SlideShare a Scribd company logo
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website:www.shakastech.com,Email - id:shakastech@gmail.com,info@shakastech.com
AUTOMATIC FACE NAMING BY LEARNING DISCRIMINATIVE AFFINITY
MATRICES FROM WEAKLY LABELED IMAGES
ABSTRACT
Given a collection of images, where each image contains several faces and is associated
with a few names in the corresponding caption, the goal of face naming is to infer the correct
name for each face. In this paper, we propose two new methods to effectively solve this problem
by learning two discriminative affinity matrices from these weakly labeled images. We first
propose a new method called regularized low-rank representation by effectively utilizing weakly
supervised information to learn a low-rank reconstruction coefficient matrix while exploring
multiple subspace structures of the data. Specifically, by introducing a specially designed
regularizer to the low-rank representation method, we penalize the corresponding reconstruction
coefficients related to the situations where a face is reconstructed by using face images from
other subjects or by using itself. With the inferred reconstruction coefficient matrix, a
discriminative affinity matrix can be obtained. Moreover, we also develop a new distance metric
learning method called ambiguously supervised structural metric learning by using weakly
supervised information to seek a discriminative distance metric. Hence, another discriminative
affinity matrix can be obtained using the similarity matrix (i.e., the kernel matrix) based on the
Mahalanobis distances of the data. Observing that these two affinity matrices contain
complementary information, we further combine them to obtain a fused affinity matrix, based on
which we develop a new iterative scheme to infer the name of each face. Comprehensive
experiments demonstrate the effectiveness of our approach.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website:www.shakastech.com,Email - id:shakastech@gmail.com,info@shakastech.com
EXISTING SYSTEM
Recently, there is an increasing research interest in developing automatic techniques for
face naming in images as well as in videos. To tag faces in news photos, Berg et al. proposed to
cluster the faces in the news images. Ozkan and Duygulu developed a graph-based method by
constructing the similarity graph of faces and finding the densest component. Guillaumin et al.
proposed the multiple-instance logistic discriminant metric learning (MildML) method. Luo and
Orabona proposed a structural support vector machine (SVM)-like algorithm called maximum
margin set (MMS) to solve the face naming problem. Recently, Zeng et al. proposed the low-
rank SVM (LR-SVM) approach to deal with this problem, based on the assumption that the
feature matrix formed by faces from the same subject is low rank. In the following, we compare
our proposed approaches with several related existing methods. Our rLRR method is related to
LRR and LR-SVM. LRR is an unsupervised approach for exploring multiple subspace structures
of data. In contrast to LRR, our rLRR utilizes the weak supervision from image captions and also
considers the image-level constraints when solving the weakly supervised face naming problem.
Moreover, our rLRR differs from LR-SVM [9] in the following two aspects. 1) To utilize the
weak supervision, LR-SVM considers weak supervision information in the partial permutation
matrices, while rLRR uses our proposed regularizer to penalize the corresponding reconstruction
coefficients. 2) LR-SVM is based on robust principal component analysis (RPCA) . Similarly to ,
LR-SVM does not reconstruct the data by using itself as the dictionary. In contrast, our rLRR is
related to the reconstruction based approach LRR. Moreover, our ASML is related to the
traditional metric learning works, such as large-margin nearest neighbors(LMNN) , Frobmetric ,
and metric learning to rank (MLR). LMNN and Frobmetric are based on accurate supervision
without ambiguity (i.e., the triplets of training samples are explicitly given), and they both use
the hinge loss in their formulation. In contrast, our ASML is based on the ambiguous
supervision, and we use a max margin loss to handle the ambiguity of the structural output, by
enforcing the distance based on the best label assignment matrix in the feasible label set to be
larger than the distance based on the best label assignment matrix in the infeasible label set by a
margin. Although a similar loss that deals with structural output is also used in MLR, it is used to
model the ranking orders of training samples, and there is no uncertainty regarding supervision
information in MLR (i.e., the groundtruth ordering for each query is given).
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website:www.shakastech.com,Email - id:shakastech@gmail.com,info@shakastech.com
PROPOSED SYSTEM:
In this paper, we propose a new scheme for automatic face naming with caption-based
supervision. Specifically, we develop two methods to respectively obtain two discriminative
affinity matrices by learning from weakly labeled images. The two affinity matrices are further
fused to generate one fused affinity matrix, based on which an iterative scheme is developed for
automatic face naming. To obtain the first affinity matrix, we propose a new method called
regularized low-rank representation (rLRR) by incorporating weakly supervised information into
the low-rank representation (LRR) method, so that the affinity matrix can be obtained from the
resultant reconstruction coefficient matrix. To effectively infer the correspondences between the
faces based on visual features and the names in the candidate name sets, we exploit the subspace
structures among faces based on the following assumption: the faces from the same
subject/name lie in the same subspace and the subspaces are linearly independent. Liu et al.
showed that such subspace structures can be effectively recovered using LRR, when the
subspaces are independent and the data sampling rate is sufficient. They also showed that the
mined subspace information is encoded in the reconstruction coefficient matrix that is block-
diagonal in the ideal case. As an intuitive motivation, we implement LRR on a synthetic dataset
and the resultant reconstruction coefficient matrix is shown in Fig. 2(b) (More details can be
found in Sections V-A and V-C). This near block-diagonal matrix validates our assumption on
the subspace structures among faces. Specifically, the reconstruction coefficients between one
face and faces from the same subject are generally larger than others, indicating that the faces
from the same subject tend to lie in the same subspace. However, due to the significant variances
of inthe- wild faces in poses, illuminations, and expressions, the appearances of faces from
different subjects may be even more similar when compared with those from the same subject.
The faces may also be reconstructed using faces from other subjects. In this paper, we show that
the candidate names from the captions can provide important supervision information to better
discover the subspace structures. Our main contributions are summarized as follows.
1) Based on the caption-based weak supervision, we propose a new method rLRR by
introducing a new regularizer into LRR and we can calculate the first affinity matrix using the
resultant reconstruction coefficient matrix.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website:www.shakastech.com,Email - id:shakastech@gmail.com,info@shakastech.com
2) We also propose a new distance metric learning approach ASML to learn a discriminative
distance metric by effectively coping with the ambiguous labels of faces. The similarity matrix
(i.e., the kernel matrix) based on the Mahalanobis distances between all faces is used as the
second affinity matrix.
3) With the fused affinity matrix by combining the two affinity matrices from rLRR and
ASML, we propose an efficient scheme to infer the names of faces.
4) Comprehensive experiments are conducted on one synthetic dataset and two real-world
datasets, and the results demonstrate the effectiveness of our approaches.
Module 1
Affinity Matrix
Since the principles of proximity and smooth-continuation arise from local properties of
the configuration of the edges, we can model them using only local information. Both of these
local properties are modeled by the distribution of smooth curves that pass through two given
edges. The distribution of curves is modeled by a smooth, stochastic motion of a particle. Given
two edges, we determine the probability that a particle starts with the position and direction of
the first edge and ends with the position and direction of the second edge. The affinity from the
first to the second edge is the sum of the probabilities of all paths that a particle can take between
the two edges. The change in direction of the particle over time is normally distributed with zero
mean. Smaller the variance of the distribution, the smoother are the more probable curves that
pass between two edges. Thus the variance of the normal distribution models the principle of
smooth-continuation. In addition each particle has a non-zero probability for decaying at any
time. Hence, edges that are farther apart are likely to have fewer curves that pass through both of
them. Thus the decay of the particles models the principle of proximity. The affinities between
all pairs of edges form the affinity matrix .
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website:www.shakastech.com,Email - id:shakastech@gmail.com,info@shakastech.com
Module 2
Learning discriminative affinity matrices For automatic face naming
In this section, we propose a new approach for automatic face naming with caption-
based supervision. In Sections III-A and III-B, we formally introduce the problem and
definitions, followed by the introduction of our proposed approach. Specifically, we learn two
discriminative affinity matrices by effectively utilizing the ambiguous labels, and perform face
naming based on the fused affinity matrix. In Sections III-C and III-D, we introduce our
proposed approaches rLRR and ASML for obtaining the two affinity matrices respectively. In
the remainder of this paper, we use lowercase/uppercase letters in boldface to denote a
vector/matrix (e.g., a denotes a vector and A denotes a matrix). The corresponding nonbold letter
with a subscript denotes the entry in a vector/matrix (e.g., ai denotes the i th entry of the vector
a, and Ai, j denotes an entry at the i th row and j th column of the matrix A). The superscript _
denotes the transpose of a vector or a matrix. We define In as the n ×n identity matrix, and 0n, 1n
∈ Rn as the n×1 column vectors of all zeros and all ones, respectively. For simplicity, we also
use I, 0 and 1 instead of In, 0n, and 1n when the dimensionality is obvious. Moreover, we use A
◦ B (resp., a ◦ b) to denote the element-wise product between two matrices A and B (resp., two
vectors a and b). tr(A) denotes the trace of A (i.e., tr(A) = _i Ai,i ), and _A,B_ denotes the inner
product of two matrices (i.e., _A,B_ = tr(A_B)). The inequality a ≤ b means that ai ≤ bi ∀ i = 1, .
. . , n and A 0 means that A is a positive semidefinite (PSD) matrix. _A_F = (_i, j A2i , j )1/2
denotes the Frobenious norm of a matrix A. _A_∞ denotes the largest absolute value of all
elements in A.
Module 3
Learning Discriminative Affinity Matrix With Regularized Low-Rank Representation
(rLRR)
We first give a brief review of LRR, and then present the proposed method that
introduces a discriminative regularizer into the objective of LRR. 1) Brief Review of LRR: LRR
[2] was originally proposed to solve the subspace clustering problem, which aims to explore the
subspace structure in the given data X = [x1, . . . , xn] ∈ Rd×n. Based on the assumption that the
subspaces are linearly independent, LRR [2] seeks a reconstruction matrix W = [w1, . . . ,wn] ∈
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website:www.shakastech.com,Email - id:shakastech@gmail.com,info@shakastech.com
Rn×n, where each wi denotes the representation of xi using X (i.e., the data matrix itself) as the
dictionary. Since X is used as the dictionary to reconstruct itself, the optimal solution W∗ of
LRR encodes the pairwise affinities between the data samples. As discussed in [2, Th. 3.1], in
the noise-free case, W∗ should be ideally block diagonal, where W∗ i, j _= 0 if the i th sample
and the j th sample are in the same subspace.
Module 4
Learning Discriminative Affinity Matrix by Ambiguously Supervised Structural Metric
Learning (ASML)
Besides obtaining the affinity matrix from the coefficient matrix W∗ from rLRR (or
LRR), we believe the similarity matrix (i.e., the kernel matrix) among the faces is also an
appropriate choice for the affinity matrix. Instead of straightforwardly using the Euclidean
distances, we seek a discriminative Mahalanobis distance metric M so that Mahalanobis
distances can be calculated based on the learnt metric, and the similarity matrix can be obtained
based on the Mahalanobis distances. In the following, we first briefly review the LMNN method,
which deals with fully-supervised problems with the groung-truth labels of samples provided,
and then introduce our proposed ASML method that extends LMNN for face naming from
weakly labeled images.
Module 5
Inferring names of faces
With the coefficient matrix W∗ learned from rLRR, we can calculate the first affinity
matrix as AW = 12 (W1+W2) and normalize AW to the range [0, 1]. Furthermore, with the learnt
distance metric M from ASML, we can calculate the second affinity matrix as AK = K, where K
is a kernel matrix based on the Mahalanobis distances between the faces. Since the two affinity
matrices explore weak supervision information in different ways, they contain complementary
information and both of them are beneficial for face naming. For better face naming
performance, we combine these two affinity matrices and perform face naming based on the
fused affinity matrix. Specifically, we obtain a fused affinity matrix A as the linear combination
of the two affinity matrices, i.e., A = (1 − α)AW + αAK, where α is a parameter in the range [0,
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website:www.shakastech.com,Email - id:shakastech@gmail.com,info@shakastech.com
1]. Finally, we perform face naming based on A. Since the fused affinity matrix is obtained
based on rLRR and ASML, we name our proposed method as rLRRml.
CONCLUSION
In this paper, we have proposed a new scheme for face naming with caption-based
supervision, in which one image that may contain multiple faces is associated with a caption
specifying only who is in the image. To effectively utilize the caption-based weak supervision,
we propose an LRR based method, called rLRR by introducing a new regularizer to utilize such
weak supervision information. We also develop a new distance metric learning method ASML
using weak supervision information to seek a discriminant Mahalanobis distance metric. Two
affinity matrices can be obtained from rLRR and ASML, respectively. Moreover, we further fuse
the two affinity matrices and additionally propose an iterative scheme for face naming based on
the fused affinity matrix. The experiments conducted on a synthetic dataset clearly demonstrate
the effectiveness of the new regularizer in rLRR. In the experiments on two challenging real-
world datasets (i.e., the Soccer player dataset and the Labeled Yahoo! News dataset), our rLRR
outperforms LRR, and our ASML is better than the existing distance metric learning method
MildML. Moreover, our proposed rLRRml outperforms rLRR and ASML, as well as several
state-of-the-art baseline algorithms. To further improve the face naming performances, we plan
to extend our rLRR in the future by additionally incorporating the _1-norm-based regularizer and
using other losses when designing new regularizers. We will also study how to automatically
determine the optimal parameters for our methods in the future.
REFERENCES
[1] P. Viola and M. J. Jones, “Robust real-time face detection,” Int. J. Comput. Vis., vol. 57, no.
2, pp. 137–154, 2004.
[2] G. Liu, Z. Lin, and Y. Yu, “Robust subspace segmentation by low-rank representation,” in
Proc. 27th Int. Conf. Mach. Learn., Haifa, Israel, Jun. 2010, pp. 663–670.
[3] T. L. Berg et al., “Names and faces in the news,” in Proc. 17th IEEE Comput. Soc. Conf.
Comput. Vis. Pattern Recognit., Washington, DC, USA, Jun./Jul. 2004, pp. II-848–II-854.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website:www.shakastech.com,Email - id:shakastech@gmail.com,info@shakastech.com
[4] D. Ozkan and P. Duygulu, “A graph based approach for naming faces in news photos,” in
Proc. 19th IEEE Comput. Soc. Conf. Comput. Vis. Pattern Recognit., New York, NY, USA, Jun.
2006, pp. 1477–1482.
[5] P. T. Pham, M. Moens, and T. Tuytelaars, “Cross-media alignment of names and faces,”
IEEE Trans. Multimedia, vol. 12, no. 1, pp. 13–27, Jan. 2010.
[6] M. Guillaumin, J. Verbeek, and C. Schmid, “Multiple instance metric learning from
automatically labeled bags of faces,” in Proc. 11th Eur. Conf. Comput. Vis., Heraklion, Crete,
Sep. 2010, pp. 634–647.
[7] J. Luo and F. Orabona, “Learning from candidate labeling sets,” in Proc. 23rd Annu. Conf.
Adv. Neural Inf. Process. Syst., Vancouver, BC, Canada, Dec. 2010, pp. 1504–1512.
[8] X. Zhang, L. Zhang, X.-J. Wang, and H.-Y. Shum, “Finding celebrities in billions of web
images,” IEEE Trans. Multimedia, vol. 14, no. 4, pp. 995–1007, Aug. 2012.
[9] Z. Zeng et al., “Learning by associating ambiguously labeled images,” in Proc. 26th IEEE
Conf. Comput. Vis. Pattern Recognit., Portland, OR, USA, Jun. 2013, pp. 708–715.
[10] M. Everingham, J. Sivic, and A. Zisserman, “Hello! My name is... Buffy—Automatic
naming of characters in TV video,” in Proc. 17th Brit. Mach. Vis. Conf., Edinburgh, U.K., Sep.
2006, pp. 899–908.
[11] J. Sang and C. Xu, “Robust face-name graph matching for movie character identification,”
IEEE Trans. Multimedia, vol. 14, no. 3, pp. 586–596, Jun. 2012.
[12] Y.-F. Zhang, C. Xu, H. Lu, and Y.-M. Huang, “Character identification in feature-length
films using global face-name matching,” IEEE Trans. Multimedia, vol. 11, no. 7, pp. 1276–1288,
Nov. 2009.
[13] M. Tapaswi, M. Bäuml, and R. Stiefelhagen, “‘Knock! Knock! Who is it?’ Probabilistic
person identification in TV series,” in Proc. 25th IEEE Conf. Comput. Vis. Pattern Recognit.,
Providence, RI, USA, Jun. 2012,
pp. 2658–2665.

More Related Content

What's hot

Learning to rank image tags with limited training examples
Learning to rank image tags with limited training examplesLearning to rank image tags with limited training examples
Learning to rank image tags with limited training examples
Pvrtechnologies Nellore
 
Learning to rank image tags with limited training examples
Learning to rank image tags with limited training examplesLearning to rank image tags with limited training examples
Learning to rank image tags with limited training examples
CloudTechnologies
 
Semi-Supervised Discriminant Analysis Based On Data Structure
Semi-Supervised Discriminant Analysis Based On Data StructureSemi-Supervised Discriminant Analysis Based On Data Structure
Semi-Supervised Discriminant Analysis Based On Data Structure
iosrjce
 
Scene text recognition in mobile applications by character descriptor and str...
Scene text recognition in mobile applications by character descriptor and str...Scene text recognition in mobile applications by character descriptor and str...
Scene text recognition in mobile applications by character descriptor and str...
eSAT Journals
 
Multiview Alignment Hashing for Efficient Image Search
Multiview Alignment Hashing for Efficient Image SearchMultiview Alignment Hashing for Efficient Image Search
Multiview Alignment Hashing for Efficient Image Search
1crore projects
 
Application of normalized cross correlation to image registration
Application of normalized cross correlation to image registrationApplication of normalized cross correlation to image registration
Application of normalized cross correlation to image registration
eSAT Publishing House
 
Paper id 312201512
Paper id 312201512Paper id 312201512
Paper id 312201512
IJRAT
 
Www.cs.berkeley.edu kunal
Www.cs.berkeley.edu kunalWww.cs.berkeley.edu kunal
Www.cs.berkeley.edu kunal
Kunal Kishor Nirala
 
IMPROVING SUPERVISED CLASSIFICATION OF DAILY ACTIVITIES LIVING USING NEW COST...
IMPROVING SUPERVISED CLASSIFICATION OF DAILY ACTIVITIES LIVING USING NEW COST...IMPROVING SUPERVISED CLASSIFICATION OF DAILY ACTIVITIES LIVING USING NEW COST...
IMPROVING SUPERVISED CLASSIFICATION OF DAILY ACTIVITIES LIVING USING NEW COST...
csandit
 
The Fuzzy Logical Databases
The Fuzzy Logical DatabasesThe Fuzzy Logical Databases
The Fuzzy Logical Databases
AlaaZ
 
LEARNING TO RANK IMAGE TAGS WITH LIMITED TRAINING EXAMPLES - IEEE PROJECTS I...
LEARNING TO RANK IMAGE TAGS WITH LIMITED TRAINING EXAMPLES  - IEEE PROJECTS I...LEARNING TO RANK IMAGE TAGS WITH LIMITED TRAINING EXAMPLES  - IEEE PROJECTS I...
LEARNING TO RANK IMAGE TAGS WITH LIMITED TRAINING EXAMPLES - IEEE PROJECTS I...
Nexgen Technology
 
Efficient Image Retrieval by Multi-view Alignment Technique with Non Negative...
Efficient Image Retrieval by Multi-view Alignment Technique with Non Negative...Efficient Image Retrieval by Multi-view Alignment Technique with Non Negative...
Efficient Image Retrieval by Multi-view Alignment Technique with Non Negative...
RSIS International
 
So sánh cấu trúc protein_Protein structure comparison
So sánh cấu trúc protein_Protein structure comparisonSo sánh cấu trúc protein_Protein structure comparison
So sánh cấu trúc protein_Protein structure comparison
bomxuan868
 
Fuzzy
FuzzyFuzzy
Scene Description From Images To Sentences
Scene Description From Images To SentencesScene Description From Images To Sentences
Scene Description From Images To Sentences
IRJET Journal
 

What's hot (15)

Learning to rank image tags with limited training examples
Learning to rank image tags with limited training examplesLearning to rank image tags with limited training examples
Learning to rank image tags with limited training examples
 
Learning to rank image tags with limited training examples
Learning to rank image tags with limited training examplesLearning to rank image tags with limited training examples
Learning to rank image tags with limited training examples
 
Semi-Supervised Discriminant Analysis Based On Data Structure
Semi-Supervised Discriminant Analysis Based On Data StructureSemi-Supervised Discriminant Analysis Based On Data Structure
Semi-Supervised Discriminant Analysis Based On Data Structure
 
Scene text recognition in mobile applications by character descriptor and str...
Scene text recognition in mobile applications by character descriptor and str...Scene text recognition in mobile applications by character descriptor and str...
Scene text recognition in mobile applications by character descriptor and str...
 
Multiview Alignment Hashing for Efficient Image Search
Multiview Alignment Hashing for Efficient Image SearchMultiview Alignment Hashing for Efficient Image Search
Multiview Alignment Hashing for Efficient Image Search
 
Application of normalized cross correlation to image registration
Application of normalized cross correlation to image registrationApplication of normalized cross correlation to image registration
Application of normalized cross correlation to image registration
 
Paper id 312201512
Paper id 312201512Paper id 312201512
Paper id 312201512
 
Www.cs.berkeley.edu kunal
Www.cs.berkeley.edu kunalWww.cs.berkeley.edu kunal
Www.cs.berkeley.edu kunal
 
IMPROVING SUPERVISED CLASSIFICATION OF DAILY ACTIVITIES LIVING USING NEW COST...
IMPROVING SUPERVISED CLASSIFICATION OF DAILY ACTIVITIES LIVING USING NEW COST...IMPROVING SUPERVISED CLASSIFICATION OF DAILY ACTIVITIES LIVING USING NEW COST...
IMPROVING SUPERVISED CLASSIFICATION OF DAILY ACTIVITIES LIVING USING NEW COST...
 
The Fuzzy Logical Databases
The Fuzzy Logical DatabasesThe Fuzzy Logical Databases
The Fuzzy Logical Databases
 
LEARNING TO RANK IMAGE TAGS WITH LIMITED TRAINING EXAMPLES - IEEE PROJECTS I...
LEARNING TO RANK IMAGE TAGS WITH LIMITED TRAINING EXAMPLES  - IEEE PROJECTS I...LEARNING TO RANK IMAGE TAGS WITH LIMITED TRAINING EXAMPLES  - IEEE PROJECTS I...
LEARNING TO RANK IMAGE TAGS WITH LIMITED TRAINING EXAMPLES - IEEE PROJECTS I...
 
Efficient Image Retrieval by Multi-view Alignment Technique with Non Negative...
Efficient Image Retrieval by Multi-view Alignment Technique with Non Negative...Efficient Image Retrieval by Multi-view Alignment Technique with Non Negative...
Efficient Image Retrieval by Multi-view Alignment Technique with Non Negative...
 
So sánh cấu trúc protein_Protein structure comparison
So sánh cấu trúc protein_Protein structure comparisonSo sánh cấu trúc protein_Protein structure comparison
So sánh cấu trúc protein_Protein structure comparison
 
Fuzzy
FuzzyFuzzy
Fuzzy
 
Scene Description From Images To Sentences
Scene Description From Images To SentencesScene Description From Images To Sentences
Scene Description From Images To Sentences
 

Similar to Automatic face naming by learning discriminative affinity matrices from weakly labeled images

Automatic face naming by learning discriminative
Automatic face naming by learning discriminativeAutomatic face naming by learning discriminative
Automatic face naming by learning discriminative
nexgentech15
 
AUTOMATIC FACE NAMING BY LEARNING DISCRIMINATIVE AFFINITY MATRICES FROM WEAKL...
AUTOMATIC FACE NAMING BY LEARNING DISCRIMINATIVE AFFINITY MATRICES FROM WEAKL...AUTOMATIC FACE NAMING BY LEARNING DISCRIMINATIVE AFFINITY MATRICES FROM WEAKL...
AUTOMATIC FACE NAMING BY LEARNING DISCRIMINATIVE AFFINITY MATRICES FROM WEAKL...
nexgentechnology
 
Automatic Face Naming by Learning Discriminative Affinity Matrices From Weakl...
Automatic Face Naming by Learning Discriminative Affinity Matrices From Weakl...Automatic Face Naming by Learning Discriminative Affinity Matrices From Weakl...
Automatic Face Naming by Learning Discriminative Affinity Matrices From Weakl...
1crore projects
 
LEARNING MIXTURES OF MARKOV CHAINS FROM AGGREGATE DATA WITH STRUCTURAL CONSTR...
LEARNING MIXTURES OF MARKOV CHAINS FROM AGGREGATE DATA WITH STRUCTURAL CONSTR...LEARNING MIXTURES OF MARKOV CHAINS FROM AGGREGATE DATA WITH STRUCTURAL CONSTR...
LEARNING MIXTURES OF MARKOV CHAINS FROM AGGREGATE DATA WITH STRUCTURAL CONSTR...
Nexgen Technology
 
Ieee transactions on image processing
Ieee transactions on image processingIeee transactions on image processing
Ieee transactions on image processing
tsysglobalsolutions
 
Learning weighted lower linear envelope potentials in binary markov random fi...
Learning weighted lower linear envelope potentials in binary markov random fi...Learning weighted lower linear envelope potentials in binary markov random fi...
Learning weighted lower linear envelope potentials in binary markov random fi...
jpstudcorner
 
2009 spie hmm
2009 spie hmm2009 spie hmm
Ok3425102516
Ok3425102516Ok3425102516
Ok3425102516
IJERA Editor
 
Matlab image processing_2013_ieee
Matlab image processing_2013_ieeeMatlab image processing_2013_ieee
Matlab image processing_2013_ieee
Igslabs Malleswaram
 
MATLAB IMPLEMENTATION OF SELF-ORGANIZING MAPS FOR CLUSTERING OF REMOTE SENSIN...
MATLAB IMPLEMENTATION OF SELF-ORGANIZING MAPS FOR CLUSTERING OF REMOTE SENSIN...MATLAB IMPLEMENTATION OF SELF-ORGANIZING MAPS FOR CLUSTERING OF REMOTE SENSIN...
MATLAB IMPLEMENTATION OF SELF-ORGANIZING MAPS FOR CLUSTERING OF REMOTE SENSIN...
Daksh Raj Chopra
 
An attribute assisted reranking model for web image search
An attribute assisted reranking model for web image searchAn attribute assisted reranking model for web image search
An attribute assisted reranking model for web image search
Shakas Technologies
 
IEEE Pattern analysis and machine intelligence 2016 Title and Abstract
IEEE Pattern analysis and machine intelligence 2016 Title and AbstractIEEE Pattern analysis and machine intelligence 2016 Title and Abstract
IEEE Pattern analysis and machine intelligence 2016 Title and Abstract
tsysglobalsolutions
 
ON THE PREDICTION ACCURACIES OF THREE MOST KNOWN REGULARIZERS : RIDGE REGRESS...
ON THE PREDICTION ACCURACIES OF THREE MOST KNOWN REGULARIZERS : RIDGE REGRESS...ON THE PREDICTION ACCURACIES OF THREE MOST KNOWN REGULARIZERS : RIDGE REGRESS...
ON THE PREDICTION ACCURACIES OF THREE MOST KNOWN REGULARIZERS : RIDGE REGRESS...
ijaia
 
IRJET-Multimodal Image Classification through Band and K-Means Clustering
IRJET-Multimodal Image Classification through Band and K-Means ClusteringIRJET-Multimodal Image Classification through Band and K-Means Clustering
IRJET-Multimodal Image Classification through Band and K-Means Clustering
IRJET Journal
 
Face detection using the 3 x3 block rank patterns of gradient magnitude images
Face detection using the 3 x3 block rank patterns of gradient magnitude imagesFace detection using the 3 x3 block rank patterns of gradient magnitude images
Face detection using the 3 x3 block rank patterns of gradient magnitude images
sipij
 
IMPROVING SUPERVISED CLASSIFICATION OF DAILY ACTIVITIES LIVING USING NEW COST...
IMPROVING SUPERVISED CLASSIFICATION OF DAILY ACTIVITIES LIVING USING NEW COST...IMPROVING SUPERVISED CLASSIFICATION OF DAILY ACTIVITIES LIVING USING NEW COST...
IMPROVING SUPERVISED CLASSIFICATION OF DAILY ACTIVITIES LIVING USING NEW COST...
cscpconf
 
LEARNING SPLINE MODELS WITH THE EM ALGORITHM FOR SHAPE RECOGNITION
LEARNING SPLINE MODELS WITH THE EM ALGORITHM FOR SHAPE RECOGNITIONLEARNING SPLINE MODELS WITH THE EM ALGORITHM FOR SHAPE RECOGNITION
LEARNING SPLINE MODELS WITH THE EM ALGORITHM FOR SHAPE RECOGNITION
gerogepatton
 
M.E Computer Science Remote Sensing Projects
M.E Computer Science Remote Sensing ProjectsM.E Computer Science Remote Sensing Projects
M.E Computer Science Remote Sensing Projects
Vijay Karan
 
M.Phil Computer Science Remote Sensing Projects
M.Phil Computer Science Remote Sensing ProjectsM.Phil Computer Science Remote Sensing Projects
M.Phil Computer Science Remote Sensing Projects
Vijay Karan
 
M phil-computer-science-remote-sensing-projects
M phil-computer-science-remote-sensing-projectsM phil-computer-science-remote-sensing-projects
M phil-computer-science-remote-sensing-projects
Vijay Karan
 

Similar to Automatic face naming by learning discriminative affinity matrices from weakly labeled images (20)

Automatic face naming by learning discriminative
Automatic face naming by learning discriminativeAutomatic face naming by learning discriminative
Automatic face naming by learning discriminative
 
AUTOMATIC FACE NAMING BY LEARNING DISCRIMINATIVE AFFINITY MATRICES FROM WEAKL...
AUTOMATIC FACE NAMING BY LEARNING DISCRIMINATIVE AFFINITY MATRICES FROM WEAKL...AUTOMATIC FACE NAMING BY LEARNING DISCRIMINATIVE AFFINITY MATRICES FROM WEAKL...
AUTOMATIC FACE NAMING BY LEARNING DISCRIMINATIVE AFFINITY MATRICES FROM WEAKL...
 
Automatic Face Naming by Learning Discriminative Affinity Matrices From Weakl...
Automatic Face Naming by Learning Discriminative Affinity Matrices From Weakl...Automatic Face Naming by Learning Discriminative Affinity Matrices From Weakl...
Automatic Face Naming by Learning Discriminative Affinity Matrices From Weakl...
 
LEARNING MIXTURES OF MARKOV CHAINS FROM AGGREGATE DATA WITH STRUCTURAL CONSTR...
LEARNING MIXTURES OF MARKOV CHAINS FROM AGGREGATE DATA WITH STRUCTURAL CONSTR...LEARNING MIXTURES OF MARKOV CHAINS FROM AGGREGATE DATA WITH STRUCTURAL CONSTR...
LEARNING MIXTURES OF MARKOV CHAINS FROM AGGREGATE DATA WITH STRUCTURAL CONSTR...
 
Ieee transactions on image processing
Ieee transactions on image processingIeee transactions on image processing
Ieee transactions on image processing
 
Learning weighted lower linear envelope potentials in binary markov random fi...
Learning weighted lower linear envelope potentials in binary markov random fi...Learning weighted lower linear envelope potentials in binary markov random fi...
Learning weighted lower linear envelope potentials in binary markov random fi...
 
2009 spie hmm
2009 spie hmm2009 spie hmm
2009 spie hmm
 
Ok3425102516
Ok3425102516Ok3425102516
Ok3425102516
 
Matlab image processing_2013_ieee
Matlab image processing_2013_ieeeMatlab image processing_2013_ieee
Matlab image processing_2013_ieee
 
MATLAB IMPLEMENTATION OF SELF-ORGANIZING MAPS FOR CLUSTERING OF REMOTE SENSIN...
MATLAB IMPLEMENTATION OF SELF-ORGANIZING MAPS FOR CLUSTERING OF REMOTE SENSIN...MATLAB IMPLEMENTATION OF SELF-ORGANIZING MAPS FOR CLUSTERING OF REMOTE SENSIN...
MATLAB IMPLEMENTATION OF SELF-ORGANIZING MAPS FOR CLUSTERING OF REMOTE SENSIN...
 
An attribute assisted reranking model for web image search
An attribute assisted reranking model for web image searchAn attribute assisted reranking model for web image search
An attribute assisted reranking model for web image search
 
IEEE Pattern analysis and machine intelligence 2016 Title and Abstract
IEEE Pattern analysis and machine intelligence 2016 Title and AbstractIEEE Pattern analysis and machine intelligence 2016 Title and Abstract
IEEE Pattern analysis and machine intelligence 2016 Title and Abstract
 
ON THE PREDICTION ACCURACIES OF THREE MOST KNOWN REGULARIZERS : RIDGE REGRESS...
ON THE PREDICTION ACCURACIES OF THREE MOST KNOWN REGULARIZERS : RIDGE REGRESS...ON THE PREDICTION ACCURACIES OF THREE MOST KNOWN REGULARIZERS : RIDGE REGRESS...
ON THE PREDICTION ACCURACIES OF THREE MOST KNOWN REGULARIZERS : RIDGE REGRESS...
 
IRJET-Multimodal Image Classification through Band and K-Means Clustering
IRJET-Multimodal Image Classification through Band and K-Means ClusteringIRJET-Multimodal Image Classification through Band and K-Means Clustering
IRJET-Multimodal Image Classification through Band and K-Means Clustering
 
Face detection using the 3 x3 block rank patterns of gradient magnitude images
Face detection using the 3 x3 block rank patterns of gradient magnitude imagesFace detection using the 3 x3 block rank patterns of gradient magnitude images
Face detection using the 3 x3 block rank patterns of gradient magnitude images
 
IMPROVING SUPERVISED CLASSIFICATION OF DAILY ACTIVITIES LIVING USING NEW COST...
IMPROVING SUPERVISED CLASSIFICATION OF DAILY ACTIVITIES LIVING USING NEW COST...IMPROVING SUPERVISED CLASSIFICATION OF DAILY ACTIVITIES LIVING USING NEW COST...
IMPROVING SUPERVISED CLASSIFICATION OF DAILY ACTIVITIES LIVING USING NEW COST...
 
LEARNING SPLINE MODELS WITH THE EM ALGORITHM FOR SHAPE RECOGNITION
LEARNING SPLINE MODELS WITH THE EM ALGORITHM FOR SHAPE RECOGNITIONLEARNING SPLINE MODELS WITH THE EM ALGORITHM FOR SHAPE RECOGNITION
LEARNING SPLINE MODELS WITH THE EM ALGORITHM FOR SHAPE RECOGNITION
 
M.E Computer Science Remote Sensing Projects
M.E Computer Science Remote Sensing ProjectsM.E Computer Science Remote Sensing Projects
M.E Computer Science Remote Sensing Projects
 
M.Phil Computer Science Remote Sensing Projects
M.Phil Computer Science Remote Sensing ProjectsM.Phil Computer Science Remote Sensing Projects
M.Phil Computer Science Remote Sensing Projects
 
M phil-computer-science-remote-sensing-projects
M phil-computer-science-remote-sensing-projectsM phil-computer-science-remote-sensing-projects
M phil-computer-science-remote-sensing-projects
 

More from Shakas Technologies

A Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying DetectionA Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying Detection
Shakas Technologies
 
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
Shakas Technologies
 
A Novel Framework for Credit Card.
A Novel Framework for Credit Card.A Novel Framework for Credit Card.
A Novel Framework for Credit Card.
Shakas Technologies
 
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
Shakas Technologies
 
NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024
Shakas Technologies
 
MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024
Shakas Technologies
 
Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024
Shakas Technologies
 
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
Shakas Technologies
 
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSECYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
Shakas Technologies
 
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Shakas Technologies
 
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTIONCOMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
Shakas Technologies
 
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCECO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
Shakas Technologies
 
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Shakas Technologies
 
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Shakas Technologies
 
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Shakas Technologies
 
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Shakas Technologies
 
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Shakas Technologies
 
Fighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docxFighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docx
Shakas Technologies
 
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Shakas Technologies
 
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Shakas Technologies
 

More from Shakas Technologies (20)

A Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying DetectionA Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying Detection
 
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
 
A Novel Framework for Credit Card.
A Novel Framework for Credit Card.A Novel Framework for Credit Card.
A Novel Framework for Credit Card.
 
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
 
NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024
 
MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024
 
Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024
 
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
 
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSECYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
 
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
 
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTIONCOMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
 
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCECO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
 
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
 
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
 
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
 
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
 
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
 
Fighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docxFighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docx
 
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
 
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
 

Recently uploaded

From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
Sease
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving
 
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's TipsGetting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
ScyllaDB
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
Enterprise Knowledge
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
christinelarrosa
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
zjhamm304
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
christinelarrosa
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
ScyllaDB
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!
Tobias Schneck
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 

Recently uploaded (20)

From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
 
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's TipsGetting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 

Automatic face naming by learning discriminative affinity matrices from weakly labeled images

  • 1. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website:www.shakastech.com,Email - id:shakastech@gmail.com,info@shakastech.com AUTOMATIC FACE NAMING BY LEARNING DISCRIMINATIVE AFFINITY MATRICES FROM WEAKLY LABELED IMAGES ABSTRACT Given a collection of images, where each image contains several faces and is associated with a few names in the corresponding caption, the goal of face naming is to infer the correct name for each face. In this paper, we propose two new methods to effectively solve this problem by learning two discriminative affinity matrices from these weakly labeled images. We first propose a new method called regularized low-rank representation by effectively utilizing weakly supervised information to learn a low-rank reconstruction coefficient matrix while exploring multiple subspace structures of the data. Specifically, by introducing a specially designed regularizer to the low-rank representation method, we penalize the corresponding reconstruction coefficients related to the situations where a face is reconstructed by using face images from other subjects or by using itself. With the inferred reconstruction coefficient matrix, a discriminative affinity matrix can be obtained. Moreover, we also develop a new distance metric learning method called ambiguously supervised structural metric learning by using weakly supervised information to seek a discriminative distance metric. Hence, another discriminative affinity matrix can be obtained using the similarity matrix (i.e., the kernel matrix) based on the Mahalanobis distances of the data. Observing that these two affinity matrices contain complementary information, we further combine them to obtain a fused affinity matrix, based on which we develop a new iterative scheme to infer the name of each face. Comprehensive experiments demonstrate the effectiveness of our approach.
  • 2. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website:www.shakastech.com,Email - id:shakastech@gmail.com,info@shakastech.com EXISTING SYSTEM Recently, there is an increasing research interest in developing automatic techniques for face naming in images as well as in videos. To tag faces in news photos, Berg et al. proposed to cluster the faces in the news images. Ozkan and Duygulu developed a graph-based method by constructing the similarity graph of faces and finding the densest component. Guillaumin et al. proposed the multiple-instance logistic discriminant metric learning (MildML) method. Luo and Orabona proposed a structural support vector machine (SVM)-like algorithm called maximum margin set (MMS) to solve the face naming problem. Recently, Zeng et al. proposed the low- rank SVM (LR-SVM) approach to deal with this problem, based on the assumption that the feature matrix formed by faces from the same subject is low rank. In the following, we compare our proposed approaches with several related existing methods. Our rLRR method is related to LRR and LR-SVM. LRR is an unsupervised approach for exploring multiple subspace structures of data. In contrast to LRR, our rLRR utilizes the weak supervision from image captions and also considers the image-level constraints when solving the weakly supervised face naming problem. Moreover, our rLRR differs from LR-SVM [9] in the following two aspects. 1) To utilize the weak supervision, LR-SVM considers weak supervision information in the partial permutation matrices, while rLRR uses our proposed regularizer to penalize the corresponding reconstruction coefficients. 2) LR-SVM is based on robust principal component analysis (RPCA) . Similarly to , LR-SVM does not reconstruct the data by using itself as the dictionary. In contrast, our rLRR is related to the reconstruction based approach LRR. Moreover, our ASML is related to the traditional metric learning works, such as large-margin nearest neighbors(LMNN) , Frobmetric , and metric learning to rank (MLR). LMNN and Frobmetric are based on accurate supervision without ambiguity (i.e., the triplets of training samples are explicitly given), and they both use the hinge loss in their formulation. In contrast, our ASML is based on the ambiguous supervision, and we use a max margin loss to handle the ambiguity of the structural output, by enforcing the distance based on the best label assignment matrix in the feasible label set to be larger than the distance based on the best label assignment matrix in the infeasible label set by a margin. Although a similar loss that deals with structural output is also used in MLR, it is used to model the ranking orders of training samples, and there is no uncertainty regarding supervision information in MLR (i.e., the groundtruth ordering for each query is given).
  • 3. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website:www.shakastech.com,Email - id:shakastech@gmail.com,info@shakastech.com PROPOSED SYSTEM: In this paper, we propose a new scheme for automatic face naming with caption-based supervision. Specifically, we develop two methods to respectively obtain two discriminative affinity matrices by learning from weakly labeled images. The two affinity matrices are further fused to generate one fused affinity matrix, based on which an iterative scheme is developed for automatic face naming. To obtain the first affinity matrix, we propose a new method called regularized low-rank representation (rLRR) by incorporating weakly supervised information into the low-rank representation (LRR) method, so that the affinity matrix can be obtained from the resultant reconstruction coefficient matrix. To effectively infer the correspondences between the faces based on visual features and the names in the candidate name sets, we exploit the subspace structures among faces based on the following assumption: the faces from the same subject/name lie in the same subspace and the subspaces are linearly independent. Liu et al. showed that such subspace structures can be effectively recovered using LRR, when the subspaces are independent and the data sampling rate is sufficient. They also showed that the mined subspace information is encoded in the reconstruction coefficient matrix that is block- diagonal in the ideal case. As an intuitive motivation, we implement LRR on a synthetic dataset and the resultant reconstruction coefficient matrix is shown in Fig. 2(b) (More details can be found in Sections V-A and V-C). This near block-diagonal matrix validates our assumption on the subspace structures among faces. Specifically, the reconstruction coefficients between one face and faces from the same subject are generally larger than others, indicating that the faces from the same subject tend to lie in the same subspace. However, due to the significant variances of inthe- wild faces in poses, illuminations, and expressions, the appearances of faces from different subjects may be even more similar when compared with those from the same subject. The faces may also be reconstructed using faces from other subjects. In this paper, we show that the candidate names from the captions can provide important supervision information to better discover the subspace structures. Our main contributions are summarized as follows. 1) Based on the caption-based weak supervision, we propose a new method rLRR by introducing a new regularizer into LRR and we can calculate the first affinity matrix using the resultant reconstruction coefficient matrix.
  • 4. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website:www.shakastech.com,Email - id:shakastech@gmail.com,info@shakastech.com 2) We also propose a new distance metric learning approach ASML to learn a discriminative distance metric by effectively coping with the ambiguous labels of faces. The similarity matrix (i.e., the kernel matrix) based on the Mahalanobis distances between all faces is used as the second affinity matrix. 3) With the fused affinity matrix by combining the two affinity matrices from rLRR and ASML, we propose an efficient scheme to infer the names of faces. 4) Comprehensive experiments are conducted on one synthetic dataset and two real-world datasets, and the results demonstrate the effectiveness of our approaches. Module 1 Affinity Matrix Since the principles of proximity and smooth-continuation arise from local properties of the configuration of the edges, we can model them using only local information. Both of these local properties are modeled by the distribution of smooth curves that pass through two given edges. The distribution of curves is modeled by a smooth, stochastic motion of a particle. Given two edges, we determine the probability that a particle starts with the position and direction of the first edge and ends with the position and direction of the second edge. The affinity from the first to the second edge is the sum of the probabilities of all paths that a particle can take between the two edges. The change in direction of the particle over time is normally distributed with zero mean. Smaller the variance of the distribution, the smoother are the more probable curves that pass between two edges. Thus the variance of the normal distribution models the principle of smooth-continuation. In addition each particle has a non-zero probability for decaying at any time. Hence, edges that are farther apart are likely to have fewer curves that pass through both of them. Thus the decay of the particles models the principle of proximity. The affinities between all pairs of edges form the affinity matrix .
  • 5. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website:www.shakastech.com,Email - id:shakastech@gmail.com,info@shakastech.com Module 2 Learning discriminative affinity matrices For automatic face naming In this section, we propose a new approach for automatic face naming with caption- based supervision. In Sections III-A and III-B, we formally introduce the problem and definitions, followed by the introduction of our proposed approach. Specifically, we learn two discriminative affinity matrices by effectively utilizing the ambiguous labels, and perform face naming based on the fused affinity matrix. In Sections III-C and III-D, we introduce our proposed approaches rLRR and ASML for obtaining the two affinity matrices respectively. In the remainder of this paper, we use lowercase/uppercase letters in boldface to denote a vector/matrix (e.g., a denotes a vector and A denotes a matrix). The corresponding nonbold letter with a subscript denotes the entry in a vector/matrix (e.g., ai denotes the i th entry of the vector a, and Ai, j denotes an entry at the i th row and j th column of the matrix A). The superscript _ denotes the transpose of a vector or a matrix. We define In as the n ×n identity matrix, and 0n, 1n ∈ Rn as the n×1 column vectors of all zeros and all ones, respectively. For simplicity, we also use I, 0 and 1 instead of In, 0n, and 1n when the dimensionality is obvious. Moreover, we use A ◦ B (resp., a ◦ b) to denote the element-wise product between two matrices A and B (resp., two vectors a and b). tr(A) denotes the trace of A (i.e., tr(A) = _i Ai,i ), and _A,B_ denotes the inner product of two matrices (i.e., _A,B_ = tr(A_B)). The inequality a ≤ b means that ai ≤ bi ∀ i = 1, . . . , n and A 0 means that A is a positive semidefinite (PSD) matrix. _A_F = (_i, j A2i , j )1/2 denotes the Frobenious norm of a matrix A. _A_∞ denotes the largest absolute value of all elements in A. Module 3 Learning Discriminative Affinity Matrix With Regularized Low-Rank Representation (rLRR) We first give a brief review of LRR, and then present the proposed method that introduces a discriminative regularizer into the objective of LRR. 1) Brief Review of LRR: LRR [2] was originally proposed to solve the subspace clustering problem, which aims to explore the subspace structure in the given data X = [x1, . . . , xn] ∈ Rd×n. Based on the assumption that the subspaces are linearly independent, LRR [2] seeks a reconstruction matrix W = [w1, . . . ,wn] ∈
  • 6. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website:www.shakastech.com,Email - id:shakastech@gmail.com,info@shakastech.com Rn×n, where each wi denotes the representation of xi using X (i.e., the data matrix itself) as the dictionary. Since X is used as the dictionary to reconstruct itself, the optimal solution W∗ of LRR encodes the pairwise affinities between the data samples. As discussed in [2, Th. 3.1], in the noise-free case, W∗ should be ideally block diagonal, where W∗ i, j _= 0 if the i th sample and the j th sample are in the same subspace. Module 4 Learning Discriminative Affinity Matrix by Ambiguously Supervised Structural Metric Learning (ASML) Besides obtaining the affinity matrix from the coefficient matrix W∗ from rLRR (or LRR), we believe the similarity matrix (i.e., the kernel matrix) among the faces is also an appropriate choice for the affinity matrix. Instead of straightforwardly using the Euclidean distances, we seek a discriminative Mahalanobis distance metric M so that Mahalanobis distances can be calculated based on the learnt metric, and the similarity matrix can be obtained based on the Mahalanobis distances. In the following, we first briefly review the LMNN method, which deals with fully-supervised problems with the groung-truth labels of samples provided, and then introduce our proposed ASML method that extends LMNN for face naming from weakly labeled images. Module 5 Inferring names of faces With the coefficient matrix W∗ learned from rLRR, we can calculate the first affinity matrix as AW = 12 (W1+W2) and normalize AW to the range [0, 1]. Furthermore, with the learnt distance metric M from ASML, we can calculate the second affinity matrix as AK = K, where K is a kernel matrix based on the Mahalanobis distances between the faces. Since the two affinity matrices explore weak supervision information in different ways, they contain complementary information and both of them are beneficial for face naming. For better face naming performance, we combine these two affinity matrices and perform face naming based on the fused affinity matrix. Specifically, we obtain a fused affinity matrix A as the linear combination of the two affinity matrices, i.e., A = (1 − α)AW + αAK, where α is a parameter in the range [0,
  • 7. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website:www.shakastech.com,Email - id:shakastech@gmail.com,info@shakastech.com 1]. Finally, we perform face naming based on A. Since the fused affinity matrix is obtained based on rLRR and ASML, we name our proposed method as rLRRml. CONCLUSION In this paper, we have proposed a new scheme for face naming with caption-based supervision, in which one image that may contain multiple faces is associated with a caption specifying only who is in the image. To effectively utilize the caption-based weak supervision, we propose an LRR based method, called rLRR by introducing a new regularizer to utilize such weak supervision information. We also develop a new distance metric learning method ASML using weak supervision information to seek a discriminant Mahalanobis distance metric. Two affinity matrices can be obtained from rLRR and ASML, respectively. Moreover, we further fuse the two affinity matrices and additionally propose an iterative scheme for face naming based on the fused affinity matrix. The experiments conducted on a synthetic dataset clearly demonstrate the effectiveness of the new regularizer in rLRR. In the experiments on two challenging real- world datasets (i.e., the Soccer player dataset and the Labeled Yahoo! News dataset), our rLRR outperforms LRR, and our ASML is better than the existing distance metric learning method MildML. Moreover, our proposed rLRRml outperforms rLRR and ASML, as well as several state-of-the-art baseline algorithms. To further improve the face naming performances, we plan to extend our rLRR in the future by additionally incorporating the _1-norm-based regularizer and using other losses when designing new regularizers. We will also study how to automatically determine the optimal parameters for our methods in the future. REFERENCES [1] P. Viola and M. J. Jones, “Robust real-time face detection,” Int. J. Comput. Vis., vol. 57, no. 2, pp. 137–154, 2004. [2] G. Liu, Z. Lin, and Y. Yu, “Robust subspace segmentation by low-rank representation,” in Proc. 27th Int. Conf. Mach. Learn., Haifa, Israel, Jun. 2010, pp. 663–670. [3] T. L. Berg et al., “Names and faces in the news,” in Proc. 17th IEEE Comput. Soc. Conf. Comput. Vis. Pattern Recognit., Washington, DC, USA, Jun./Jul. 2004, pp. II-848–II-854.
  • 8. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website:www.shakastech.com,Email - id:shakastech@gmail.com,info@shakastech.com [4] D. Ozkan and P. Duygulu, “A graph based approach for naming faces in news photos,” in Proc. 19th IEEE Comput. Soc. Conf. Comput. Vis. Pattern Recognit., New York, NY, USA, Jun. 2006, pp. 1477–1482. [5] P. T. Pham, M. Moens, and T. Tuytelaars, “Cross-media alignment of names and faces,” IEEE Trans. Multimedia, vol. 12, no. 1, pp. 13–27, Jan. 2010. [6] M. Guillaumin, J. Verbeek, and C. Schmid, “Multiple instance metric learning from automatically labeled bags of faces,” in Proc. 11th Eur. Conf. Comput. Vis., Heraklion, Crete, Sep. 2010, pp. 634–647. [7] J. Luo and F. Orabona, “Learning from candidate labeling sets,” in Proc. 23rd Annu. Conf. Adv. Neural Inf. Process. Syst., Vancouver, BC, Canada, Dec. 2010, pp. 1504–1512. [8] X. Zhang, L. Zhang, X.-J. Wang, and H.-Y. Shum, “Finding celebrities in billions of web images,” IEEE Trans. Multimedia, vol. 14, no. 4, pp. 995–1007, Aug. 2012. [9] Z. Zeng et al., “Learning by associating ambiguously labeled images,” in Proc. 26th IEEE Conf. Comput. Vis. Pattern Recognit., Portland, OR, USA, Jun. 2013, pp. 708–715. [10] M. Everingham, J. Sivic, and A. Zisserman, “Hello! My name is... Buffy—Automatic naming of characters in TV video,” in Proc. 17th Brit. Mach. Vis. Conf., Edinburgh, U.K., Sep. 2006, pp. 899–908. [11] J. Sang and C. Xu, “Robust face-name graph matching for movie character identification,” IEEE Trans. Multimedia, vol. 14, no. 3, pp. 586–596, Jun. 2012. [12] Y.-F. Zhang, C. Xu, H. Lu, and Y.-M. Huang, “Character identification in feature-length films using global face-name matching,” IEEE Trans. Multimedia, vol. 11, no. 7, pp. 1276–1288, Nov. 2009. [13] M. Tapaswi, M. Bäuml, and R. Stiefelhagen, “‘Knock! Knock! Who is it?’ Probabilistic person identification in TV series,” in Proc. 25th IEEE Conf. Comput. Vis. Pattern Recognit., Providence, RI, USA, Jun. 2012, pp. 2658–2665.