Figure 4 shows sample images from these cameras.
The dataset used for our experiments has got more
than 5000 images, from which 40 people were ex-
tracted (18 in the first scenario, and 22 in the second).
For more details on the use of this database, please
contact the authors. For testing purposes, a suspicious
target person (see Figure 5) was considered and used
in both scenarios. Thus, when the WYA
2
method is
tested using the suspicious target as target person, it
is expected that proper bag of features is going to be
selected in scenario 1. Using such a bag of features, it
is expected that this person is going to be detected as
suspicious in scenario 2. No other people were pre-
sented in both scenarios. Thus, when the WYA
2
is
tested using as target person a non-suspicious person
in scenario 1, it is expected that no suspicious person
is going to be detected in scenario 2.
3.1 Features Extraction
The first step for Features Extraction is to detect and
extract the humans presented in each image using
the background substraction method based on Gaus-
sian Mixture of Models (GMM) for object detection.
Then, a set of well-known soft-biometric features is
extracted from each person. In most of the litera-
ture works, few features are considered. However,
we consider a complete set of different feature cat-
egories. These categories are the RGB color space,
the HSV color space, the co-ocurrence matrix (Haral-
ick, 1979), and the Local Binary Pattern (Ojala et al.,
1994). Thus, we have taken into account a total of 222
bags of features. A complete list of the Bag of Fea-
tures considered is presented in Table 1. For instance,
the first six bags of features correspond to the Mean
and Typical Deviation of the channels R,G,B, H, S
and V using the image as source of information. The
next bags of features are related the Mean, Typical
Deviation, Skewness and Kurtosis of each channel of
the Histogram. The next bags of features are related
the Dispersion, Energy and Entropy of each channel
of the Histogram, an so on.
4 EXPERIMENTS
In order to test the performance of our approach, the
WYA
2
method was tested on the 18 detected per-
sons in scenario 1. Thus, the most discriminate fea-
tures for each target person were extracted, and used
to re-identification in scenario 2. The main results
are presented in Table 2. For each target person the
ID of the bags of features selected as optimal for
re-identification tasks using the WYA
2
method are
shown. In addition, the suspicious person detected
(if any) in scenario 2 when the optimal set of features
was used is presented.
It is clear that the set of bag of features selected de-
pends on each person. In fact, different number of
bags of features were selected in any case. For in-
stance, for person number 1 (the suspicious target
presented in both scenarios), the optimal bag of fea-
tures are: Sum Mean, Sum Std, Sum Entropy ob-
tained from channel R, source SGLD Matrix 90
◦
, and
[Mean, Typical Deviation], channel S, source Image.
In this case, the suspicious target (ID 1) is correctly
detected as suspicious person in scenario 2 with the
information extracted by the WYA
2
method in sce-
nario 1.
For person number 2 the optimal bag of features are:
[Mean, Typical Deviation], channel G, source Image,
and [Dispersion, Energy, Entropy], channel G, source
Histogram. This information causes that the WYA
2
detects as suspicious person the ID 1 (the suspicious
target). Thus, an error occurs. To analyze this error
the discriminative power of the bags of features ob-
tained for person number 2 were tested over person
number 1 in scenario 1. As expected these bags of
features were able to discriminate properly the suspi-
cious target. That is, when bags of features number 2
and number 14 are considered individually, they have
a high discriminative power regarding person num-
ber 1. However these bags of features were not se-
lected during the forward selection method proposed
in WYA
2
. Their discriminative power is very low
when bags of features numbers 5 and 79 are in the
model.
Images of people ID 1 and ID 2 in scenario 1, and
person ID 1 in scenario 2 are presented in Figure 6.
When the WYA
2
was trained for the rest of the people
in scenario 1, no suspicious people were detected in
scenario 2. That is, the information that best discrim-
inate these persons was not able to detect suspicious
people in a new environment. This is expected since
the bags of features that best discriminate the suspi-
cious target in scenario 1 (labeled as 5 and 79), were
not obtained as relevant bag of features for any other
person.
5 CONCLUSIONS
In this paper, a novel methodology for human re-
identification in multi-camera VideoSurveillance en-
vironment scenarios has been presented. The method,
has been called WYA
2
: “Why You Are Who You
Are”. WYA
2
is designed to select the best individ-
ual bags of features for each individual in the dataset
SIGMAP 2017 - 14th International Conference on Signal Processing and Multimedia Applications
38