50 4. SEARCH PRUNING IN VIDEO SURVEILLANCE SYSTEMSWe proceed to analyze these issues and first recall that for a given authentication group v,the categorization algorithm identifies set S <strong>of</strong> all unpruned subjects, defined as S = {v ∈ v :Ĉ(v) = 1}. We are here interested in the size <strong>of</strong> the search after pruning, specifically in theparameterτ := |S| , 0 ≤ τ ≤ ρ, (4.10)n/ρwhich represents 2 a relative deviation <strong>of</strong> |S| from a baseline n/ρ. It can be seen that the typical,i.e., common, value <strong>of</strong>τ is (see also Section 4.5.1)|S|ρ∑τ 0 := E vn/ρ = ρ p f ɛ f . (4.11)We are now interested in the entire tail behavior (not just the typical part <strong>of</strong> it), i.e., we are interestedin understanding the probability <strong>of</strong> having an authentication groupvthat results in atypicallyunhelpful pruning (τ > τ 0 ), or atypically helpful pruning (τ < τ 0 ).Towards this letα 0,f (v) := |C f|n/ρ , (4.12)let a 0 (v) = {α 0,f (v)} ρ f=1describe the instantaneous normalized distribution (histogram) <strong>of</strong>{|C f |} ρ f=1for the specific, randomly chosen and fixed authentication group v, and letf=1p := {p f } ρ f=1 = {E |C f |vn }ρ f=1 , (4.13)denote the normalized statistical population distribution <strong>of</strong> {|C f |} ρ f=1 .Furthermore, for a given v, letα 1,f (v) := |C f ∩S|, 0 ≤ α 1,f ≤ ρ, (4.14)n/ρlet α 1 (v) := {a 1,f (v)} ρ f=1 , and α(v) := {α 0(v),α 1 (v)}, and let 3V(τ) := { 0 ≤ α 1,f ≤ min(τ,α 0,f ),ρ∑α 1,f = τ } , (4.15)denote the set <strong>of</strong> valid α for a given τ, i.e., describe the set <strong>of</strong> all possible authentication groupsand categorization errors that can result in|S| = τ n ρ .Given the information that α 1 has on α 0 , given that τ is implied by α 1 , and given that thealgorithms here categorize a subject independently <strong>of</strong> other subjects, it can be seen that for anyα ∈ V(τ), it is the case thatf=1P(α,τ) = P(α 0 ,α 1 ) = P(α 0 )P(α 1 |α 0 ) (4.16)ρ∏ ρ∏= P(α 0,f ) P(α 1,f |α 0,f ). (4.17)f=12. Note the small change in notation compared to Section 4.2. This change is meant to make the derivations moreconcise.3. For simplicity <strong>of</strong> notation we will henceforth use α 0,α 1,α,α 0,f ,α 1,f and let the association tov be impliedf=1
51The following lemma describes the asymptotic behavior <strong>of</strong> P(α,τ), for any α ∈ V(τ). Toclarify, the lemma describes the asymptotic rate <strong>of</strong> decay <strong>of</strong> the joint probability <strong>of</strong> an authenticationgroup with histogram α 0 and an estimation/categorization process corresponding to α 1 ,given that the group and categorization process result in an unpruned set <strong>of</strong> size|S| = τ n ρ(4.18)for some 0 ≤ τ ≤ ρ. This behavior will be described below as a concise function <strong>of</strong> the binomialrate-function (see [CT06])The lemma follows.I f (x) ={xlog(xɛ f)+(1−x)log( 1−x1−ɛ f) f ≥ 2xlog( x1−ɛ 1)+(1−x)log( 1−xɛ 1) f = 1.(4.19)Lemma 6wherelog− limN→∞ n/ρ P(α,τ) = ρD(α 0||p)+D(α 0 ||p) = ∑ fρ∑f=1α 0,f log α 0,fp fα 0,f I f(α 1,fα 0,f),is the informational divergence between α 0 and p (see [CT06]).The pro<strong>of</strong> follows soon after. We now proceed with the main result, which averages the outcomein Lemma 6, over all possible authentication groups.Theorem 2 In SBS-based pruning, the size <strong>of</strong> the remaining set |S|, satisfies the following:logρ∑J(τ) := − limN→∞ n/ρ P(|S| ≈ τn ρ ) = inf ρ α 0,f log α 0,f+α∈V p fFurthermore we have the following.f=1ρ∑f=1α 0,f I f(α 1,fα 0,f). (4.20)Theorem 3 The probability that after pruning, the search space is bigger (resp. smaller) thanτ n ρ , is given for τ ≥ τ 0 byand for τ < τ 0log− limN→∞ n/ρ P(|S| > τn ) = J(τ) (4.21)ρlog− limN→∞ n/ρ P(|S| < τn ) = J(τ). (4.22)ρThe above describe how <strong>of</strong>ten we encounter authentication groupsvand feature estimation behaviorthat jointly cause the gain to deviate, by a specific degree, from the common behavior describedin (4.11), i.e., how <strong>of</strong>ten the pruning is atypically ineffective or atypically effective. We <strong>of</strong>fer theintuition that the atypical behavior <strong>of</strong> the pruning gain is dominated by a small set <strong>of</strong> authenticationgroups, that minimize the expression in Theorem 2. Such minimization was presented inFig. 4.3, and in examples that will follow after the pro<strong>of</strong>s.Please see the Annex B for the pro<strong>of</strong>s.The following examples are meant to provide insight on the statistical behavior <strong>of</strong> pruning.
- Page 1: FACIAL SOFT BIOMETRICSMETHODS, APPL
- Page 5: AcknowledgementsThis thesis would n
- Page 8: 6hair, skin and clothes. The propos
- Page 11 and 12: 97 Practical implementation of soft
- Page 13 and 14: 11Notations used in this workE : st
- Page 15 and 16: 13Chapter 1IntroductionTraditional
- Page 17 and 18: 15event of collision, which is of s
- Page 19 and 20: 17ric. In Section 6.6 we employ the
- Page 21 and 22: 19Chapter 2Soft biometrics: charact
- Page 23 and 24: 21is the fusion of soft biometrics
- Page 25 and 26: 23plied on low resolution grey scal
- Page 27 and 28: 25Chapter 3Bag of facial soft biome
- Page 29 and 30: 27In this setting we clearly assign
- Page 31 and 32: 29Table 3.1: SBSs with symmetric tr
- Page 33 and 34: 31corresponding to p(n,ρ). Towards
- Page 35 and 36: the same category (all subjects in
- Page 37 and 38: 3.5.2 Analysis of interference patt
- Page 39 and 40: an SBS by increasing ρ, then what
- Page 41 and 42: 39Table 3.4: Example for a heuristi
- Page 43 and 44: 41for a given randomly chosen authe
- Page 45 and 46: 43Chapter 4Search pruning in video
- Page 47 and 48: 45Figure 4.1: System overview.SBS m
- Page 49 and 50: 472.52rate of decay of P(τ)1.510.5
- Page 51: 49to be the probability that the al
- Page 55 and 56: 534.5.1 Typical behavior: average g
- Page 57 and 58: 55n = 50 subjects, out of which we
- Page 59 and 60: 5710.950.9pruning Gain r(vt)0.850.8
- Page 61 and 62: 59for one person, for trait t, t =
- Page 63 and 64: 61Chapter 5Frontal-to-side person r
- Page 65 and 66: 63Figure 5.1: Frontal / gallery and
- Page 67 and 68: 6510.90.80.7Skin colorHair colorShi
- Page 69 and 70: 6710.90.80.70.6Perr0.50.40.30.20.10
- Page 71 and 72: 69Chapter 6Soft biometrics for quan
- Page 73 and 74: 71raphy considerations include [BSS
- Page 75 and 76: 73Figure 6.3: Example image of the
- Page 77 and 78: 75A direct way to find a relationsh
- Page 79 and 80: 77- Pearson’s correlation coeffic
- Page 81 and 82: 79shown to have a high impact on ou
- Page 83 and 84: 81Chapter 7Practical implementation
- Page 85 and 86: 834) Eye glasses detection: Towards
- Page 87 and 88: 857.2 Eye color as a soft biometric
- Page 89 and 90: 87Table 7.5: GMM eye color results
- Page 91 and 92: 89and office lights, daylight, flas
- Page 93 and 94: 917.5 SummaryThis chapter presented
- Page 95 and 96: 93Chapter 8User acceptance study re
- Page 97 and 98: 95Table 8.1: User experience on acc
- Page 99 and 100: 97scared of their PIN being spying.
- Page 101 and 102: 99Table 8.2: Comparison of existing
- Page 103 and 104:
101ConclusionsThis dissertation exp
- Page 105 and 106:
103Future WorkIt is becoming appare
- Page 107 and 108:
105Appendix AAppendix for Section 3
- Page 109 and 110:
107- We are now left withN −F = 2
- Page 111 and 112:
109Appendix BAppendix to Section 4B
- Page 113 and 114:
111Blue Green Brown BlackBlue 0.75
- Page 115 and 116:
113Appendix CAppendix for Section 6
- Page 117 and 118:
115Appendix DPublicationsThe featur
- Page 119 and 120:
117Bibliography[AAR04] S. Agarwal,
- Page 121 and 122:
119[FCB08] L. Franssen, J. E. Coppe
- Page 123 and 124:
121[Ley96] M. Leyton. The architect
- Page 125 and 126:
123[RN11] D. Reid and M. Nixon. Usi
- Page 127 and 128:
125[ZG09] X. Zhang and Y. Gao. Face
- Page 129:
2Rapporteurs:Prof. Dr. Abdenour HAD
- Page 132 and 133:
Biométrie faciale douce 2Les terme
- Page 134 and 135:
Biométrie faciale douce 4une perso
- Page 136 and 137:
Couleur depeauCouleur descheveuxCou
- Page 138 and 139:
Biométrie faciale douce 8Nous nous
- Page 140 and 141:
Biométrie faciale douce 103. Proba
- Page 142 and 143:
Biométrie faciale douce 12l’entr
- Page 144 and 145:
Biométrie faciale douce 14Figure 6
- Page 146 and 147:
Biométrie faciale douce 16pages 77
- Page 148 and 149:
Reviewers:Prof. Dr. Abdenour HADID,
- Page 150 and 151:
3hair, skin and clothes. The propos
- Page 152 and 153:
person in the red shirt”. Further
- Page 154 and 155:
7- Not requiring the individual’s
- Page 156 and 157:
9Probability of Collision10.90.80.7
- Page 158 and 159:
11the color FERET dataset [Fer11] w
- Page 160 and 161:
13Table 2: Table of Facial soft bio
- Page 162 and 163:
15Chapter 1PublicationsThe featured
- Page 164 and 165:
17Bibliography[ACPR10] D. Adjeroh,
- Page 166 and 167:
19[ZESH04] R. Zewail, A. Elsafi, M.