SlideShare a Scribd company logo
Computer vision:
models, learning and inference
            Chapter 18
    Models for style and identity



       Please send errata to s.prince@cs.ucl.ac.uk
Identity and Style


                                                              Identity differs,
                                                             but images similar




                                                             Identity same, but
                                                                images quite
                                                                  different


Computer vision: models, learning and inference. ©2011 Simon J.D. Prince          2
Structure

•   Factor analysis review
•   Subspace identity model
•   Linear discriminant analysis
•   Non-linear models
•   Asymmetric bilinear model
•   Symmetric bilinear model
•   Applications

           Computer vision: models, learning and inference. ©2011 Simon J.D. Prince   3
Factor analysis review
Generative equation:



Probabilistic form:




 Marginal density:




            Computer vision: models, learning and inference. ©2011 Simon J.D. Prince   4
Factor analysis




Computer vision: models, learning and inference. ©2011 Simon J.D. Prince   5
Factor analysis review
E-Step:




M-Step:




          Computer vision: models, learning and inference. ©2011 Simon J.D. Prince   6
Factor analysis vs. Identity model




• Each color is a different identity
• multiple images lie in similar part of subspace
           Computer vision: models, learning and inference. ©2011 Simon J.D. Prince   7
Subspace identity model
Generative equation:



Probabilistic form:




 Marginal density:




            Computer vision: models, learning and inference. ©2011 Simon J.D. Prince   8
Subspace identity model




 Computer vision: models, learning and inference. ©2011 Simon J.D. Prince   9
Factor analysis vs. subspace identity




        Factor analysis                                     Subspace identity
                                                                 model
     Computer vision: models, learning and inference. ©2011 Simon J.D. Prince   10
Learning subspace identity model
E-Step:




Extract moments:




           Computer vision: models, learning and inference. ©2011 Simon J.D. Prince   11
Learning subspace identity model
E-Step:




M-Step:




          Computer vision: models, learning and inference. ©2011 Simon J.D. Prince   12
Subspace identity model




 Computer vision: models, learning and inference. ©2011 Simon J.D. Prince   13
Subspace identity model




 Computer vision: models, learning and inference. ©2011 Simon J.D. Prince   14
Inference by comparing models
Model 1 – Faces match (identity shared):




Model 2 – Faces dont match (identities differ):




Both models have standard form of factor analyzer



          Computer vision: models, learning and inference. ©2011 Simon J.D. Prince   15
Inference by comparing models
Compute likelihood (e.g. for model zero)




where



Compute posterior probability using Bayes rule




          Computer vision: models, learning and inference. ©2011 Simon J.D. Prince   16
Face Recognition Tasks
    GALLERY                                         PROBE


                …                          ?                                          1. CLOSED SET
                                                                                   FACE IDENTIFICATION

        GALLERY                                      PROBE


                …                  NO          ?                                       2. OPEN SET
                                  MATCH                                            FACE IDENTIFICATION

              PROBE

 NO
MATCH
        ?                                                                          3. FACE VERIFICATION




                                                                ?                   4. FACE CLUSTERING

              Computer vision: models, learning and inference. ©2011 Simon J.D. Prince               17
Inference by comparing models




    Computer vision: models, learning and inference. ©2011 Simon J.D. Prince   18
Relation between models




 Computer vision: models, learning and inference. ©2011 Simon J.D. Prince   19
Structure

•   Factor analysis review
•   Subspace identity model
•   Linear discriminant analysis
•   Non-linear models
•   Asymmetric bilinear model
•   Symmetric bilinear model
•   Applications

           Computer vision: models, learning and inference. ©2011 Simon J.D. Prince   20
Probabilistic linear
                 discriminant analysis
Generative equation:




Probabilistic form:




            Computer vision: models, learning and inference. ©2011 Simon J.D. Prince   21
Probabilistic linear discriminant analysis




       Computer vision: models, learning and inference. ©2011 Simon J.D. Prince   22
Learning
E-Step
   – write out all images of same person as system of equations
   – Has standard form of factor analyzer
   – Use standard EM equation




M-Step
   – write equation for each individual data point
   – Has standard form of factor analyzer
   – Use standard EM equation



            Computer vision: models, learning and inference. ©2011 Simon J.D. Prince   23
Probabilistic linear discriminant analyis




       Computer vision: models, learning and inference. ©2011 Simon J.D. Prince   24
Inference
Model 1 – Faces match (identity shared):



Model 2 – Faces dont match (identities differ):




Both models have standard form of factor analyzer


Compute likelihood in standard way
          Computer vision: models, learning and inference. ©2011 Simon J.D. Prince   25
Example results (XM2VTS database)




     Computer vision: models, learning and inference. ©2011 Simon J.D. Prince   26
Structure

•   Factor analysis review
•   Subspace identity model
•   Linear discriminant analysis
•   Non-linear models
•   Asymmetric bilinear model
•   Symmetric bilinear model
•   Applications

           Computer vision: models, learning and inference. ©2011 Simon J.D. Prince   27
Non-linear models (mixture)
Mixture model can describe non-
linear manifold.

Introduce variable ci which
represents which cluster

To be the same identity, must also
belong to the same cluster




           Computer vision: models, learning and inference. ©2011 Simon J.D. Prince   28
Non-linear models (kernel)



•   Pass hidden variable through non-linear function f[ ].
•   Leads to kernelized algorithm
•   Identity equivalent of GPLVM




            Computer vision: models, learning and inference. ©2011 Simon J.D. Prince   29
Structure

•   Factor analysis review
•   Subspace identity model
•   Linear discriminant analysis
•   Non-linear models
•   Asymmetric bilinear model
•   Symmetric bilinear model
•   Applications

           Computer vision: models, learning and inference. ©2011 Simon J.D. Prince   30
Asymmetric bilinear model
• Introduce style variable sij
• indicates conditions in which data was observed
• Example: lighting, pose, expression face recognition

Asymmetric bilinear model



• Introduce style variable sij
• indicates conditions in which data was observed
• Example: lighting, pose, expression face recognition

            Computer vision: models, learning and inference. ©2011 Simon J.D. Prince   31
Asymmetric bilinear model




  Computer vision: models, learning and inference. ©2011 Simon J.D. Prince   32
Asymmetric bilinear model
Generative equation:



Probabilistic form:




Marginal density:



           Computer vision: models, learning and inference. ©2011 Simon J.D. Prince   33
Learning
E-Step:




M-Step:




          Computer vision: models, learning and inference. ©2011 Simon J.D. Prince   34
Asymmetric bilinear model




  Computer vision: models, learning and inference. ©2011 Simon J.D. Prince   35
Inference – inferring style
Likelihood of style




Prior over style



Compute posterior over style using Bayes’ rule

           Computer vision: models, learning and inference. ©2011 Simon J.D. Prince   36
Inference – inferring identity
Likelihood of identity




Prior over identity


Compute posterior over identity using Bayes’ rule




           Computer vision: models, learning and inference. ©2011 Simon J.D. Prince   37
Inference – comparing identities
Model 1 – Faces match (identity shared):




Model 2 – Faces dont match (identities differ):




Both models have standard form of factor analyzer


Compute likelihood in standard way, combine with prior in Bayes rule
           Computer vision: models, learning and inference. ©2011 Simon J.D. Prince   38
Inference – Style translation
• Compute distribution over identity

• Generate in new style




           Computer vision: models, learning and inference. ©2011 Simon J.D. Prince   39
Structure

•   Factor analysis review
•   Subspace identity model
•   Linear discriminant analysis
•   Non-linear models
•   Asymmetric bilinear model
•   Symmetric bilinear model
•   Applications

           Computer vision: models, learning and inference. ©2011 Simon J.D. Prince   40
Symmetric bilinear model
Generative equation:



Probabilistic form:




Mean can also depend on style...


           Computer vision: models, learning and inference. ©2011 Simon J.D. Prince   41
Symmetric bilinear model




 Computer vision: models, learning and inference. ©2011 Simon J.D. Prince   42
Inference – translating style or identity




       Computer vision: models, learning and inference. ©2011 Simon J.D. Prince   43
Multilinear models

Extension of symmetric bilinear model to more
  than two factors

e.g.,




        Computer vision: models, learning and inference. ©2011 Simon J.D. Prince   44
Structure

•   Factor analysis review
•   Subspace identity model
•   Linear discriminant analysis
•   Non-linear models
•   Asymmetric bilinear model
•   Symmetric bilinear model
•   Applications

           Computer vision: models, learning and inference. ©2011 Simon J.D. Prince   45
Face recognition




Computer vision: models, learning and inference. ©2011 Simon J.D. Prince   46
Tensortextures




Computer vision: models, learning and inference. ©2011 Simon J.D. Prince   47
Synthesizing animation




Computer vision: models, learning and inference. ©2011 Simon J.D. Prince   48
Discussion

• Generative models
• Explain data as combination of identity and
  style factors
• In identity recognition, we build models where
  identity was same or different
• Other forms of inference such as style
  translation also possible

         Computer vision: models, learning and inference. ©2011 Simon J.D. Prince   49

More Related Content

Similar to 18 cv mil_style_and_identity

17 cv mil_models_for_shape
17 cv mil_models_for_shape17 cv mil_models_for_shape
17 cv mil_models_for_shapezukun
 
20 cv mil_models_for_words
20 cv mil_models_for_words20 cv mil_models_for_words
20 cv mil_models_for_wordszukun
 
09 cv mil_classification
09 cv mil_classification09 cv mil_classification
09 cv mil_classificationzukun
 
08 cv mil_regression
08 cv mil_regression08 cv mil_regression
08 cv mil_regressionzukun
 
15 cv mil_models_for_transformations
15 cv mil_models_for_transformations15 cv mil_models_for_transformations
15 cv mil_models_for_transformationszukun
 
11 cv mil_models_for_chains_and_trees
11 cv mil_models_for_chains_and_trees11 cv mil_models_for_chains_and_trees
11 cv mil_models_for_chains_and_treeszukun
 
14 cv mil_the_pinhole_camera
14 cv mil_the_pinhole_camera14 cv mil_the_pinhole_camera
14 cv mil_the_pinhole_camerazukun
 
13 cv mil_preprocessing
13 cv mil_preprocessing13 cv mil_preprocessing
13 cv mil_preprocessingzukun
 
07 cv mil_modeling_complex_densities
07 cv mil_modeling_complex_densities07 cv mil_modeling_complex_densities
07 cv mil_modeling_complex_densitieszukun
 
10 cv mil_graphical_models
10 cv mil_graphical_models10 cv mil_graphical_models
10 cv mil_graphical_modelszukun
 
Graphical Models for chains, trees and grids
Graphical Models for chains, trees and gridsGraphical Models for chains, trees and grids
Graphical Models for chains, trees and grids
potaters
 
04 cv mil_fitting_probability_models
04 cv mil_fitting_probability_models04 cv mil_fitting_probability_models
04 cv mil_fitting_probability_modelszukun
 
Common Probability Distibution
Common Probability DistibutionCommon Probability Distibution
Common Probability Distibution
Lukas Tencer
 
03 cv mil_probability_distributions
03 cv mil_probability_distributions03 cv mil_probability_distributions
03 cv mil_probability_distributionszukun
 
machinelearning_slide note this is repdf
machinelearning_slide note this is repdfmachinelearning_slide note this is repdf
machinelearning_slide note this is repdf
JUNHOPARK49
 
Introduction to Probability
Introduction to ProbabilityIntroduction to Probability
Introduction to Probability
Lukas Tencer
 
06 cv mil_learning_and_inference
06 cv mil_learning_and_inference06 cv mil_learning_and_inference
06 cv mil_learning_and_inferencezukun
 
Project presentation by Debendra Adhikari
Project presentation by Debendra AdhikariProject presentation by Debendra Adhikari
Project presentation by Debendra Adhikari
DEBENDRA ADHIKARI
 
Gabriel Bianconi - Introduction to Face Processing with Computer Vision
Gabriel Bianconi - Introduction to Face Processing with Computer VisionGabriel Bianconi - Introduction to Face Processing with Computer Vision
Gabriel Bianconi - Introduction to Face Processing with Computer Vision
PyCon Odessa
 

Similar to 18 cv mil_style_and_identity (19)

17 cv mil_models_for_shape
17 cv mil_models_for_shape17 cv mil_models_for_shape
17 cv mil_models_for_shape
 
20 cv mil_models_for_words
20 cv mil_models_for_words20 cv mil_models_for_words
20 cv mil_models_for_words
 
09 cv mil_classification
09 cv mil_classification09 cv mil_classification
09 cv mil_classification
 
08 cv mil_regression
08 cv mil_regression08 cv mil_regression
08 cv mil_regression
 
15 cv mil_models_for_transformations
15 cv mil_models_for_transformations15 cv mil_models_for_transformations
15 cv mil_models_for_transformations
 
11 cv mil_models_for_chains_and_trees
11 cv mil_models_for_chains_and_trees11 cv mil_models_for_chains_and_trees
11 cv mil_models_for_chains_and_trees
 
14 cv mil_the_pinhole_camera
14 cv mil_the_pinhole_camera14 cv mil_the_pinhole_camera
14 cv mil_the_pinhole_camera
 
13 cv mil_preprocessing
13 cv mil_preprocessing13 cv mil_preprocessing
13 cv mil_preprocessing
 
07 cv mil_modeling_complex_densities
07 cv mil_modeling_complex_densities07 cv mil_modeling_complex_densities
07 cv mil_modeling_complex_densities
 
10 cv mil_graphical_models
10 cv mil_graphical_models10 cv mil_graphical_models
10 cv mil_graphical_models
 
Graphical Models for chains, trees and grids
Graphical Models for chains, trees and gridsGraphical Models for chains, trees and grids
Graphical Models for chains, trees and grids
 
04 cv mil_fitting_probability_models
04 cv mil_fitting_probability_models04 cv mil_fitting_probability_models
04 cv mil_fitting_probability_models
 
Common Probability Distibution
Common Probability DistibutionCommon Probability Distibution
Common Probability Distibution
 
03 cv mil_probability_distributions
03 cv mil_probability_distributions03 cv mil_probability_distributions
03 cv mil_probability_distributions
 
machinelearning_slide note this is repdf
machinelearning_slide note this is repdfmachinelearning_slide note this is repdf
machinelearning_slide note this is repdf
 
Introduction to Probability
Introduction to ProbabilityIntroduction to Probability
Introduction to Probability
 
06 cv mil_learning_and_inference
06 cv mil_learning_and_inference06 cv mil_learning_and_inference
06 cv mil_learning_and_inference
 
Project presentation by Debendra Adhikari
Project presentation by Debendra AdhikariProject presentation by Debendra Adhikari
Project presentation by Debendra Adhikari
 
Gabriel Bianconi - Introduction to Face Processing with Computer Vision
Gabriel Bianconi - Introduction to Face Processing with Computer VisionGabriel Bianconi - Introduction to Face Processing with Computer Vision
Gabriel Bianconi - Introduction to Face Processing with Computer Vision
 

More from zukun

My lyn tutorial 2009
My lyn tutorial 2009My lyn tutorial 2009
My lyn tutorial 2009zukun
 
ETHZ CV2012: Information
ETHZ CV2012: InformationETHZ CV2012: Information
ETHZ CV2012: Informationzukun
 
Siwei lyu: natural image statistics
Siwei lyu: natural image statisticsSiwei lyu: natural image statistics
Siwei lyu: natural image statisticszukun
 
Lecture9 camera calibration
Lecture9 camera calibrationLecture9 camera calibration
Lecture9 camera calibrationzukun
 
Brunelli 2008: template matching techniques in computer vision
Brunelli 2008: template matching techniques in computer visionBrunelli 2008: template matching techniques in computer vision
Brunelli 2008: template matching techniques in computer visionzukun
 
Modern features-part-4-evaluation
Modern features-part-4-evaluationModern features-part-4-evaluation
Modern features-part-4-evaluationzukun
 
Modern features-part-3-software
Modern features-part-3-softwareModern features-part-3-software
Modern features-part-3-softwarezukun
 
Modern features-part-2-descriptors
Modern features-part-2-descriptorsModern features-part-2-descriptors
Modern features-part-2-descriptorszukun
 
Modern features-part-1-detectors
Modern features-part-1-detectorsModern features-part-1-detectors
Modern features-part-1-detectorszukun
 
Modern features-part-0-intro
Modern features-part-0-introModern features-part-0-intro
Modern features-part-0-introzukun
 
Lecture 02 internet video search
Lecture 02 internet video searchLecture 02 internet video search
Lecture 02 internet video searchzukun
 
Lecture 01 internet video search
Lecture 01 internet video searchLecture 01 internet video search
Lecture 01 internet video searchzukun
 
Lecture 03 internet video search
Lecture 03 internet video searchLecture 03 internet video search
Lecture 03 internet video searchzukun
 
Icml2012 tutorial representation_learning
Icml2012 tutorial representation_learningIcml2012 tutorial representation_learning
Icml2012 tutorial representation_learningzukun
 
Advances in discrete energy minimisation for computer vision
Advances in discrete energy minimisation for computer visionAdvances in discrete energy minimisation for computer vision
Advances in discrete energy minimisation for computer visionzukun
 
Gephi tutorial: quick start
Gephi tutorial: quick startGephi tutorial: quick start
Gephi tutorial: quick startzukun
 
EM algorithm and its application in probabilistic latent semantic analysis
EM algorithm and its application in probabilistic latent semantic analysisEM algorithm and its application in probabilistic latent semantic analysis
EM algorithm and its application in probabilistic latent semantic analysiszukun
 
Object recognition with pictorial structures
Object recognition with pictorial structuresObject recognition with pictorial structures
Object recognition with pictorial structureszukun
 
Iccv2011 learning spatiotemporal graphs of human activities
Iccv2011 learning spatiotemporal graphs of human activities Iccv2011 learning spatiotemporal graphs of human activities
Iccv2011 learning spatiotemporal graphs of human activities zukun
 
Icml2012 learning hierarchies of invariant features
Icml2012 learning hierarchies of invariant featuresIcml2012 learning hierarchies of invariant features
Icml2012 learning hierarchies of invariant featureszukun
 

More from zukun (20)

My lyn tutorial 2009
My lyn tutorial 2009My lyn tutorial 2009
My lyn tutorial 2009
 
ETHZ CV2012: Information
ETHZ CV2012: InformationETHZ CV2012: Information
ETHZ CV2012: Information
 
Siwei lyu: natural image statistics
Siwei lyu: natural image statisticsSiwei lyu: natural image statistics
Siwei lyu: natural image statistics
 
Lecture9 camera calibration
Lecture9 camera calibrationLecture9 camera calibration
Lecture9 camera calibration
 
Brunelli 2008: template matching techniques in computer vision
Brunelli 2008: template matching techniques in computer visionBrunelli 2008: template matching techniques in computer vision
Brunelli 2008: template matching techniques in computer vision
 
Modern features-part-4-evaluation
Modern features-part-4-evaluationModern features-part-4-evaluation
Modern features-part-4-evaluation
 
Modern features-part-3-software
Modern features-part-3-softwareModern features-part-3-software
Modern features-part-3-software
 
Modern features-part-2-descriptors
Modern features-part-2-descriptorsModern features-part-2-descriptors
Modern features-part-2-descriptors
 
Modern features-part-1-detectors
Modern features-part-1-detectorsModern features-part-1-detectors
Modern features-part-1-detectors
 
Modern features-part-0-intro
Modern features-part-0-introModern features-part-0-intro
Modern features-part-0-intro
 
Lecture 02 internet video search
Lecture 02 internet video searchLecture 02 internet video search
Lecture 02 internet video search
 
Lecture 01 internet video search
Lecture 01 internet video searchLecture 01 internet video search
Lecture 01 internet video search
 
Lecture 03 internet video search
Lecture 03 internet video searchLecture 03 internet video search
Lecture 03 internet video search
 
Icml2012 tutorial representation_learning
Icml2012 tutorial representation_learningIcml2012 tutorial representation_learning
Icml2012 tutorial representation_learning
 
Advances in discrete energy minimisation for computer vision
Advances in discrete energy minimisation for computer visionAdvances in discrete energy minimisation for computer vision
Advances in discrete energy minimisation for computer vision
 
Gephi tutorial: quick start
Gephi tutorial: quick startGephi tutorial: quick start
Gephi tutorial: quick start
 
EM algorithm and its application in probabilistic latent semantic analysis
EM algorithm and its application in probabilistic latent semantic analysisEM algorithm and its application in probabilistic latent semantic analysis
EM algorithm and its application in probabilistic latent semantic analysis
 
Object recognition with pictorial structures
Object recognition with pictorial structuresObject recognition with pictorial structures
Object recognition with pictorial structures
 
Iccv2011 learning spatiotemporal graphs of human activities
Iccv2011 learning spatiotemporal graphs of human activities Iccv2011 learning spatiotemporal graphs of human activities
Iccv2011 learning spatiotemporal graphs of human activities
 
Icml2012 learning hierarchies of invariant features
Icml2012 learning hierarchies of invariant featuresIcml2012 learning hierarchies of invariant features
Icml2012 learning hierarchies of invariant features
 

Recently uploaded

20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 

Recently uploaded (20)

20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 

18 cv mil_style_and_identity

  • 1. Computer vision: models, learning and inference Chapter 18 Models for style and identity Please send errata to s.prince@cs.ucl.ac.uk
  • 2. Identity and Style Identity differs, but images similar Identity same, but images quite different Computer vision: models, learning and inference. ©2011 Simon J.D. Prince 2
  • 3. Structure • Factor analysis review • Subspace identity model • Linear discriminant analysis • Non-linear models • Asymmetric bilinear model • Symmetric bilinear model • Applications Computer vision: models, learning and inference. ©2011 Simon J.D. Prince 3
  • 4. Factor analysis review Generative equation: Probabilistic form: Marginal density: Computer vision: models, learning and inference. ©2011 Simon J.D. Prince 4
  • 5. Factor analysis Computer vision: models, learning and inference. ©2011 Simon J.D. Prince 5
  • 6. Factor analysis review E-Step: M-Step: Computer vision: models, learning and inference. ©2011 Simon J.D. Prince 6
  • 7. Factor analysis vs. Identity model • Each color is a different identity • multiple images lie in similar part of subspace Computer vision: models, learning and inference. ©2011 Simon J.D. Prince 7
  • 8. Subspace identity model Generative equation: Probabilistic form: Marginal density: Computer vision: models, learning and inference. ©2011 Simon J.D. Prince 8
  • 9. Subspace identity model Computer vision: models, learning and inference. ©2011 Simon J.D. Prince 9
  • 10. Factor analysis vs. subspace identity Factor analysis Subspace identity model Computer vision: models, learning and inference. ©2011 Simon J.D. Prince 10
  • 11. Learning subspace identity model E-Step: Extract moments: Computer vision: models, learning and inference. ©2011 Simon J.D. Prince 11
  • 12. Learning subspace identity model E-Step: M-Step: Computer vision: models, learning and inference. ©2011 Simon J.D. Prince 12
  • 13. Subspace identity model Computer vision: models, learning and inference. ©2011 Simon J.D. Prince 13
  • 14. Subspace identity model Computer vision: models, learning and inference. ©2011 Simon J.D. Prince 14
  • 15. Inference by comparing models Model 1 – Faces match (identity shared): Model 2 – Faces dont match (identities differ): Both models have standard form of factor analyzer Computer vision: models, learning and inference. ©2011 Simon J.D. Prince 15
  • 16. Inference by comparing models Compute likelihood (e.g. for model zero) where Compute posterior probability using Bayes rule Computer vision: models, learning and inference. ©2011 Simon J.D. Prince 16
  • 17. Face Recognition Tasks GALLERY PROBE … ? 1. CLOSED SET FACE IDENTIFICATION GALLERY PROBE … NO ? 2. OPEN SET MATCH FACE IDENTIFICATION PROBE NO MATCH ? 3. FACE VERIFICATION ? 4. FACE CLUSTERING Computer vision: models, learning and inference. ©2011 Simon J.D. Prince 17
  • 18. Inference by comparing models Computer vision: models, learning and inference. ©2011 Simon J.D. Prince 18
  • 19. Relation between models Computer vision: models, learning and inference. ©2011 Simon J.D. Prince 19
  • 20. Structure • Factor analysis review • Subspace identity model • Linear discriminant analysis • Non-linear models • Asymmetric bilinear model • Symmetric bilinear model • Applications Computer vision: models, learning and inference. ©2011 Simon J.D. Prince 20
  • 21. Probabilistic linear discriminant analysis Generative equation: Probabilistic form: Computer vision: models, learning and inference. ©2011 Simon J.D. Prince 21
  • 22. Probabilistic linear discriminant analysis Computer vision: models, learning and inference. ©2011 Simon J.D. Prince 22
  • 23. Learning E-Step – write out all images of same person as system of equations – Has standard form of factor analyzer – Use standard EM equation M-Step – write equation for each individual data point – Has standard form of factor analyzer – Use standard EM equation Computer vision: models, learning and inference. ©2011 Simon J.D. Prince 23
  • 24. Probabilistic linear discriminant analyis Computer vision: models, learning and inference. ©2011 Simon J.D. Prince 24
  • 25. Inference Model 1 – Faces match (identity shared): Model 2 – Faces dont match (identities differ): Both models have standard form of factor analyzer Compute likelihood in standard way Computer vision: models, learning and inference. ©2011 Simon J.D. Prince 25
  • 26. Example results (XM2VTS database) Computer vision: models, learning and inference. ©2011 Simon J.D. Prince 26
  • 27. Structure • Factor analysis review • Subspace identity model • Linear discriminant analysis • Non-linear models • Asymmetric bilinear model • Symmetric bilinear model • Applications Computer vision: models, learning and inference. ©2011 Simon J.D. Prince 27
  • 28. Non-linear models (mixture) Mixture model can describe non- linear manifold. Introduce variable ci which represents which cluster To be the same identity, must also belong to the same cluster Computer vision: models, learning and inference. ©2011 Simon J.D. Prince 28
  • 29. Non-linear models (kernel) • Pass hidden variable through non-linear function f[ ]. • Leads to kernelized algorithm • Identity equivalent of GPLVM Computer vision: models, learning and inference. ©2011 Simon J.D. Prince 29
  • 30. Structure • Factor analysis review • Subspace identity model • Linear discriminant analysis • Non-linear models • Asymmetric bilinear model • Symmetric bilinear model • Applications Computer vision: models, learning and inference. ©2011 Simon J.D. Prince 30
  • 31. Asymmetric bilinear model • Introduce style variable sij • indicates conditions in which data was observed • Example: lighting, pose, expression face recognition Asymmetric bilinear model • Introduce style variable sij • indicates conditions in which data was observed • Example: lighting, pose, expression face recognition Computer vision: models, learning and inference. ©2011 Simon J.D. Prince 31
  • 32. Asymmetric bilinear model Computer vision: models, learning and inference. ©2011 Simon J.D. Prince 32
  • 33. Asymmetric bilinear model Generative equation: Probabilistic form: Marginal density: Computer vision: models, learning and inference. ©2011 Simon J.D. Prince 33
  • 34. Learning E-Step: M-Step: Computer vision: models, learning and inference. ©2011 Simon J.D. Prince 34
  • 35. Asymmetric bilinear model Computer vision: models, learning and inference. ©2011 Simon J.D. Prince 35
  • 36. Inference – inferring style Likelihood of style Prior over style Compute posterior over style using Bayes’ rule Computer vision: models, learning and inference. ©2011 Simon J.D. Prince 36
  • 37. Inference – inferring identity Likelihood of identity Prior over identity Compute posterior over identity using Bayes’ rule Computer vision: models, learning and inference. ©2011 Simon J.D. Prince 37
  • 38. Inference – comparing identities Model 1 – Faces match (identity shared): Model 2 – Faces dont match (identities differ): Both models have standard form of factor analyzer Compute likelihood in standard way, combine with prior in Bayes rule Computer vision: models, learning and inference. ©2011 Simon J.D. Prince 38
  • 39. Inference – Style translation • Compute distribution over identity • Generate in new style Computer vision: models, learning and inference. ©2011 Simon J.D. Prince 39
  • 40. Structure • Factor analysis review • Subspace identity model • Linear discriminant analysis • Non-linear models • Asymmetric bilinear model • Symmetric bilinear model • Applications Computer vision: models, learning and inference. ©2011 Simon J.D. Prince 40
  • 41. Symmetric bilinear model Generative equation: Probabilistic form: Mean can also depend on style... Computer vision: models, learning and inference. ©2011 Simon J.D. Prince 41
  • 42. Symmetric bilinear model Computer vision: models, learning and inference. ©2011 Simon J.D. Prince 42
  • 43. Inference – translating style or identity Computer vision: models, learning and inference. ©2011 Simon J.D. Prince 43
  • 44. Multilinear models Extension of symmetric bilinear model to more than two factors e.g., Computer vision: models, learning and inference. ©2011 Simon J.D. Prince 44
  • 45. Structure • Factor analysis review • Subspace identity model • Linear discriminant analysis • Non-linear models • Asymmetric bilinear model • Symmetric bilinear model • Applications Computer vision: models, learning and inference. ©2011 Simon J.D. Prince 45
  • 46. Face recognition Computer vision: models, learning and inference. ©2011 Simon J.D. Prince 46
  • 47. Tensortextures Computer vision: models, learning and inference. ©2011 Simon J.D. Prince 47
  • 48. Synthesizing animation Computer vision: models, learning and inference. ©2011 Simon J.D. Prince 48
  • 49. Discussion • Generative models • Explain data as combination of identity and style factors • In identity recognition, we build models where identity was same or different • Other forms of inference such as style translation also possible Computer vision: models, learning and inference. ©2011 Simon J.D. Prince 49