2015
DOI: 10.1109/tnnls.2015.2405574
|View full text |Cite
|
Sign up to set email alerts
|

Distance Metric Learning Using Privileged Information for Face Verification and Person Re-Identification

Abstract: In this paper, we propose a new approach to improve face verification and person re-identification in the RGB images by leveraging a set of RGB-D data, in which we have additional depth images in the training data captured using depth cameras such as Kinect. In particular, we extract visual features and depth features from the RGB images and depth images, respectively. As the depth features are available only in the training data, we treat the depth features as privileged information, and we formulate this tas… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
45
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
6
1
1

Relationship

2
6

Authors

Journals

citations
Cited by 93 publications
(45 citation statements)
references
References 33 publications
0
45
0
Order By: Relevance
“…After that, many variants of SVM+ have been proposed for solving different tasks [24,12,34,29,33,23]. In [24], Liang and Cherkassky developed a multi-task learning approach based on SVM+.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…After that, many variants of SVM+ have been proposed for solving different tasks [24,12,34,29,33,23]. In [24], Liang and Cherkassky developed a multi-task learning approach based on SVM+.…”
Section: Related Workmentioning
confidence: 99%
“…In [17], a multi-task multi-class extension of SVM+ was proposed. Fouad et al [12] designed a two-step approach for metric learning, and Xu et al [34] formulated a convex formulation for metric learning using privileged information based on the information theory metric learning (ITML) method. Sharmanska et al [29] proposed the Rank Transfer method for utilizing privileged information, and demonstrated the effectiveness of privileged information in various computer vision tasks.…”
Section: Related Workmentioning
confidence: 99%
“…In contrast to the above supervised methods, side information, which can be collected in an unsupervised manner and indicates that certain examples belong to the same class, can be used by the relevance component analysis (RCA) method to learn a Mahalanobis metric [5]. Additional information, such as depth information, can be used with a modified version of information theoretic metric learning [11] to improve re-identification performance [59]. The fact that people move through camera networks has been used to learn multiple related Mahalanobis distance metrics between camera pairs [42], however, this approach required knowledge of the camera network layout and different training for each camera pair.…”
Section: B Metric Learningmentioning
confidence: 99%
“…In the LUPI paradigm, the training samples are associated with additional features that are not available for the testing data, which are referred to as PI. In some recent works [9], [39]- [41], PI was exploited for different computer vision tasks. In [39], a rank SVM method was proposed to rank Web images based on PI.…”
Section: Related Workmentioning
confidence: 99%
“…In [39], a rank SVM method was proposed to rank Web images based on PI. In [40] and [41], PI was incorporated into distance metric learning. However, these works assume that the training data and the testing data are with the same data distribution, while this assumption does not hold in our setting.…”
Section: Related Workmentioning
confidence: 99%