Bandit Framework for Systematic Learning in Wireless Video-Based Face Recognition

Video-based object or face recognition services on mobile devices have recently garnered significant attention, given that video cameras are now ubiquitous in all mobile communication devices. In one of the most typical scenarios for such services, each mobile device captures and transmits video frames over wireless to a remote computing cluster (a.k.a. “cloud” computing infrastructure) that performs the heavy-duty video feature extraction and recognition tasks for a large number of mobile devices. A major challenge of such scenarios stems from the highly varying contention levels in the wireless transmission, as well as the variation in the task-scheduling congestion in the cloud. In order for each device to adapt the transmission, feature extraction and search parameters and maximize its object or face recognition rate under such contention and congestion variability, we propose a systematic learning framework based on multi-user multi-armed bandits. The performance loss under two instantiations of the proposed framework is characterized by the derivation of upper bounds for the achievable short-term and long-term loss in the expected recognition rate per face recognition attempt against the “oracle” solution that assumes a-priori knowledge of the system performance under every possible setting. Unlike well-known reinforcement learning techniques that exhibit very slow convergence when operating in highly-dynamic environments, the proposed bandit-based systematic learning quickly approaches the optimal transmission and cloud resource allocation policies based on feedback on the experienced dynamics (contention and congestion levels). To validate our approach, time-constrained simulation results are presented via: (i) contention-based H.264/AVC video streaming over IEEE 802.11 WLANs and (ii) principal-component based face recognition algorithms running under varying congestion levels of a cloud-computing infrastructure. Against state-of-the-art reinforcement learning methods, our framework is shown to provide 17.8% ~ 44.5% reduction of the number of video frames that must be processed by the cloud for recognition and 11.5% ~ 36.5% reduction in the video traffic over the WLAN.

[1]  David G. Lowe,et al.  Object recognition from local scale-invariant features , 1999, Proceedings of the Seventh IEEE International Conference on Computer Vision.

[2]  Alejandro F. Frangi,et al.  Two-dimensional PCA: a new approach to appearance-based face representation and recognition , 2004 .

[3]  Aleksandrs Slivkins,et al.  Contextual Bandits with Similarity Information , 2009, COLT.

[4]  Sergio Barbarossa,et al.  Computation offloading for mobile cloud computing based on wide cross-layer optimization , 2013, 2013 Future Network & Mobile Summit.

[5]  Allen Y. Yang,et al.  Robust Face Recognition via Sparse Representation , 2009, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[6]  Yuan Zhao,et al.  When mobile terminals meet the cloud: computation offloading as the bridge , 2013, IEEE Network.

[7]  Bernd Girod,et al.  Mobile Visual Search , 2011, IEEE Signal Processing Magazine.

[8]  Lin Sun,et al.  Eyeblink-based Anti-Spoofing in Face Recognition from a Generic Webcamera , 2007, 2007 IEEE 11th International Conference on Computer Vision.

[9]  Harin Sellahewa,et al.  Wavelet-based face verification for constrained platforms , 2005, SPIE Defense + Commercial Sensing.

[10]  Qing Zhao,et al.  Learning in a Changing World: Restless Multiarmed Bandit With Unknown Dynamics , 2010, IEEE Transactions on Information Theory.

[11]  Ahmet Sertbas,et al.  Evaluation of face recognition techniques using PCA, wavelets and SVM , 2010, Expert Syst. Appl..

[12]  T. L. Lai Andherbertrobbins Asymptotically Efficient Adaptive Allocation Rules , 2022 .

[13]  David J. Kriegman,et al.  Acquiring linear subspaces for face recognition under variable lighting , 2005, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[14]  M. van der Schaar,et al.  Cross-layer wireless multimedia transmission: challenges, principles, and new paradigms , 2005, IEEE Wireless Communications.

[15]  Ian H. Witten,et al.  Detecting Replay Attacks in Audiovisual Identity Verification , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.

[16]  Hong Li,et al.  A liveness detection method for face recognition based on optical flow field , 2009, 2009 International Conference on Image Analysis and Signal Processing.

[17]  Ted Taekyoung Kwon,et al.  AMUSE: Empowering users for cost-aware offloading with throughput-delay tradeoffs , 2013, 2013 Proceedings IEEE INFOCOM.

[18]  Ronald L. Graham,et al.  Concrete mathematics - a foundation for computer science (2. ed.) , 1994 .

[19]  Hui Li,et al.  Toward a unified elastic computing platform for smartphones with cloud support , 2013, IEEE Network.

[20]  Wendi B. Heinzelman,et al.  Cloud-Vision: Real-time face recognition using a mobile-cloudlet-cloud acceleration architecture , 2012, 2012 IEEE Symposium on Computers and Communications (ISCC).

[21]  Peter Auer,et al.  Finite-time Analysis of the Multiarmed Bandit Problem , 2002, Machine Learning.

[22]  Mihaela van der Schaar,et al.  Low-complexity reinforcement learning for delay-sensitive compression in networked video stream mining , 2013, 2013 IEEE International Conference on Multimedia and Expo (ICME).

[23]  A. Girotra,et al.  Performance Analysis of the IEEE 802 . 11 Distributed Coordination Function , 2005 .

[24]  Qing Zhao,et al.  Distributed Learning in Multi-Armed Bandit With Multiple Players , 2009, IEEE Transactions on Signal Processing.

[25]  Enrique G. Ortiz,et al.  Evaluation of face recognition techniques for application to facebook , 2008, 2008 8th IEEE International Conference on Automatic Face & Gesture Recognition.

[26]  Chong Luo,et al.  Resource allocation for cloud-based free viewpoint video rendering for mobile phones , 2011, ACM Multimedia.

[27]  Jang-Hee Yoo,et al.  Liveness Detection for Embedded Face Recognition System , 2008 .

[28]  Mihaela van der Schaar,et al.  Decomposition Principles and Online Learning in Cross-Layer Optimization for Delay-Sensitive Applications , 2008, IEEE Transactions on Signal Processing.

[29]  Mohsen Guizani,et al.  Cloud-assisted mobile computing and pervasive services [Guest Editorial] , 2013, IEEE Netw..

[30]  Richard S. Sutton,et al.  Reinforcement Learning: An Introduction , 1998, IEEE Trans. Neural Networks.

[31]  Sébastien Marcel,et al.  MOBIO: MOBILE BIOMETRIC FACE AND SPEAKER AUTHENTICATION , 2010 .

[32]  John Langford,et al.  The Epoch-Greedy Algorithm for Multi-armed Bandits with Side Information , 2007, NIPS.

[33]  J. Langford,et al.  The Epoch-Greedy algorithm for contextual multi-armed bandits , 2007, NIPS 2007.

[34]  Chong Luo,et al.  Multimedia Cloud Computing , 2011, IEEE Signal Processing Magazine.

[35]  Shaolei Ren,et al.  Efficient Resource Provisioning and Rate Selection for Stream Mining in a Community Cloud , 2013, IEEE Transactions on Multimedia.

[36]  David J. Kriegman,et al.  From Few to Many: Illumination Cone Models for Face Recognition under Variable Lighting and Pose , 2001, IEEE Trans. Pattern Anal. Mach. Intell..

[37]  Chi-Ho Chan,et al.  An Evaluation of Video-to-Video Face Verification , 2010, IEEE Transactions on Information Forensics and Security.

[38]  Wei Chu,et al.  A contextual-bandit approach to personalized news article recommendation , 2010, WWW '10.

[39]  Zhaohui Wu,et al.  Liveness Detection for Face Recognition , 2008 .

[40]  Xiaowei Yang,et al.  CloudCmp: comparing public cloud providers , 2010, IMC '10.

[41]  Mihaela van der Schaar,et al.  Structural Solutions for Dynamic Scheduling in Wireless Multimedia Transmission , 2012, IEEE Transactions on Circuits and Systems for Video Technology.

[42]  Mingyan Liu,et al.  Online learning in decentralized multi-user spectrum access with synchronized explorations , 2012, MILCOM 2012 - 2012 IEEE Military Communications Conference.

[43]  Mihaela van der Schaar,et al.  Structure-Aware Stochastic Control for Transmission Scheduling , 2010, IEEE Transactions on Vehicular Technology.

[44]  Dan Siewiorek,et al.  Generation smartphone , 2012, IEEE Spectrum.

[45]  Ao Tang,et al.  Opportunistic Spectrum Access with Multiple Users: Learning under Competition , 2010, 2010 Proceedings IEEE INFOCOM.

[46]  Paul A. Viola,et al.  Fast Multi-view Face Detection , 2003 .

[47]  Béatrice Pesquet-Popescu,et al.  Low-Latency Video Streaming With Congestion Control in Mobile Ad-Hoc Networks , 2012, IEEE Transactions on Multimedia.