Computer Science ›› 2025, Vol. 52 ›› Issue (11A): 241100155-8.doi: 10.11896/jsjkx.241100155

• Image Processing & Multimedia Technology • Previous Articles     Next Articles

Automatic Recognition of Irrelevant Individuals in Videos Based on Multi-object Tracking

MA Yixin1, ZENG Junhao2, YANG Xinyan3, LIANG Gang3   

  1. 1 AVIC Chengdu Aircraft Design & Research Institute,Chengdu 610073,China
    2 No.30 Research Institute of China Electronics Technology Group Corporation,Chengdu 610041,China
    3 School of Cyber Science and Engineering,Sichuan University,Chengdu 610211,China
  • Online:2025-11-15 Published:2025-11-10
  • Supported by:
    National Natural Science Foundation of China(62162057),National Natural Science Foundation of Sichuan(2025ZNSFSC0509),Sichuan Science and Technology Program(2023YFG0294) and Local Projects of the Ministry of Education(2023CDLZ-2).

Abstract: Automatic identification of irrelevant individuals aims to detect and identify irrelevant persons in videos to solve their privacy protection issues.Existing privacy protection methods extract high-level visual features to identify individuals irrelevant to the subject.However,the extraction of high-level features significantly affects the processing efficiency of the video and makes it difficult to process massive video data.At the same time,the existing single-frame recognition method does not consider the temporal characteristics of the target,resulting in low accuracy.Therefore,this paper proposes an automatic recognition algorithm to efficiently identify irrelevant individuals,and introduces a multi-target tracking method to determine the correlation between people and videos.The method can extract five lightweight features from the time and space dimensions of the individual’s motion trajectory.In addition,in order to solve the challenges brought by occlusion and blur during video motion,an observation-based trajectory association algorithm is adopted to improve the accuracy of motion tracking.Extensive experiments conducted on various datasets demonstrate that the proposed method achieves significant improvements across multiple evaluation metrics compared to state-of-the-art approaches.Specifically,the MOTA metric shows a maximum improvement of 10.87 percentage points,the HOTA me-tric achieves a maximum increase of 10.95 percentage points,and the accuracy of irrelevant individuals recognition reaches 98.13%.

Key words: Irrelevant individuals recognition, Privacy protection, Multi-object tracking, Face detection, Deep learning

CLC Number: 

  • TP391
[1]FAKLARIS C,CAFARO F,HOOK S A,et al.Legal and Ethical Implications of Mobile Live-streaming Video Apps[C]//Proceedings of the 18th International Conference on Human-Computer Interaction with Mobile Devices and Services Adjunct.2016:722-729.
[2]YOUTUBE H.Blur Your Videos[EB/OL].[2024-12-30].ht-tps://support.google.com/youtube/answer/9057652?hl=en.
[3]INGRID.Redact Faces with Azure Media Analytics[EB/OL].[2024-12-30].https://learn.microsoft.com/zh-cn/previous-versions/media-services/previous/media-services-face-redaction.
[4]ZHOU J,PUN C M.Personal Privacy Protection Via Irrelevant Faces Tracking and Pixelation in Video Live Streaming[J].IEEE Transactions on Information Forensics and Security,2020,16:1088-1103.
[5]HASAN R,CRANDALL D,FRITZ M,et al.Automatically De-tecting Bystanders in Photos to Reduce Privacy Risks[C]//2020 IEEE Symposium on Security and Privacy(SP).IEEE,2020:318-335.
[6]DARLING D,LI A,LI Q.Automated Bystander Detection and Anonymization in Mobile Photography[C]//Security and Privacy in Communication Networks:16th EAI International Confe-rence,SecureComm 2020,Washington,DC,USA,Part I 16.Springer International Publishing,2020:402-424.
[7]ZHU M,ZHANG R,WANG H.Recognizing Irrelevant Faces in Short-form Videos Based on Feature Fusion and Active Learning[J].Neurocomputing,2022,501:694-704.
[8]MA W,WU X,ZHAO S,et al.FedSH:Towards Privacy-preser-ving Text-based Person Re-Identification[J].IEEE Transactions on Multimedia,2023,26:5065-5077.
[9]LIN J,DAI X,NAI K,et al.BRPPNet:Balanced Privacy Protection Network for Referring Personal Image Privacy Protection[J].Expert Systems with Applications,2023,233:120960.
[10]WU D,HAN W,WANG T,et al.Referring Multi-object Trac-king[C]//Proceedings of the IEEE/CVF Conference on Compu-ter Vision and Pattern Recognition.2023:14633-14642.
[11]BAI Y,ZHAO Z,GONG Y,et al.Artrackv2:Prompting Autore-gressive Tracker Where to Look and How to Describe[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.2024:19048-19057.
[12]NGUYEN P,QUACH K G,KITANI K,et al.Type-to-track:Retrieve Any Object Via Prompt-based Tracking[C]//NeurIPS 2023.2023.
[13]ZADEH A,CHONG LIM Y,BALTRUSAITIS T,et al.Convolutional Experts Constrained Local Model for 3d Facial Landmark Detection[C]//Proceedings of the IEEE International Conference on Computer Vision Workshops.2017:2519-2528.
[14]GE Z,LIU S,WANG F,et al.Yolox:Exceeding Yolo Series in 2021[J].arXiv:2107.08430,2021.
[15]BEWLEY A,GE Z,OTT L,et al.Simple Online and Realtime Tracking[C]//2016 IEEE International Conference on Image Processing(ICIP).IEEE,2016:3464-3468.
[16]CAO J,PANG J,WENG X,et al.Observation-centric Sort:Rethinking Sort For Robust Multi-object Tracking[C]//Procee-dings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.2023:9686-9696.
[17]DENDORFER P,REZATOFIGHI H,MILAN A,et al.CVPR19 Tracking and Detection Challenge:How Crowded Can It Get?[J].arXiv:1906.04567,2019.
[18]SHAO S,ZHAO Z,LI B,et al.Crowdhuman:A Benchmark for Detecting Human in a Crowd[J].arXiv:1805.00123,2018.
[19]SUNDARARAMAN R,DE ALMEIDA BRAGA C,MARCH-AND E,et al.Tracking Pedestrian Heads in Dense Crowd[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.2021:3865-3875.
[20]MA Y X,PPIP Dataset[EB/OL].[2024-12-30].https://github.com/shulie/PPIP-dataset.
[21]LIN T Y,MAIRE M,BELONGIE S,et al.Microsoft Coco:Common Objects in Context[C]//Computer Vision-ECCV 2014:13th European Conference,Zurich,Switzerland,Part V 13.Springer International Publishing,2014:740-755.
[22]BERNARDIN K,STIEFELHAGEN R.Evaluating Multiple Object Tracking Performance:the Clear MotMetrics[J].EURASIP Journal on Image and Video Processing,2008,2008:1-10.
[23]RISTANI E,SOLERA F,ZOU R,et al.Performance Measures and a Dataset for Multi-target,Multi-camera Tracking[C]//European Conference on Computer Vision.Cham:Springer International Publishing,2016:17-35.
[24]LUITEN J,OSEP A,DENDORFER P,et al.Hota:A Higher Order Metric for Evaluating Multi-object Tracking[J].International Journal of Computer Vision,2021,129:548-578.
[25]ZHANG Y,WANG C,WANG X,et al.Fairmot:On the Fair-ness of Detection and Re-identification in Multiple Object Tracking[J].International Journal of Computer Vision,2021,129:3069-3087.
[26]DUAN K,BAI S,XIE L,et al.Centernet:Keypoint Triplets for Object Detection[C]//Proceedings of the IEEE/CVF International Conference on Computer Vision.2019:6569-6578.
[27]LOHN-JARAMILLO J,RAY L,GRANGER R,et al.Cluster-tracker:An Efficiency-Focused Multiple Object Tracking Method[J/OL].https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4102945.
[28]VO X T,HOANG V D,NGUYEN D L,et al.Pedestrian Head Detection and Tracking via Global Vision Transformer[C]//International Workshop on Frontiers of Computer Vision.Cham:Springer International Publishing,2022:155-167.
[1] YIN Shi, SHI Zhenyang, WU Menglin, CAI Jinyan, YU De. Deep Learning-based Kidney Segmentation in Ultrasound Imaging:Current Trends and Challenges [J]. Computer Science, 2025, 52(9): 16-24.
[2] ZENG Lili, XIA Jianan, LI Shaowen, JING Maike, ZHAO Huihui, ZHOU Xuezhong. M2T-Net:Cross-task Transfer Learning Tongue Diagnosis Method Based on Multi-source Data [J]. Computer Science, 2025, 52(9): 47-53.
[3] LI Yaru, WANG Qianqian, CHE Chao, ZHU Deheng. Graph-based Compound-Protein Interaction Prediction with Drug Substructures and Protein 3D Information [J]. Computer Science, 2025, 52(9): 71-79.
[4] LUO Chi, LU Lingyun, LIU Fei. Partial Differential Equation Solving Method Based on Locally Enhanced Fourier NeuralOperators [J]. Computer Science, 2025, 52(9): 144-151.
[5] LIU Leyuan, CHEN Gege, WU Wei, WANG Yong, ZHOU Fan. Survey of Data Classification and Grading Studies [J]. Computer Science, 2025, 52(9): 195-211.
[6] LIU Wei, XU Yong, FANG Juan, LI Cheng, ZHU Yujun, FANG Qun, HE Xin. Multimodal Air-writing Gesture Recognition Based on Radar-Vision Fusion [J]. Computer Science, 2025, 52(9): 259-268.
[7] TANG Boyuan, LI Qi. Review on Application of Spatial-Temporal Graph Neural Network in PM2.5 ConcentrationForecasting [J]. Computer Science, 2025, 52(8): 71-85.
[8] FENG Yimeng, FENG Yan, XIE Sijiang, ZHANG Qing. Proxy-based Bidirectional Coin Mixing Mechanism of Blockchain [J]. Computer Science, 2025, 52(8): 385-392.
[9] DAI Xiangguang, HE Chenglong, GUAN Mingyu, ZHANG Wei, ZHOU Yang, LIU Jianfeng, LYU Qingguo. State-decomposition Distributed Dual Averaging Algorithm for Privacy Online ConstrainedOptimization over Directed Networks [J]. Computer Science, 2025, 52(8): 411-420.
[10] LIU Zhengyu, ZHANG Fan, QI Xiaofeng, GAO Yanzhao, SONG Yijing, FAN Wang. Review of Research on Deep Learning Compiler [J]. Computer Science, 2025, 52(8): 29-44.
[11] ZHENG Cheng, YANG Nan. Aspect-based Sentiment Analysis Based on Syntax,Semantics and Affective Knowledge [J]. Computer Science, 2025, 52(7): 218-225.
[12] FAN Xing, ZHOU Xiaohang, ZHANG Ning. Review on Methods and Applications of Short Text Similarity Measurement in Social Media Platforms [J]. Computer Science, 2025, 52(6A): 240400206-8.
[13] YANG Jixiang, JIANG Huiping, WANG Sen, MA Xuan. Research Progress and Challenges in Forest Fire Risk Prediction [J]. Computer Science, 2025, 52(6A): 240400177-8.
[14] WANG Jiamin, WU Wenhong, NIU Hengmao, SHI Bao, WU Nier, HAO Xu, ZHANG Chao, FU Rongsheng. Review of Concrete Defect Detection Methods Based on Deep Learning [J]. Computer Science, 2025, 52(6A): 240900137-12.
[15] HAO Xu, WU Wenhong, NIU Hengmao, SHI Bao, WU Nier, WANG Jiamin, CHU Hongkun. Survey of Man-Machine Distance Detection Method in Construction Site [J]. Computer Science, 2025, 52(6A): 240700098-10.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!