skip to main content
10.1145/1102351.1102476acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicmlConference Proceedingsconference-collections
Article

Linear Asymmetric Classifier for cascade detectors

Published: 07 August 2005 Publication History

Abstract

The detection of faces in images is fundamentally a rare event detection problem. Cascade classifiers provide an efficient computational solution, by leveraging the asymmetry in the distribution of faces vs. non-faces. Training a cascade classifier in turn requires a solution for the following subproblems: Design a classifier for each node in the cascade with very high detection rate but only moderate false positive rate. While there are a few strategies in the literature for indirectly addressing this asymmetric node learning goal, none of them are based on a satisfactory theoretical framework. We present a mathematical characterization of the node-learning problem and describe an effective closed form approximation to the optimal solution, which we call the Linear Asymmetric Classifier (LAC). We first use AdaBoost or AsymBoost to select features, and use LAC to learn a linear discriminant function to achieve the node learning goal. Experimental results on face detection show that LAC can improve the detection performance in comparison to standard methods. We also show that Fisher Discriminant Analysis on the features selected by AdaBoost yields better performance than AdaBoost itself.

References

[1]
Baker, S., & Nayar, S. (1996). Pattern rejection. Proc. CVPR (pp. 544--549).]]
[2]
Carmichael, O., & Hebert, M. (2003). Shape-based recognition of wiry objects. Proc. CVPR (pp. II:401--408).]]
[3]
Chawla, N. V., Bowyer, K. W., Hall, L. O., & Kegelmeyer, W. P. (2002). Smote: Synthetic minority over-sampling technique. Journal of Artificial Intelligence Research, 16, 321--357.]]
[4]
Elad, M., Hel-Or, Y., & Keshet, R. (2002). Pattern detection using a maximal rejection classifier. Pattern Recognition Letters, 23, 1459--1471.]]
[5]
Fan, W., Lee, W., Stolfo, S. J., & Miller, M. (2000). A multiple model cost-sensitive approach for intrusion detection. Proc. 11th ECML.]]
[6]
Fleuret, F., & Geman, D. (2001). Coarse-to-fine face detection. IJCF, 41, 85--107.]]
[7]
Heisele, B., Serre, T., Mukherjee, S., & Poggio, T. (2001). Feature reduction and hierarchy of classifiers for fast object detection in video images. Proc. CVPR (pp. II:18--24).]]
[8]
Huang, K., Yang, H., King, I., & Lyu, M. R. (2004). Learning classifiers from imbalanced data based on biased minimax probability machine. Proc. CVPR (pp. II:558--563).]]
[9]
Li, S., Zhang, Z., Shum, H., & Zhang, H. (2002). Float-Boost learning for classification. NIPS 15. MIT Press.]]
[10]
Lienhart, R., Kuranov, A., & Pisarevsky, V. (2002). Empirical analysis of detection cascades of boosted classifiers for rapid object detection (Technical Report). MRL, Intel Labs.]]
[11]
Romdhani, S., Torr, P., Schoelkopf, B., & Blake, A. (2001). Computationally efficient face detection. Proc. ICCV (pp. 695--700).]]
[12]
Rowley, H. A., Baluja, S., & Kanade, T. (1998). Neural network-based face detection. IEEE Trans. on Pattern Analysis and Machine Intelligence, 20, 23--38.]]
[13]
Schapire, R. E., Freund, Y., Bartlett, P., & Lee, W. S. (1998). Boosting the margin: A new explanation for the effectiveness of voting methods. The Annals of Statististics, 26, 1651--1686.]]
[14]
Ting, K. M. (2000). A comparative study of cost-sensitive boosting algorithms. Proc. ICML (pp. 983--990).]]
[15]
Viola, P., & Jones, M. (2002). Fast and robust classification using asymmetric AdaBoost and a detector cascade. NIPS 14.]]
[16]
Viola, P., & Jones, M. (2004). Robust real-time face detection. IJCV, 57, 137--154.]]
[17]
Weiss, G. M. (2004). Mining with rarity: a unifying framework. ACM SIGKDD Explorations Newsletter, 6, 7--19.]]

Cited By

View all
  • (2016)Low false positive learning with support vector machinesJournal of Visual Communication and Image Representation10.1016/j.jvcir.2016.03.00738:C(340-350)Online publication date: 1-Jul-2016
  • (2015)Extended Metacognitive Neuro-Fuzzy Inference System for Biometric IdentificationRecent Advances in Computational Intelligence in Defense and Security10.1007/978-3-319-26450-9_12(309-338)Online publication date: 20-Dec-2015
  • (2014)Asymmetric Pruning for Learning Cascade DetectorsIEEE Transactions on Multimedia10.1109/TMM.2014.230872316:5(1254-1267)Online publication date: Aug-2014
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICML '05: Proceedings of the 22nd international conference on Machine learning
August 2005
1113 pages
ISBN:1595931805
DOI:10.1145/1102351
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 07 August 2005

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Acceptance Rates

Overall Acceptance Rate 140 of 548 submissions, 26%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2016)Low false positive learning with support vector machinesJournal of Visual Communication and Image Representation10.1016/j.jvcir.2016.03.00738:C(340-350)Online publication date: 1-Jul-2016
  • (2015)Extended Metacognitive Neuro-Fuzzy Inference System for Biometric IdentificationRecent Advances in Computational Intelligence in Defense and Security10.1007/978-3-319-26450-9_12(309-338)Online publication date: 20-Dec-2015
  • (2014)Asymmetric Pruning for Learning Cascade DetectorsIEEE Transactions on Multimedia10.1109/TMM.2014.230872316:5(1254-1267)Online publication date: Aug-2014
  • (2014)Creating robust high-throughput traffic sign detectors using centre-surround HOG statisticsMachine Vision and Applications10.1007/s00138-011-0393-125:3(713-726)Online publication date: 1-Apr-2014
  • (2013)On Generalizable Low False-Positive Learning Using Asymmetric Support Vector MachinesIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2012.4625:5(1083-1096)Online publication date: 1-May-2013
  • (2013)A novel two-stage weak classifier selection approach for adaptive boosting for cascade face detectorNeurocomputing10.1016/j.neucom.2011.12.060116(122-135)Online publication date: Sep-2013
  • (2012)Multistage Particle Windows for Fast and Accurate Object DetectionIEEE Transactions on Pattern Analysis and Machine Intelligence10.1109/TPAMI.2011.24734:8(1589-1604)Online publication date: 1-Aug-2012
  • (2012)Object DetectionEnsemble Machine Learning10.1007/978-1-4419-9326-7_8(225-250)Online publication date: 19-Jan-2012
  • (2011)Survey on speech emotion recognitionPattern Recognition10.1016/j.patcog.2010.09.02044:3(572-587)Online publication date: 1-Mar-2011
  • (2011)Asymmetric constraint optimization based adaptive boosting for cascade face detectorProceedings of the 7th international conference on Advanced Intelligent Computing Theories and Applications: with aspects of artificial intelligence10.1007/978-3-642-25944-9_30(226-234)Online publication date: 11-Aug-2011
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media