Automatic Samples Selection Using Histogram of Oriented Gradients (HOG) Feature Distance
Abstract
Finding victims at a disaster site is the primary goal of Search-and-Rescue (SAR) operations. Many technologies created from research for searching disaster victims through aerial imaging. but, most of them are difficult to detect victims at tsunami disaster sites with victims and backgrounds which are look similar. This research collects post-tsunami aerial imaging data from the internet to builds dataset and model for detecting tsunami disaster victims. Datasets are built based on distance differences from features every sample using Histogram-of-Oriented-Gradient (HOG) method. We use the longest distance to collect samples from photo to generate victim and non-victim samples. We claim steps to collect samples by measuring HOG feature distance from all samples. the longest distance between samples will take as a candidate to build the dataset, then classify victim (positives) and non-victim (negatives) samples manually. The dataset of tsunami disaster victims was re-analyzed using cross-validation Leave-One-Out (LOO) with Support-Vector-Machine (SVM) method. The experimental results show the performance of two test photos with 61.70% precision, 77.60% accuracy, 74.36% recall and f-measure 67.44% to distinguish victim (positives) and non-victim (negatives).Downloads
References
R. Bethany, “Ring of Fire.†pp. 1–403, 1998.
BRR, “ACEH DAN NIAS SETAHUN SETELAH TSUNAMI Upaya Pemulihan Dan Langkah Ke Depan,†2005.
I. A. Sulistijono and A. Risnumawan, “From Concrete to Abstract : Multilayer Neural Networks for Disaster Victims Detection.â€
N. Dalal and B. Triggs, “Histograms of oriented gradients for human detection,†Proc. - 2005 IEEE Comput. Soc. Conf. Comput. Vis. Pattern Recognition, CVPR 2005, vol. I, pp. 886–893, 2005.
T. Kobayashi, A. Hidaka, and T. Kurita, “Selection of histograms of oriented gradients features for pedestrian detection,†Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 4985 LNCS, no. PART 2, pp. 598–607, 2008.
Y. Uzun, M. Balcilar, K. Mahmoodi, F. Davletov, M. F. Amasyali, and S. Yavuz, “Usage of HoG (histograms of oriented gradients) features for victim detection at disaster areas,†ELECO 2013 - 8th Int. Conf. Electr. Electron. Eng., pp. 4–7, 2013.
C. Papageorgiou, “A Trainable System for Object Detection in Images and Video Sequences,†Int. J. Comput. Vis., vol. 38, no. 1685, pp. 15–33, 2000.
M. Andriluka et al., “Vision based victim detection from unmanned aerial vehicles,†IEEE/RSJ 2010 Int. Conf. Intell. Robot. Syst. IROS 2010 - Conf. Proc., pp. 1740–1747, 2010.
V. Ferrari, M. Marin-Jimenez, and A. Zisserman, “Progressive Search Space Reduction for Human Pose Estimation,†IEEE Conf. Comput. Vis. Pattern Recognit., vol. 2, no. figure 1, pp. 1–8, 2008.
L. Bourdev, J. Malik, U. C. Berkeley, A. Systems, P. Ave, and S. Jose, “Poselets : Body Part Detectors Trained Using 3D Human Pose Annotations,†2009 IEEE 12th Int. Conf. Comput. Vis., pp. 1365--1372, 2009.
P. Felzenszwalb, D. McAllester, and D. Ramanan, “A Discriminatively Trained, Multiscaled, Deformable Part Model,†Cvpr, pp. 1–8, 2008.
S. Carpin, M. Lewis, J. Wang, S. Balakirsky, and C. Scrapper, “USARSim: A robot simulator for research and education,†Proc. - IEEE Int. Conf. Robot. Autom., pp. 1400–1405, 2007.
W. R. Schwartz, A. Kembhavi, D. Harwood, and L. S. Davis, “Human detection using partial least squares analysis,†Comput. Vision, 2009 IEEE 12th Int. Conf., p. 1, 2009.
A. Bar-hillel, D. Levi, E. Krupka, and C. Goldberg, “LNCS 6314 - Part-Based Feature Synthesis for Human Detection,†Eur. Conf., pp. 127–142, 2010.
P. Dollár, Z. Tu, H. Tao, and S. Belongie, “Feature mining for image classification,†Proc. IEEE Comput. Soc. Conf. Comput. Vis. Pattern Recognit., no. July, 2007.
P. Dollár, Z. Tu, P. Perona, and S. Belongie, “Integral Channel Features,†BMVC 2009 London Engl., pp. 1–11, 2009.
P. Dollar, S. Belongie, and P. Perona, “The Fastest Pedestrian Detector in the West,†Proceedings Br. Mach. Vis. Conf. 2010, p. 68.1-68.11, 2010.
S. Walk and N. Majer, “[Poster]New Features and Insights for Pedestrian Detection,†Training, pp. 8–8.
C. Wojek and B. Schiele, “A performance evaluation of single and multi-feature people detection,†Jt. Pattern Recognit. Symp., pp. 82–91, 2008.
A. Satpathy, X. Jiang, and H. L. Eng, “Human detection by quadratic classification on subspace of extended histogram of gradients,†IEEE Trans. Image Process., vol. 23, no. 1, pp. 287–297, 2014.
P. Dollár, C. Wojek, B. Schiele, and P. Perona, “Pedestrian detection: An evaluation of the state of the art,†IEEE Trans. Pattern Anal. Mach. Intell., vol. 34, no. 4, pp. 743–761, 2012.
S. Munder and D. M. Gavrila, “An experimental study on pedestrian classification,†IEEE Trans. Pattern Anal. Mach. Intell., vol. 28, no. 11, pp. 1863–1868, 2006.
D. S. Bolme, Y. M. Lui, B. a. Draper, and J. R. Beveridge, “Simple real-time human detection using a single correlation filter,†2009 Twelfth IEEE Int. Work. Perform. Eval. Track. Surveill., pp. 1–8, 2009.
D. S. Bolme, B. A. Draper, and J. R. Beveridge, “Average of synthetic exact filters,†2009 IEEE Comput. Soc. Conf. Comput. Vis. Pattern Recognit. Work. CVPR Work. 2009, pp. 2105–2112, 2009.
S. Soo, “Object detection using Haar-cascade Classifier,†vol. 2, no. 3, pp. 1–12, 2014.
Copyright (c) 2018 EMITTER International Journal of Engineering Technology
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
The copyright to this article is transferred to Politeknik Elektronika Negeri Surabaya(PENS) if and when the article is accepted for publication. The undersigned hereby transfers any and all rights in and to the paper including without limitation all copyrights to PENS. The undersigned hereby represents and warrants that the paper is original and that he/she is the author of the paper, except for material that is clearly identified as to its original source, with permission notices from the copyright owners where required. The undersigned represents that he/she has the power and authority to make and execute this assignment. The copyright transfer form can be downloaded here .
The corresponding author signs for and accepts responsibility for releasing this material on behalf of any and all co-authors. This agreement is to be signed by at least one of the authors who have obtained the assent of the co-author(s) where applicable. After submission of this agreement signed by the corresponding author, changes of authorship or in the order of the authors listed will not be accepted.
Retained Rights/Terms and Conditions
- Authors retain all proprietary rights in any process, procedure, or article of manufacture described in the Work.
- Authors may reproduce or authorize others to reproduce the work or derivative works for the author’s personal use or company use, provided that the source and the copyright notice of Politeknik Elektronika Negeri Surabaya (PENS) publisher are indicated.
- Authors are allowed to use and reuse their articles under the same CC-BY-NC-SA license as third parties.
- Third-parties are allowed to share and adapt the publication work for all non-commercial purposes and if they remix, transform, or build upon the material, they must distribute under the same license as the original.
Plagiarism Check
To avoid plagiarism activities, the manuscript will be checked twice by the Editorial Board of the EMITTER International Journal of Engineering Technology (EMITTER Journal) using iThenticate Plagiarism Checker and the CrossCheck plagiarism screening service. The similarity score of a manuscript has should be less than 25%. The manuscript that plagiarizes another author’s work or author's own will be rejected by EMITTER Journal.
Authors are expected to comply with EMITTER Journal's plagiarism rules by downloading and signing the plagiarism declaration form here and resubmitting the form, along with the copyright transfer form via online submission.