2014 11th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS) 2014
DOI: 10.1109/avss.2014.6918667
|View full text |Cite
|
Sign up to set email alerts
|

A soft-biometrics dataset for person tracking and re-identification

Abstract: In this work we present a new dataset for the tasks person detection, tracking, re-identification, and soft-biometric attribute detection in surveillance data. The dataset was recorded over three days and consists of more than 30 individuals moving through a network of seven cameras. Person tracks are labeled with consistent IDs as well as softbiometric attributes, such as a description of the clothing, gender, or height. Persons in the video data alter their appearance by changing clothes or wearing accessori… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 18 publications
(12 citation statements)
references
References 17 publications
0
12
0
Order By: Relevance
“…In turn, this distrust could serve as a disincentive for organizations to implement this type of threat-avoidance solution. Other researchers have described methods of using disparate data sources along with security system data to reidentify otherwise anonymous individuals (Salvagnini, Bazzani, Cristani, & Murino, 2013;Schumann & Monari, 2014). In some cases, such as in analyzing keystrokes as a behavioral biometric, collecting the required security system data may lead to privacy risks if exposed (Sun & Upadhyaya, 2015).…”
Section: Distrust Propensitymentioning
confidence: 99%
“…In turn, this distrust could serve as a disincentive for organizations to implement this type of threat-avoidance solution. Other researchers have described methods of using disparate data sources along with security system data to reidentify otherwise anonymous individuals (Salvagnini, Bazzani, Cristani, & Murino, 2013;Schumann & Monari, 2014). In some cases, such as in analyzing keystrokes as a behavioral biometric, collecting the required security system data may lead to privacy risks if exposed (Sun & Upadhyaya, 2015).…”
Section: Distrust Propensitymentioning
confidence: 99%
“…For this development, we discard methods based on motion detection through prediction and other similar techniques 7,8,9,10 , inasmuch as the PTZ (pan-tilt-zoom) Dome cameras of the National Police of Colombia changes abruptly the pan, tilt and zoom. Because of that the backgrounds of the images change drastically making useless several techniques of video analysis.…”
Section: Street Theft Detection Using Deep Learningmentioning
confidence: 99%
“…Other possible scenarios include using biometric samples to link data in ways not previously anticipated (Woodward, 1997). For example, an organization could use access door biometric login records in conjunction with softbiometric camera data such as clothing characteristics or hair style to re-identify an otherwise anonymous person walking through publicly accessible areas of the organization (Bazzani, Cristani, & Murino, 2013;Shumann & Monari, 2014). Although the finger pattern recognition algorithms used by current devices do not record actual fingerprints many individuals perceive these devices as storing the actual fingerprint rather than a summary of pattern data.…”
Section: Employee Distrustmentioning
confidence: 98%