2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR) 2015
DOI: 10.1109/cvpr.2015.7298718
|View full text |Cite
|
Sign up to set email alerts
|

Target Identity-aware Network Flow for online multiple target tracking

Abstract: In this paper we show that multiple object tracking (MOT) can be formulated in a framework, where the detection and data-association are performed simultaneously. Our method allows us to overcome the confinements of data association based MOT approaches; where the performance is dependent on the object detection results provided at input level. At the core of our method lies structured learning which learns a model for each target and infers the best location of all targets simultaneously in a video clip. The … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
64
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
5
1
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 108 publications
(64 citation statements)
references
References 28 publications
0
64
0
Order By: Relevance
“…This video sequence is a good choice to find out effectiveness of a tracking sequence, spatially when considered hijacking or centralization problem is one of the major issues for tracking. It shows the recent two works that is target identity network flow [7] and subgraph decomposition methods shows [8] better results to track crossing people each others.…”
Section: Results Evaluationmentioning
confidence: 99%
See 2 more Smart Citations
“…This video sequence is a good choice to find out effectiveness of a tracking sequence, spatially when considered hijacking or centralization problem is one of the major issues for tracking. It shows the recent two works that is target identity network flow [7] and subgraph decomposition methods shows [8] better results to track crossing people each others.…”
Section: Results Evaluationmentioning
confidence: 99%
“…proposed a multiple object tracking system where targets identity based network flow method is used to track multiple objects [7]. Here structured learning and inference is used to detect an object.…”
Section: Mot Problems Hijacking Problemmentioning
confidence: 99%
See 1 more Smart Citation
“…In situations in which target detection itself is challenging, such as in scenarios with substantial clutter, track-before-detect methods tend to perform significantly better [55][56][57]. The contribution presented in this paper, hence, falls into the second category, track-before-detection, in which there are no scanning or searching schemes involved, and detections are not strictly necessary.…”
Section: Current Trendsmentioning
confidence: 99%
“…Different variations of network flow are also used in MOT recently [12,10,22]. Authors in [10] incorporate constant velocity motion model in network flow graph and proposed a Lagrangian relaxation solution to min-cost max-flow problem.…”
Section: Introductionmentioning
confidence: 99%