Transfer Learning for Person Re-identification

Lead Research Organisation: Queen Mary University of London
Department Name: Sch of Electronic Eng & Computer Science

Abstract

Person re-identification is an important task in distributed multi-camera surveillance. This is currently performed manually at great economic cost, and with high error rates due to operator attentive gaps. In this project we aim to achieve fast accurate and robust automated person re-identification that can be deployed to any given camera network scenario, without any expensive calibration steps.

Automated person re-identification is the task of associating people based on images captured in video across diverse spatially distributed camera views at different times. This is challenging because the articulation of the human body and variety of viewing conditions such as lighting, angle and distance means that observed appearance typically differs more for the same person in different views than it does for different people. At the same time, it is an important task to solve because re-identification underpins many key capabilities in visual surveillance such as multi-camera tracking. This in turn is a key capability for end-user organizations which need video analytics to achieve a variety of ends including retail optimization, operational efficiency, public safety, security, infrastructure protection and terrorism prevention. Moreover, it is important to automate re-identification because the manual process in large camera networks is both prohibitively costly and inaccurate due to attentive gaps.

Current state of the art re-identification systems use machine learning techniques to produce models for re- identifying across a particular pair of cameras based on manual annotation of person identity in those cameras. However, this is not scalable in practice, because every unique pair of cameras would need calibration with training data. In this project, we will develop new machine learning models that can automatically adapt re-identification models created for an initial set of source cameras to address the re-identification problem in each new pair of cameras without requiring new annotation. This will dramatically improve the practical impact of re-identification technology by making it significantly more accurate as well as cheaper and easier to deploy.

Planned Impact

In the short to medium term, beneficiaries of advances in re-identification (ReId) specifically include:

* UK ReId research community. Despite initial groundbreaking impact in the early days of the field, the UK is in danger of loosing leadership to Asian competitors which are investing heavily (CUHK alone 7 people working on ReID).

* Video-content analytics companies who could commercialize the ReId IP outcomes of this project, includ- ing both SMEs like VSL (see included letter of support) as well as big industry such as BAE and IBM (who have submitted a flurry of patents in this area recently). ReId technology is used in a variety of downstream analytics tasks such as long-term tracking and person search, thus impacting the breadth of the analytics industry.

* End-user organizations tasked with video analytics for retail optimization, operational efficiency, public safety, security, infrastructure protection and terrorism prevention. Previous end user partners with whom we have partnered via VSL for trailing this type of research outputs include: Tesco, BAA (Heathrow Airport), BAE, UK MOD and London Metropolitan Police. As two specific examples:

- The London Met would like to use ReId technology for, among other tasks, automatic long-term monitoring of well known professional thieves. This is in order to catch them in the act so as to be able to secure arrests, convictions and deportations. Without this technology, the manpower does not exist to consistently keep tabs on these criminals, allowing thefts to go on unfettered. The thieves are fully aware of the Met's limitations and brazenly industrialize and professionalize their activities as a result.

- BAA have trialled person ReId for both security and operational efficiency reasons: In security they would like to perform long-term tracking of the whereabouts of someone leaving an illegally parked vehicle (a potential car-bomb danger). This is so they can intercept this person as soon as possible and resolve the situation quickly so as to minimize both risk of "true positives" and disruption to the airport by the numerous "false positives" (most violators are not of malicious intent, but all need to be dealt with just in case). On efficiency, monitoring how long it takes airport users to get through various checks and queues is key to optimizing operational processes. Without ReId technology, this information is actually quite hard to get. Thus ReId technology is being trialled to provide this information to help improve procedure efficiency.

- In each case, ReId technology has not yet fulfilled its promise well enough for operational deployment. This is because of limited practicality (annotation requirements) and the inter-related issue of significantly weaker performance out of the lab (change of domains). These are exactly issues which this proposal will address (annotation requirements, WP1), performance improvements (all WPs, but especially WP3).

* Citizens will enjoy more efficient service, increased safety and reduced crime resulting from more effective ReId.

* Other QMUL research groups. Imminent projects include: a Spanish collaboration on gait-based ReId will exploit our results (gait recognition needs to transfer across covariates of ground surface type); and an FP7 project on UAV-based surveillance will test our ReId algorithms from an overhead perspective: in which zero view annotation models are an intrinsic requirement since the view changes dynamically.

In the longer term, unsupervised transfer learning outcomes have potential to impact to a wide variety of applications including for example, transferring music recognition models across various acoustic conditions (work being done at QMUL's C4DM), transferring medical diagnosis and risk assessment Bayesian networks (work being done at QMUL's RIM).

These impacts will be achieved via trials through VSL and various collaborations and seminars - please see PTI for details.

Publications

10 25 50

publication icon
Yang Y. (2017) Deep multi-task representation learning: A tensor factorisation approach in 5th International Conference on Learning Representations, ICLR 2017 - Conference Track Proceedings

 
Description In this project we significantly advanced the power of soft biometric person search technology in video surveillance, in particular such that any attribute of interest can be queried without requiring to be pre-programmed in advance.

Context: Person search is an important capability for law-enforcement and national security. It addresses the task of quickly finding a particular suspect/person of interest either in a large set of live video streams or historic video surveillance archives. In the case where only eyewitness descriptions are available, this query should be done by soft biometrics, aka person attributes. E.g., "Find in the video database the person who is: male, 30s, ponytail, wearing baseball cap, leather jacket and carrying a purple rucksack". The key limitation of existing person search methods is the need to pre-program in every possible attribute query that needs to be supported. This means that in practice such systems may fail to be useful in practice if elements of the given description have not been programmed in. For example, in the earlier illustration, there would be a problem if the system designer had overlooked programming in knowledge of baseball caps or purple rucksacks.

Our Key Finding: We created a method for person search which is completely unconstrained by such pre-programmed knowledge. A security operator can query a video database for absolutely any suspect profile which can be described in words. The accuracy for a priori unknown description words is typically reduced compared to anticipated and pre-programmed query terms. However, the major new capability is that no matter what unforeseen query attributes arise in a practical scenario (e.g., imperial moustache, carrying LV handbag, wearing Arsenal FC scarf, etc) the system has a chance to find the person of interest.
Exploitation Route Academic: While we defined a new problem (unconstrained soft biometric person search), and the first solution to it, the accuracy is still not perfect. Future academic studies can improve on our method and obtain better accuracy.

Industry/Society: The next step to impact is for suppliers of video surveillance software to integrate our algorithm to their product. Thus benefiting both industry through more sales of higher quality product, and society thorough improved safety/security provided by it.
Sectors Aerospace, Defence and Marine,Digital/Communication/Information Technologies (including Software),Retail,Security and Diplomacy,Transport

 
Description QMUL has a spinout company VSL makes video surveillance software sold nationally and internationally. We have worked with them to explore integrating the algorithm developed during this research project into their software product. This impacts the UK economy (spinout growth) and society (improved public safety and security). In a followup collaboration, we also worked with University of Bristol to transfer some of the research to the systems being developed in the EPSRC IRC SPHERE project. This impacts society (improved healthcare). In the longer term, research insights from this project have fed into the progress on several followup projects: - The ORCA Hub (UK Robotics and Artificial Intelligence Hub for Offshore Energy Asset Integrity Management) which addressed improving productivity and safety of offshore oil facilities through automation; and in particular the data-efficient learning of computer vision and robotic systems within the ORCA effort. - The UDRC Phase 3 programme, which addressed the ability to verify the correctness and reliability of AI systems so that they can be reliably used in security sensitive applications. In particular the UDRC Phase 3 project provided some theoretical proofs guaranteeing the efficacy of some of the algorithms that were studied empirically in this project. - The the EU Horizon 2020 DREAM project which investigated sample-efficient robot learning.
First Year Of Impact 2016
Sector Aerospace, Defence and Marine,Digital/Communication/Information Technologies (including Software),Healthcare,Security and Diplomacy
Impact Types Societal,Economic

 
Description Queen Mary Innovation Fund (For commercialising EPSRC funded research)
Amount £10,000 (GBP)
Organisation Queen Mary University of London 
Sector Academic/University
Country United Kingdom
Start 02/2016 
End 07/2016
 
Description Signal Procssing in the Information Age
Amount £4,092,207 (GBP)
Funding ID EP/S000631/1 
Organisation Engineering and Physical Sciences Research Council (EPSRC) 
Sector Public
Country United Kingdom
Start 07/2018 
End 03/2024
 
Description UK Robotics and Artificial Intelligence Hub for Offshore Energy Asset Integrity Management
Amount £14,635,591 (GBP)
Funding ID EP/R026173/1 
Organisation Engineering and Physical Sciences Research Council (EPSRC) 
Sector Public
Country United Kingdom
Start 10/2017 
End 03/2022
 
Description Contributing Re-ID to SPHERE-IRC 
Organisation University of Bristol
Department Department of Computer Science
Country United Kingdom 
Sector Academic/University 
PI Contribution Our research team contracted to contribute methods and expertise in person re-identification to the bigger sphere-irc project (http://www.irc-sphere.ac.uk/).
Collaborator Contribution The partners in the sphere project contribute experiment setup, data collection, person detection and tracking.
Impact Paper submitted / under review. The partnership contributes to the overall aims of the sphere project which have economic (saving on health spending), and societal (improving wellbeing) impact goals.
Start Year 2016
 
Title Visual Data Mining 
Description Method and system for finding targets within visual data, comprising receiving target object information. Generating a set of target object semantic attributes from the target object information. Identifying a plurality of candidate objects within visual data. Generating a set of low-level feature descriptors from the visual data for each candidate object. Generating from the set of low-level feature descriptors a set of candidate semantic attributes for each candidate object within the visual data. Identifying one or more portions of the visual data containing a candidate object, from the plurality of candidate objects, having a set of candidate object semantic attributes that match the set of target object semantic attributes. Providing an output indicating the identified one or more portions of the visual data. 
IP Reference US2016239711 
Protection Patent granted
Year Protection Granted 2016
Licensed Yes
Impact This patent forms part of the IP behind the product offered by UK startup vision semantics.
 
Description Presentation and Networking (Defence Academy of the United Kingdom) 
Form Of Engagement Activity Participation in an activity, workshop or similar
Part Of Official Scheme? No
Geographic Reach National
Primary Audience Postgraduate students
Results and Impact Presented a research poster and engaged in discussion and networking throughout a new, two-day conference ("UK Defence and Security Doctoral Symposium") at the UK Defence Academy, Swindon. The purpose of our participation was to i) represent and disseminate the quality and scope of our research at a rare event with unprecedented attendance by members of the UK government, security services, military, and a broad multi-disciplinary cross-section of our academic peers from across the UK; ii) engage and network with potential stakeholders, collabourative partners and further dissemination candidates; iii) obtain policy and strategy information from attendees with potential for directing future research efforts. Around 11-12 interested parties engaged in discussion and requested further information on our work, including members of the UK armed forces, various government departments and satellite offices of the UK Home Office and MoD; one invitation to us was made to give a talk at the University of York; channels of communication with a view to possible future collaboration were opened between ourselves and academics at Imperial, UCL, and Southampton Universities. Our poster was given an 'honourable mention', for nearly winning the best poster prize.
Year(s) Of Engagement Activity 2015