An Improved Convolutional Network Architecture Based on Residual Modeling for Person Re-Identification in Edge Computing

Person re-identification is an important task in the field of video surveillance that concentrates on identifying the same person across different cameras. Some methods cannot learn effective image representations, due to the low resolution of pedestrian image data sets. In this article, we propose a novel Siamese network architecture with layers specially designed to address the problem of re-identification. The architecture proposed in this work is applied to the edge of the cloud infrastructure, which can accelerate the speed of pedestrian retrieval. Our network outputs a similarity value when a pair of images is given as input, indicating whether the two input images show the same person. Novel elements of our architecture include a residual model layer that includes an “identity block” and a “conv” block, which considerably capture more efficient features between the two input images. A global average pooling layer is adopted to reduce the model complexity before a fully connected layer, which minimizes person retrieval time in edge computing. Our proposed method significantly improves previous on: CUHK03 by 30% in rank-1, Market-1501 by 35% in rank-1. We also demonstrate that the proposed method outperforms most state-of-the-art methods on the two public benchmarks.

[1]  David Zhang,et al.  Joint Learning of Single-Image and Cross-Image Representations for Person Re-identification , 2016, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[2]  Yueshen Xu,et al.  QoS Prediction for Service Recommendation with Deep Feature Learning in Edge Computing Environment , 2019, Mob. Networks Appl..

[3]  Yueshen Xu,et al.  Network Location-Aware Service Recommendation with Random Walk in Cyber-Physical Systems , 2017, Sensors.

[4]  Yueshen Xu,et al.  Collaborative Service Selection via Ensemble Learning in Mixed Mobile Network Environments , 2017, Entropy.

[5]  Gang Wang,et al.  Gated Siamese Convolutional Neural Network Architecture for Human Re-identification , 2016, ECCV.

[6]  Hai Tao,et al.  Viewpoint Invariant Pedestrian Recognition with an Ensemble of Localized Features , 2008, ECCV.

[7]  Baoxin Li,et al.  Strategies for Re-Training a Pruned Neural Network in an Edge Computing Paradigm , 2017, 2017 IEEE International Conference on Edge Computing (EDGE).

[8]  Shuicheng Yan,et al.  End-to-End Comparative Attention Networks for Person Re-Identification , 2016, IEEE Transactions on Image Processing.

[9]  Shengcai Liao,et al.  Large Scale Similarity Learning Using Similar Pairs for Person Verification , 2016, AAAI.

[10]  Xiaogang Wang,et al.  Unsupervised Salience Learning for Person Re-identification , 2013, 2013 IEEE Conference on Computer Vision and Pattern Recognition.

[11]  Wu Liu,et al.  A discriminative null space based deep learning approach for person re-identification , 2016, 2016 4th International Conference on Cloud Computing and Intelligence Systems (CCIS).

[12]  Xiaogang Wang,et al.  DeepReID: Deep Filter Pairing Neural Network for Person Re-identification , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition.

[13]  Yuyu Yin,et al.  QoS Prediction for Web Service Recommendation with Network Location-Aware Neighbor Selection , 2016, Int. J. Softw. Eng. Knowl. Eng..

[14]  Jian Wan,et al.  Location-Aware Service Recommendation With Enhanced Probabilistic Matrix Factorization , 2018, IEEE Access.

[15]  Shengcai Liao,et al.  Deep Metric Learning for Person Re-identification , 2014, 2014 22nd International Conference on Pattern Recognition.

[16]  Alfonso Rodríguez-Patón,et al.  A Parallel Bioinspired Framework for Numerical Calculations Using Enzymatic P System With an Enzymatic Environment , 2018, IEEE Access.

[17]  Stan Z. Li,et al.  Deep Metric Learning for Practical Person Re-Identification , 2014, ArXiv.

[18]  Jesús Martínez del Rincón,et al.  Recurrent Convolutional Network for Video-Based Person Re-identification , 2016, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[19]  Xiao Liu,et al.  Semi-supervised Coupled Dictionary Learning for Person Re-identification , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition.

[20]  LinLiang,et al.  Deep feature learning with relative distance comparison for person re-identification , 2015 .

[21]  Shengcai Liao,et al.  Efficient PSD Constrained Asymmetric Metric Learning for Person Re-Identification , 2015, 2015 IEEE International Conference on Computer Vision (ICCV).

[22]  Wanlei Zhou,et al.  E-AUA: An Efficient Anonymous User Authentication Protocol for Mobile IoT , 2019, IEEE Internet of Things Journal.

[23]  Yucong Duan,et al.  Probabilistic Model Checking-Based Service Selection Method for Business Process Modeling , 2017, Int. J. Softw. Eng. Knowl. Eng..

[24]  Michael Jones,et al.  An improved deep learning architecture for person re-identification , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[25]  Jian Sun,et al.  Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[26]  Kaiqi Huang,et al.  Beyond Triplet Loss: A Deep Quadruplet Network for Person Re-identification , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[27]  Michael I. Jordan,et al.  Distance Metric Learning with Application to Clustering with Side-Information , 2002, NIPS.

[28]  Yucong Duan,et al.  Toward service selection for workflow reconfiguration: An interface-based computing solution , 2018, Future Gener. Comput. Syst..

[29]  Gang Wang,et al.  A Siamese Long Short-Term Memory Architecture for Human Re-identification , 2016, ECCV.

[30]  Yueshen Xu,et al.  Collaborative QoS Prediction for Mobile Service with Data Filtering and SlopeOne Model , 2017, Mob. Inf. Syst..

[31]  Horst Bischof,et al.  Large scale metric learning from equivalence constraints , 2012, 2012 IEEE Conference on Computer Vision and Pattern Recognition.

[32]  Qiang He,et al.  Performance-Aware Cost-Effective Resource Provisioning for Future Grid IoT-Cloud System , 2019, Journal of Energy Engineering.

[33]  Yao Zhang,et al.  CSP-E2: An abuse-free contract signing protocol with low-storage TTP for energy-efficient electronic transaction ecosystems , 2019, Inf. Sci..

[34]  Yao Zhang,et al.  A novel efficient MAKA protocol with desynchronization for anonymous roaming service in Global Mobility Networks , 2018, J. Netw. Comput. Appl..

[35]  Liang Lin,et al.  Deep feature learning with relative distance comparison for person re-identification , 2015, Pattern Recognit..

[36]  Shangguang Wang,et al.  An Energy-Aware Edge Server Placement Algorithm in Mobile Edge Computing , 2018, 2018 IEEE International Conference on Edge Computing (EDGE).

[37]  Nanning Zheng,et al.  Person Re-identification by Multi-Channel Parts-Based CNN with Improved Triplet Loss Function , 2016, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[38]  Xiaogang Wang,et al.  Learning Deep Feature Representations with Domain Guided Dropout for Person Re-identification , 2016, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[39]  Fei Xiong,et al.  Person Re-Identification Using Kernel-Based Metric Learning Methods , 2014, ECCV.

[40]  Horst Bischof,et al.  Relaxed Pairwise Learned Metric for Person Re-identification , 2012, ECCV.

[41]  Nanning Zheng,et al.  Similarity learning on an explicit polynomial kernel feature map for person re-identification , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[42]  Sergey Ioffe,et al.  Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift , 2015, ICML.

[43]  Xiaogang Wang,et al.  Spindle Net: Person Re-identification with Human Body Region Guided Feature Decomposition and Fusion , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[44]  Yifan Sun,et al.  SVDNet for Pedestrian Retrieval , 2017, 2017 IEEE International Conference on Computer Vision (ICCV).

[45]  Honghao Gao,et al.  Applying Probabilistic Model Checking to Financial Production Risk Evaluation and Control: A Case Study of Alibaba’s Yu’e Bao , 2018, IEEE Transactions on Computational Social Systems.

[46]  Yi Yang,et al.  Image-Image Domain Adaptation with Preserved Self-Similarity and Domain-Dissimilarity for Person Re-identification , 2017, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.

[47]  Qi Tian,et al.  Scalable Person Re-identification: A Benchmark , 2015, 2015 IEEE International Conference on Computer Vision (ICCV).

[48]  Takahiro Okabe,et al.  Hierarchical Gaussian Descriptor for Person Re-identification , 2016, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).