skip to main content
10.1145/3357254.3357270acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaiprConference Proceedingsconference-collections
research-article

An improved baseline for person re-identification

Published:16 August 2019Publication History

ABSTRACT

Person re-identification(Re-ID) using deep learning has made great progress in the past few years, but there is one problem that many state-of-the-art Re-ID methods all use a complex network most of which use the structure of multi-branch and multi-loss function. At present, the database used for Person re-identification is relatively small. This complex network structure may bring a problem that although current methods may perform well in the small databases, but there may be some problems of overfitting problem, once applied in the bigger dataset or real scene these complex methods may perform not well. So this paper mainly proposes a new powerful baseline network. This end-to-end network only uses a global feature and does not use multi-branch structure, but achieves state-of-the-art level. The key point is that this network has good improvement potential to adapt to larger datasets and even practical application scenarios.

References

  1. Zheng, L., Yang, Y., & Hauptmann, A. G. (2016). Person re-identification: Past, present and future. arXiv preprint arXiv:1610.02984.Google ScholarGoogle Scholar
  2. Zheng, Z., Zheng, L., & Yang, Y. (2018). A discriminatively learned cnn embedding for person reidentification. ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM), 14(1), 13.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. He, K., Zhang, X., Ren, S., & Sun, J. (2016). Deep residual learning for image recognition. In Proceedings of the IEEE conference on computer vision and pattern recognition (pp. 770--778).Google ScholarGoogle ScholarCross RefCross Ref
  4. Hermans, A., Beyer, L., & Leibe, B. (2017). In defense of the triplet loss for person re-identification. arXiv preprint arXiv:1703.07737.Google ScholarGoogle Scholar
  5. Ristani, E., & Tomasi, C. (2018). Features for multi-target multi-camera tracking and re-identification. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (pp. 6036--6046).Google ScholarGoogle ScholarCross RefCross Ref
  6. Szegedy, C., Vanhoucke, V., Ioffe, S., Shlens, J., & Wojna, Z. (2016). Rethinking the inception architecture for computer vision. In Proceedings of the IEEE conference on computer vision and pattern recognition (pp. 2818--2826).Google ScholarGoogle ScholarCross RefCross Ref
  7. Kalayeh, M. M., Basaran, E., Gökmen, M., Kamasak, M. E., & Shah, M. (2018). Human semantic parsing for person re-identification. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (pp. 1062--1071).Google ScholarGoogle ScholarCross RefCross Ref
  8. Kingma, D. P., & Ba, J. (2014). Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980.Google ScholarGoogle Scholar
  9. Zheng, L., Shen, L., Tian, L., Wang, S., Wang, J., & Tian, Q. (2015). Scalable person re-identification: A benchmark. In Proceedings of the IEEE International Conference on Computer Vision (pp. 1116--1124).Google ScholarGoogle ScholarCross RefCross Ref
  10. Zheng, Z., Zheng, L., & Yang, Y. (2017). Unlabeled samples generated by gan improve the person re-identification baseline in vitro. In Proceedings of the IEEE International Conference on Computer Vision (pp. 3754--3762).Google ScholarGoogle ScholarCross RefCross Ref
  11. Sun, Y., Zheng, L., Deng, W., & Wang, S. (2017). Svdnet for pedestrian retrieval. In Proceedings of the IEEE International Conference on Computer Vision (pp. 3800--3808).Google ScholarGoogle ScholarCross RefCross Ref
  12. Xu, J., Zhao, R., Zhu, F., Wang, H., & Ouyang, W. (2018). Attention-aware compositional network for person re-identification. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (pp. 2119--2128).Google ScholarGoogle ScholarCross RefCross Ref
  13. Si, J., Zhang, H., Li, C. G., Kuen, J., Kong, X., Kot, A. C., & Wang, G. (2018). Dual attention matching network for context-aware feature sequence based person re-identification. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (pp. 5363--5372).Google ScholarGoogle ScholarCross RefCross Ref
  14. Sun, Y., Zheng, L., Yang, Y., Tian, Q., & Wang, S. (2018). Beyond part models: Person retrieval with refined part pooling (and a strong convolutional baseline). In Proceedings of the European Conference on Computer Vision (ECCV) (pp. 480--496).Google ScholarGoogle ScholarCross RefCross Ref
  15. Saquib Sarfraz, M., Schumann, A., Eberle, A., & Stiefelhagen, R. (2018). A pose-sensitive embedding for person re-identification with expanded cross neighborhood re-ranking. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (pp. 420--429).Google ScholarGoogle ScholarCross RefCross Ref
  16. Wang, G., Yuan, Y., Chen, X., Li, J., & Zhou, X. (2018, October). Learning discriminative features with multiple granularities for person re-identification. In 2018 ACM Multimedia Conference on Multimedia Conference (pp. 274--282). ACM.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Zheng, F., Sun, X., Jiang, X., Guo, X., Yu, Z., & Huang, F. (2018). A Coarse-to-fine Pyramidal Model for Person Re-identification via Multi-Loss Dynamic Training. arXiv preprint arXiv:1810.12193.Google ScholarGoogle Scholar

Index Terms

  1. An improved baseline for person re-identification

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      AIPR '19: Proceedings of the 2nd International Conference on Artificial Intelligence and Pattern Recognition
      August 2019
      198 pages
      ISBN:9781450372299
      DOI:10.1145/3357254
      • Conference Chairs:
      • Li Ma,
      • Xu Huang

      Copyright © 2019 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 16 August 2019

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader