Computer Science ›› 2019, Vol. 46 ›› Issue (11A): 260-263.

• Pattern Recognition & Image Processing • Previous Articles     Next Articles

Face Clustering Algorithm Based on Context Constraints

LUO Heng-li, WANG Wen-bo, GE Hong-kong   

  1. (School of Computer Science and Technology,Nanjing University of Aeronautics and Astronautics,Nanjing 211106,China)
  • Online:2019-11-10 Published:2019-11-20

Abstract: Face clustering which aims to automatically divide face images of the same identity into the same cluster,can be applied in a wide range of applications such as face annotation,image management,etc.The traditional face clustering algorithms can achieve good precision,but low recall.To handle this issue,this paper proposed a novel clustering algorithm with triangular constraints and context constraints.The proposed algorithm based on conditional random field model takes triangular constraints as well as common context constraints into accountin images.During the clustering iteration and after preliminary clustering,maximum similarity and people co-occurrence constraints are considered to merge the initial clusters.Experimental results reveal that the proposed face clustering algorithm can group faces efficiently,and improve recall with the high precision,and accordingly enhance the overall clustering performance.

Key words: Conditional random field, Context constraints, Face clustering, Triangular constraints

CLC Number: 

  • TP391.4
[1]VRETOS N,SOLACHIDIS V,PITAS I.A mutual information based face clustering algorithm for movie content analysis[J].Image & Vision Computing,2011,29(10):693-705.
[2]ZHANG Y,TANG Z,WU B,et al.A Coupled Hidden Conditional Random Field Model for Simultaneous Face Clustering and Naming in Videos[J].IEEE Transactions on Image Processing A Publication of the IEEE Signal Processing Society,2016,25(12):5780-5792.
[3]SCHROFF F,KALENICHENKO D,PHILBIN J.Facenet:A unified embedding for face recognition and clustering[C]∥Proceedings of the IEEE Conference on Computervision and Pattern Recognition.2015:815-823.
[4]ZHANG Z P,LUO P,CHEN C L,et al.Joint face representation adaptation and clustering invideos[C]∥European Conference on Computer Vision.Springer,2016:236-251.
[5]SUN Y,CHEN Y H,WANG X G,et al.Deep learning face representation by joint identificationverification[C]∥Advances in Neural Information Processing Systems.2014:1988-1996.
[6]TURK M,PENTLAND A.Eigenfaces for recognition[J].JCogn Neurosci,1991,3(1):71-86.
[7]AHONEN T,HADID A,PIETIKAINEN M.Face Description with Local Binary Patterns:Application to Face Recognition[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,2006,28(12):2037-2041.
[8]TAN H,YANG B,MA Z.Face recognition based on the fusion of global and local HOG features of face images[J].IET Computer Vision,2014,8(3):224-234.
[9]SUN Y,WMG X,TANG X.Deep learning face representationfrom predicting10,000 classes[C]∥Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition.2014:1891-1898.
[10]http://cmusatyalab.github.io/openface.
[11]MACQUEEN J.Some Methods for Classification and Analysis ofMultiVariate Observations[C]∥Proc of Berkeley Symposium on Mathematical Statistics & Probability.1965.
[12]FREY B J,DUECK D.Clustering by Passing Messages Between Data Points[J].Science,2007,315(5814):972-976.
[13]SHI J,MALIK J.Normalized cuts and image segmentation[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,2000,22(8):888-905.
[14]NG A Y,JORDAN M I,WEISS Y.Y:On spectral clustering:analysis and an algorithm[J].Proc Nips,2001,14:849-856.
[15]RODRIGUEZ A,LAIO A.Mechine learning,Clustering by fast search and find of density peaks[J].Science,2014,344(6191):1492.
[16]SHI Y,OTTO C,JAIN A K.Face Clustering:Representation and Pairwise Constraints[J].IEEE Transactions on Information Forensics & Security,2017,PP(99):1-1.
[17]GALLAGHER A C,CHEN T.Clothing cosegmentation for recognizing people[C]∥IEEE Conference on Computer Vision and Pattern Recognition,2008(CVPR 2008).IEEE,2008.
[18]https://github.com/seetaface/SeetaFaceEngine.
[19]AMIGÓE,GONZALO J,ARTILES J,et al.A comparison of extrinsic clustering evaluation metrics based on formal constraints[J].Information Retrieval,2009,12(4):461-486.
[20]ZHANG L,KALASHNIKOV D V,MEHROTRA S.A unified framework for context assisted face clustering[C]∥Acm Conference on International Conference on Multimedia Retrieval.2013.
[1] WANG Wen-bo, LUO Heng-li. Complete Graph Face Clustering Based on Graph Convolution Network [J]. Computer Science, 2021, 48(11A): 275-277.
[2] ZHOU Peng-cheng,GONG Sheng-rong,ZHONG Shan,BAO Zong-ming,DAI Xing-hua. Image Semantic Segmentation Based on Deep Feature Fusion [J]. Computer Science, 2020, 47(2): 126-134.
[3] LIN Zeng-min, HONG Chao-qun, ZHUANG Wei-wei. Face Image Deduplication Based on Fusion of Face Tracking and Clustering [J]. Computer Science, 2020, 47(11A): 615-619.
[4] WANG Zi-niu, JIANG Meng, GAO Jian-ling, CHEN Ya-xian. Chinese Named Entity Recognition Method Based on BERT [J]. Computer Science, 2019, 46(11A): 138-142.
[5] CHEN Wei, WU You-zheng, CHEN Wen-liang, ZHANG Min. Automatic Keyword Extraction Based on BiLSTM-CRF [J]. Computer Science, 2018, 45(6A): 91-96.
[6] YANG Xu-hua and PENG Peng. Map Matching Algorithm Based on Conditional Random Fields and Low-sampling-rate Floating Car Data [J]. Computer Science, 2016, 43(Z6): 68-72.
[7] ZHAO Shi-yu, XIAN Yan-tuan, GUO Jian-yi, YU Zheng-tao, HONG Xuan-gui and WANG Hong-bin. Thai Syllable Segmentation Based on Conditional Random Fields [J]. Computer Science, 2016, 43(3): 54-56.
[8] SUN Xiao, SUN Chong-yuan and REN Fu-ji. New Word Detection and Emotional Tendency Judgment Based on Deep Structured Model [J]. Computer Science, 2015, 42(9): 208-213.
[9] FENG Yun-tian ZHANG Hong-jun HAO Wen-ning. Named Entity Recognition for Military Text [J]. Computer Science, 2015, 42(7): 15-18.
[10] LIU Jian-wei,LI Hai-en and LUO Xiong-lin. Representation Theory of Probabilistic Graphical Models [J]. Computer Science, 2014, 41(9): 1-17.
[11] QIU Quan-qing,MIAO Duo-qian and ZHANG Zhi-fei. Named Entity Recognition on Chinese Microblog [J]. Computer Science, 2013, 40(6): 196-198.
[12] . Human Action Recognition Using Image Contour [J]. Computer Science, 2013, 40(2): 312-314.
[13] QIANG Bao-hua,LI Wei,ZOU Xian-chun,WANG Tian-tian and WU Chun-ming. Research on Deep Web Query Interface Clustering Based on Latent Semantic Analysis [J]. Computer Science, 2013, 40(11): 228-230.
[14] . Framework of Vita Event Extraction and Retrieval [J]. Computer Science, 2012, 39(7): 154-160.
[15] . Mandarin Prosodic Break Automatic Detection Based on Complementary Model [J]. Computer Science, 2011, 38(12): 242-246.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!