustering evaluation metrics based on formal constraints[J].Information Retrieval,2009,12(4):461-486.
[20]ZHANG L,KALASHNIKOV D V,MEHROTRA S.A unified framework for context assisted face clustering[C]∥Acm Conference on International Conference on Multimedia Retrieval.2013.
[1] ZHOU Peng-cheng,GONG Sheng-rong,ZHONG Shan,BAO Zong-ming,DAI Xing-hua. Image Semantic Segmentation Based on Deep Feature Fusion [J]. Computer Science, 2020, 47(2): 126-134.
[2] LIN Zeng-min, HONG Chao-qun, ZHUANG Wei-wei. Face Image Deduplication Based on Fusion of Face Tracking and Clustering [J]. Computer Science, 2020, 47(11A): 615-619.
[3] WANG Zi-niu, JIANG Meng, GAO Jian-ling, CHEN Ya-xian. Chinese Named Entity Recognition Method Based on BERT [J]. Computer Science, 2019, 46(11A): 138-142.
[4] CHEN Wei, WU You-zheng, CHEN Wen-liang, ZHANG Min. Automatic Keyword Extraction Based on BiLSTM-CRF [J]. Computer Science, 2018, 45(6A): 91-96.
[5] YANG Xu-hua and PENG Peng. Map Matching Algorithm Based on Conditional Random Fields and Low-sampling-rate Floating Car Data [J]. Computer Science, 2016, 43(Z6): 68-72.
[6] ZHAO Shi-yu, XIAN Yan-tuan, GUO Jian-yi, YU Zheng-tao, HONG Xuan-gui and WANG Hong-bin. Thai Syllable Segmentation Based on Conditional Random Fields [J]. Computer Science, 2016, 43(3): 54-56.
[7] SUN Xiao, SUN Chong-yuan and REN Fu-ji. New Word Detection and Emotional Tendency Judgment Based on Deep Structured Model [J]. Computer Science, 2015, 42(9): 208-213.
[8] FENG Yun-tian ZHANG Hong-jun HAO Wen-ning. Named Entity Recognition for Military Text [J]. Computer Science, 2015, 42(7): 15-18.
[9] LIU Jian-wei,LI Hai-en and LUO Xiong-lin. Representation Theory of Probabilistic Graphical Models [J]. Computer Science, 2014, 41(9): 1-17.
[10] QIU Quan-qing,MIAO Duo-qian and ZHANG Zhi-fei. Named Entity Recognition on Chinese Microblog [J]. Computer Science, 2013, 40(6): 196-198.
[11] . Human Action Recognition Using Image Contour [J]. Computer Science, 2013, 40(2): 312-314.
[12] QIANG Bao-hua,LI Wei,ZOU Xian-chun,WANG Tian-tian and WU Chun-ming. Research on Deep Web Query Interface Clustering Based on Latent Semantic Analysis [J]. Computer Science, 2013, 40(11): 228-230.
[13] . Framework of Vita Event Extraction and Retrieval [J]. Computer Science, 2012, 39(7): 154-160.
[14] . Mandarin Prosodic Break Automatic Detection Based on Complementary Model [J]. Computer Science, 2011, 38(12): 242-246.
[15] ZHENG He- rong,CHU Yi-ping,PAN Xiang. Adaptive Parameters Conditional Random Field Video Segmentation Algorithm [J]. Computer Science, 2010, 37(5): 254-256.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75 .
[2] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[3] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[4] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[5] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99 .
[6] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105 .
[7] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111 .
[8] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[9] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121 .
[10] WANG Zhen-chao, HOU Huan-huan and LIAN Rui. Path Optimization Scheme for Restraining Degree of Disorder in CMT[J]. Computer Science, 2018, 45(4): 122 -125 .