Person Re-Identification Meets Image Search

Person Re-Identification Meets Image Search

Liang Zheng* Tsinghua University, Beijing 100084, China Liyue Shen* Tsinghua University, Beijing 100084, China Lu Tian* Tsinghua University, Beijing 100084, China Shengjin Wang Tsinghua University, Beijing 100084, China Jiahao Bu Tsinghua University, Beijing 100084, China Qi Tian University of Texas at San Antonio, TX 78249, USA

For long time* Three authors contribute equally to this work., person re-identification and image search are two separately studied tasks. However, for person re-identification, the effectiveness of local features and the “query-search” mode make it well posed for image search techniques.

In the light of recent advances in image search, this paper proposes to treat person re-identification as an image search problem. Specifically, this paper claims two major contributions. 1) By designing an unsupervised Bag-of-Words representation, we are devoted to bridging the gap between the two tasks by integrating techniques from image search in person re-identification. We show that our system sets up an effective yet efficient baseline that is amenable to further supervised/unsupervised improvements. 2) We contribute a new high quality dataset which uses DPM detector and includes a number of distractor images. Our dataset reaches closer to realistic settings, and new perspectives are provided.

Compared with approaches that rely on feature-feature match, our method is faster by over two orders of magnitude. Moreover, on three datasets, we report competitive results compared with the state-of-the-art methods.

1 Introduction

This paper considers the task of person re-identification. Given a probe image (query), our task is to search in a gallery (database) for images that contain the same person. Person Re-identification has important applications in video surveillance, e.g., cross-camera visual tracking, multi-camera event detection, etc. This task still remains an unsolved problem, due to the difficulty in visual matching caused by the extensive variations in illumination, viewpoint, pose, photometric settings of cameras, low resolution, background, etc.

Our work is motivated by two aspects. First, local feature based approaches [9, 42, 40] are proven to be effective in person re-identification. Considering the “query-search” mode, this is potentially compatible with image search based on the Bag-of-Words (BoW) model. Nevertheless, some state-of-the-art methods in person re-identification rely on brute-force feature-feature matching [41, 40]. Although good recognition rate is achieved, this line of methods suffer from low computational efficiency, which limits its potential in large-scale applications. In the BoW model, local features are quantized to visual words using a pretrained codebook. An image is thus represented by a visual word histogram weighted by TF-IDF scheme. Instead of performing exhaustive visual matching among images [41], in the BoW model, local features are aggregated into a global vector. In tackling spatial constraints, a number of geometric-aware visual matching methods [39, 33, 47] are proposed. Moreover, to further boost search accuracy, it is beneficial to include some post-processing steps [29, 31].

Figure 1: Sample images of the Market-1501 dataset. All images are normalized to 12864 (Top:) Sample images of three identities with distinctive appearance. (Middle:) We show three cases where three individuals have very similar appearance. (Bottom:) Some samples of the distractor images (left) as well as the junk images (right) are provided.

Second, most existing person re-identification datasets [8, 45, 2, 12, 22, 21] are flawed either in the dataset scale or in the data richness. Specifically, the number of identities is often confined in several hundred, which may lead to the performance instability. Moreover, images of the same identity are usually captured by two cameras; each identity typically has one image under each camera, so the number of queries and relevant images is very limited. Furthermore, in most datsets, pedestrians are well-aligned by hand-drawn bounding boxes. But in reality, when pedestrian detectors are employed, the detected persons may undergo misalignment or body part missing (see Fig. 1). On the other hand, pedestrian detectors, while producing true positive bounding boxes, also yield false alarms caused by complex background or occlusion (see also Fig. 1). In fact, these distractor images may exert non-ignorable influence on recognition accuracy. As a result, current methods may be biased toward more ideal settings and their effectiveness may be impaired once the ideal dataset meets reality. To address this problem, it is important to introduce datasets that reach closer to realistic settings and design robust algorithms which can handle detector errors and are not affected by distractors.

Considering the above two issues, this paper makes two major contributions. First, inspired by the state-of-the-art image search methods, an unsupervised BoW representation is proposed. After generating a codebook on the training data, each pedestrian image is represented as a visual word histogram. In this step, a number of techniques are integrated, e.g., root descriptor [32], negative evidences [14], burstiness weighting [16], etc. To incorporate geometric constraints, images are partitioned into horizontal stripes. Moreover, multiple queries are pooled into one vector, which adapts to the extensive image variations. Finally, an automatic reranking step is added to refine the initial rank list. By simple dot product as similarity measurement, we show that the proposed feature representation yields competitive recognition accuracy while enjoying a fast response time.

Second, a new person re-identification dataset, called the “Market-1501”, is introduced (Fig. 1). This dataset is composed of 1501 identities collected by 6 cameras near the entrance of a university campus supermarket. To the best of our knowledge, Market-1501 is the largest person re-identification dataset featured by 32643 annotated bounding boxes. It is distinguished from existing datasets in three aspects: DPM detected bounding boxes, the inclusion of distractor images, and multi-query, multi-groundtruth per identity. The Market-1501 dataset provides a more realistic benchmark for algorithm evaluation.

The rest of this paper is organized as follows. After a brief review of related works in Section 2, we describe the Market-1501 dataset in Section 3. Then, Section 4 introduces the proposed method based on image search techniques. Experimental results are summarized in Section 5 and conclusions and insights are given in Section 6.

2 Related Work

For person re-identification, both supervised and unsupervised models have been extensively studied these years. In discriminative models [30, 11, 5, 46, 23], classic SVM (or the RankSVM [30, 42]) and boosting [9] are popular choices. For example, Zhao et al. [42] learn the weights of filter responses and patch matching scores using RankSVM, and Gray et al. [9] perform feature selection among an ensemble of local descriptors by boosting. Recently, li et al. [23] propose a deep learning network to jointly optimize all pipeline steps. This line of works are beneficial in reducing the impact of multi-view variations, but require laborious annotation, especially when new cameras are added in the system. On the other hand, in unsupervised models, Farenzena et al. [6] make use of both symmetry and asymmetry nature of pedestrians and propose the Symmetry-Driven Accumulation of Local Features (SDALF). Ma et al. [27] employ the Fisher Vector to encode local features into a global vector. To exploit the salience information among pedestrian images, Zhao et al. [40] propose to assign higher weight to rare colors, an idea very similar to the Inverse Document Frequency (IDF) in image search. In this scenario, this paper proposes an unsupervised method which requires a minimal amount of labeling or training effort.

Datasets Market-1501 RAiD [3] CUHK03 [23] VIPeR [8] i-LIDS [45] CUHK01 [22] CUHK02 [21] CAVIAR [2]
# identities 1,501 43 1,360 632 119 971 1,816 72
# BBoxes 32,643 6920 13,164 1,264 476 1,942 7,264 610
# distractors 2,793 0 0 0 0 0 0 0
# cam. per ID 6 4 2 2 2 2 2 2
DPM or Hand DPM hand DPM hand hand hand hand hand
Table 1: Comparing Market-1501 with existing datasets [23, 8, 45, 22, 21, 2].

On the other hand, the field of image search has been greatly advanced since the introduction of the SIFT descriptor [26] and the BoW model. In the last decade, a myriad of methods [15, 44, 36, 47, 39] have been developed to improve search performance. For example, to improve matching precision, Jégou et al. [15] embed binary SIFT features in the inverted file. Meanwhile, refined visual matching can also be produced by index-level feature fusion [44, 36] between complementary descriptors. Since the BoW model does not consider the spatial distribution of local features (also a problem in person re-identification), another direction is to model the spatial constraints [47, 39, 13]. The geometry-preserving visual phrases (GVP) [39] and the spatial coding [47] methods both calculate the relative position among features, and check the geometric consistency between images by the offset maps. Zhang et al. [38] propose to use descriptive visual phrases to build pairwise constraints, and Liu et al. [25] encode geometric cues into binary features embedded in the inverted file.

For ranking problems, an effective reranking step typically brings about improvements. Liu et al. [24] design a “one shot” feedback optimization scheme which allows a user to quickly refine the search results. Although it is shown to yield consistent improvement, reranking based on user feedback is not always desirable or accessible. In rigid object search, RANSAC [29] is typically used in post-processing. In [33], the top-ranked images are used as queries again and final score is the weighted sum of individual scores. When multiple queries are present [1], a new query which integrates the original queries can be formed by average or max operations.

3 The Market-1501 Dataset

3.1 Description

In this paper, a new person re-identification dataset, the “Market-1501” dataset, is introduced. During dataset collection, a total of six cameras were placed in front of a campus supermarket, including five 12801080 HD cameras, and one 720576 SD camera. Overlapping exists among these cameras. This dataset contains 32643 bounding boxes of 1501 identities. Since it is an open environment, images of each identity are captured by at most six cameras. We make sure that each annotated identity are captured by at least two cameras, so that cross-camera search can be performed. In fact, even within same camera, images of same identity still take on distinct appearance. Overall, the Market-1501 dataset has the following featured properties.

First, while most existing datasets use hand-cropped bounding boxes, the Market-1501 dataset employs a state-of-the-art detector, i.e., the Deformable Part Model (DPM) [7]. As is shown in Fig. 1, misalignment as well as body part missing are very common among the detected images.

Second, in addition to the false positive bounding boxes, we also provide false alarm detection results. We notice that the CUHK03 dataset [23] also uses the DPM detector, but the bounding boxes in CUHK03 are relatively good ones in terms of DPM detector. In fact, a large number of the detected bounding boxes would be very “bad”. Considering this, for each detected bounding box to be annotated, a hand-drawn groundtruth bounding box is provided (similar to [23]). Different from [23], for the detected and hand-drawn bounding boxes, the ratio of the overlapping area to the union area is calculated. In our dataset, if the area ratio is larger than 50%, the DPM bounding box is marked as “good” (a routine in object detection [7]); if the ratio is smaller than 20%, the DPM bounding box is marked as “distractor”; otherwise, the bounding box is marked as “junk” [29], meaning that this image is of zero influence to the re-identification accuracy. Moreover, some obvious false alarm bounding boxes on the background are also marked as “distractors”. In Fig. 1, examples of “good” images are shown in the top two rows, while “distractor” and “junk” images are in the bottom row.

Third, each identity may have multiple images under each camera. Therefore, during cross-camera search, there may be multiple queries and multiple groundtruths for each identity. A comparison with existing datasets is shown in Table 1.

Figure 2: A toy example of the difference between AP and CMC measurements. True matches and false matches are in green and red boxes, respectively. For all three rank lists, the CMC curve remains 1. But AP = 1, 1, and 0.41, respectively.

3.2 Evaluation Protocol

Current datasets typically use the Cumulated Matching Characteristics (CMC) curve to evaluate the performance of re-identification algorithms. CMC curve shows the probability that a query identity appears in different sized candidate lists. This evaluation measurement is valid only if there is only one groundtruth match for a given query (see Fig. 2(a)). In this case, the precision and recall are the same issue. However, if multiple groundtruths exist, the CMC curve is biased because “recall” is not considered. For example, CMC curves of Fig. 2(b) and Fig. 2(c) both equal to 1, which fails to provide a fair comparison of the quality between the two rank lists.

For Market-1501 dataset, there are on average 14.8 cross-camera groundtruths for each query. Therefore, we use mean average precision (mAP) to evaluate the overall performance. For each query, we calculate the area under the Precision-Recall curve, which is known as average precision (AP). Then, the mean value of APs of all queries, i.e., mAP, is calculated, which considers both precision and recall of an algorithm, thus providing a more comprehensive evaluation.

Our dataset is randomly divided into training and testing sets, containing 750 and 751 identities, respectively. During testing, for each identity, we select one query image in each camera. Note that, the selected queries are hand-drawn, instead of DPM-detected as in the gallery. The reason is that in reality, it is very convenient to interactively draw a bounding box, which can yield higher recognition accuracy [23]. The search process is performed in a cross-camera mode, i.e., relevant images captured in the same camera as the query are viewed as “junk”. In this scenario, an identity has at most 6 queries, and there are 3363 query images in total. On average, there are 4.5 query images for each identity, and each query has 14.8 groundtruth images. Queries of two sample identities are shown in Fig. 3.

Figure 3: Samples query images. In Market-1501 dataset, queries are hand-drawn bounding boxes. Each identity has at most 6 queries, one for each camera.

4 Our Method

4.1 The Bag-of-Words Model

For three reasons, we adopt the Bag-of-Words (BoW) model. First, this model well accommodates local features, which are indicated as effective by previous works [27, 40]. Second, it enables fast global feature matching, instead of exhaustive feature-feature matching [42, 41]. Third, by quantizing similar local descriptors to the same visual word, the BoW model achieves some invariance to illumination, view, etc. We describe the individual steps below.

Feature Extraction. As a baseline, we employ the Color Names (CN) descriptor [34]. Given a pedestrian image normalized to 12864 pixels, patches of size 44 are densely sampled. In our experiment, the sampling step is 4, so there is no overlapping between patches. For each patch, CN descriptors of all pixels are calculated, and are subsequently normalized followed by operator [32]. The mean vector is taken as the descriptor of this patch (see Fig. 4).

Figure 4: Local feature extraction. We compute the mean CN vector for each 44 patch. These local features are quantized, and then pooled in a histogram for each horizontal stripe.

Codebook. For Market-1501 dataset, we generate a codebook on the training set. For other datasets, the codebook is trained on the independent TUD-Brussels dataset [37]. Standard -means is used, and codebook size is .

Quantization. Given a local descriptor, we employ Multiple Assignment (MA) [15] to find its near neighbors under Euclidean distance in the codebook. We set MA = 10, so a feature is represented by the indices of 10 visual words.

TF-IDF. The visual word histogram is weighted by TF-IDF scheme. TF encodes the number of occurrences of a visual word, and IDF is calculated as , where is the number of images in the gallery, and is the number of images containing visual word . We use the avgIDF [43] variant in place of the standard IDF.

Burstiness. Burstiness refers to the phenomenon where a query feature finds multiple matches in a test image [16]. For CN descriptor, burstiness could be more prevalent due to its low discriminative power compared with SIFT. Therefore, all terms in the histogram are divided by .

Negative Evidence. Following [14], we calculate the mean feature vector in the training set. Then, the mean vector is subtracted from all test features. In this way, the zero entries in the feature vector are also taken into account using dot product.

Similarity Function. Given a query image and a gallery image , the corresponding -normalized feature vectors are denoted as and , respectively, where is codebook size. The similarity function is written as,


which calculates the dot product between two vectors.

4.2 Improvements

Weak Geometric Constraints. In image search, geometric clues among local features have been demonstrated as good discriminator to outlier matches [33, 15, 47, 29]. For person re-identification, popular approaches [40, 42, 41] include the so-called “Adjacency Constrained Search” (ACS). In this method, a patch in the probe is matched with patches in a gallery image, which are located in a horizontal stripe positioned at similar height with the probe patch. The minimum distance is taken as the similarity score. Similar idea also appears in DeepReid [23].

ACS is effective in incorporating spatial constraints, but, as will be shown in the experiments, it suffers from high computational cost. Inspired by Spatial Pyramid Matching [20], we integrate ACS into the BoW model. As illustrated in Fig. 4, an input image is partitioned into horizontal stripes. Then, for stripe , the visual word histogram is represented as , where is the codebook size. Consequently, the feature vector for the input image is denoted as , which is the concatenation of vectors from all stripes. When matching two images, dot product (Eq. 1) is employed, which sums up the similarity at all corresponding stripes. In this manner, we avoid calculating patch distances for each query feature; instead, the calculation is performed at stripe level.

Background Suppression. The negative impact of background distraction has been studied extensively [6, 40, 41]. In one solution, Farenzena et al. [6] propose to separate the foreground pedestrian from background using segmentation. In the following works, Zhao et al. [40, 41] use the resulting masks to filter out background.

Since the process of generating a mask for each image is both time-consuming and unstable, this paper proposes a simple solution by exerting a 2-D Gaussian template on the image. Specifically, the Gaussian function takes on the form of , where , are horizontal and vertical Gaussian mean values, and , are horizontal and vertical Gaussian standard variances, respectively. We set to the image center, and set for all experiments. This method injects a prior knowledge on the position of pedestrian, which assumes that the person lies in the center, and is surrounded by background. Therefore, the Gaussian mask works by suppressing the response near the edge of the image.

Multipe Queries. The usage of multiple queries is shown to yield superior results in image search [1] and re-identification [6]. If we want to delimit a person, it would be worthy of using multiple query bounding boxes and re-formulating the query image. In this manner, the intra-class variation is taken into account, and the algorithm would be more robust to pedestrian variations.

When each identity has multiple query images in a single camera, instead of a multi-multi matching strategy [6], we merge them into a single query for speed consideration. Here, we employ two pooling strategies, i.e., average and max pooling. In average pooling, the feature vectors of multiple queries are pooled into one by averaged sum; in max pooling, the final feature vector takes the maximum value in each dimension from all queries.

Automatic Reranking. When viewing person re-identification as a ranking problem, a natural idea consists in the usage of reranking algorithms. In this paper, we use a simple reranking method which picks top- ranked images of the initial rank list as queries to search the gallery again. Specifically, given an initial sorted rank list by query , image which is the image in the list is used as query. The similarity score of a gallery image when using as query is denoted as . We assign a weight to each top- ranked query, where is the number of expanded queries. Then, the final score of the gallery image to query is determined as,


where is the weighted sum of similarity scores obtained by the original and expanded queries, and the weight gets smaller as the expanded query is located away from the top. This method departs from the one proposed in [33] in that Eq. 2 employs the similarity values while [33] uses the reverse ranks.

5 Experiments

5.1 Datasets

This paper experiments on three datasets, i.e., Market-1501, VIPeR [8], and CUHK03 [23]. The latter two datasets are described below.

VIPeR. This dataset is composed of 632 identities, and each has two images captured from two different cameras. Pedestrians in this dataset undergo large variances in viewpoint, illumination, pose, etc. All images are normalized to 12848 pixels. VIPeR is randomly divided into two equal halves, one for training, and the other for testing. Each half contains 316 identities. For each identity, we take an image from one camera as query, and perform cross-camera search.

CUHK03. This dataset contains 13,164 DPM bounding boxes of 1,467 identities. Each identity is observed by two cameras and has 4.8 images in average for each view. Following the protocol in [23], for the test set, we randomly select 100 persons. For each person, all the DPM bounding boxes are taken as query in turns, and a cross-camera search is performed. The test process is repeated 20 times, and stable statistics are reported. We report both the CMC scores and mAP for VIPeR and CUHK03 datasets.

5.2 Important Parameters

Codebook size . In our experiment, codebooks of various sizes are constructed, and mAP on Market-1501 dataset is presented in Table 2. We can see that the peak value is achieved when . In the following experiments, this value is kept.

100 200 350 500
mAP (%) 13.31 14.01 14.09 13.82
r=1 (%) 32.20 34.24 34.40 34.14
Table 2: Impact of codebook size on Market-1501 dataset. We report results obtained by “BoW + Geo + Gauss”.
1 4 8 16 32
mAP (%) 5.23 11.01 13.26 14.09 13.79
r=1 (%) 14.36 27.53 32.50 34.40 34.58
Table 3: Impact of number of horizontal stripes on Market-1501 dataset. We report results obtained by “BoW + Geo + Gauss”.
T 0 1 2 3 4 5
mAP (%) 18.53 19.18 19.07 18.97 19.01 18.91
Table 4: Impact of number of expanded queries on Market-1501 dataset. corresponds to the “BoW + Geo + Gauss + MultiQ_max” mode.

Number of stripes . Table 3 presents the performance of different numbers of stripes. As the stripe number increases, a finer partition of the pedestrian image leads to a more discriminative representation. So the recognition accuracy increases, but recall may drop for a large . For example, produces higher rank-1 matching rate but lower mAP than . As a trade-off between speed and accuracy, we choose to split an image into 16 stripes in our experiment.

Number of expanded queries . Table 4 summarizes the results obtained by different numbers of expanded queries. We find that the best performance is achieved when = 1. When increases, mAP drops slowly, which validates the robustness to . The performance of reranking highly depends on the quality of the initial list, and a larger would introduce more noise. In the following, we set to 1.

Figure 5: Performance of different method combinations on VIPeR and CUHK03 datasets.

5.3 Evaluation

Methods Market-1501 VIPeR CUHK03
r = 1 mAP r = 1 r = 20 mAP r = 1 mAP
BoW 9.04 3.26 7.82 39.34 11.44 11.47 11.49
BoW + Geo 21.23 8.46 15.47 51.49 19.85 16.13 15.12
BoW + Geo + Gauss 34.40 14.09 21.74 60.85 26.55 18.89 17.42
BoW + Geo + Gauss + MultiQ_avg 41.66 17.63 - - - 22.35 20.48
BoW + Geo + Gauss + MultiQ_max 42.14 18.53 - - - 22.95 20.33
BoW + Geo + Gauss + MultiQ_max + Rerank 42.14 19.20 - - - 22.95 22.70
Table 5: Results (rank-1, rank-20 matching rate, and mean Average Precision (mAP)) on three datasets by combining different methods, i.e., the BoW model (BoW), Weak Geometric Constraints (Geo), Background Suppression (Gauss), Multiple Queries by average (MultiQ_avg) and max pooling (MultiQ_max), and reranking (Rerank). Note that, here we use the Color Names descriptor for BoW.

BoW model and its improvements. On three datasets, we present results obtained by the BoW representation, geometric constraints, Gaussian mask, multiple queries, and reranking in Table 5 and Fig. 5. Five major conclusions can be drawn.

First, we find that the baseline BoW vector produces a relatively low accuracy: rank-1 matching rate = 9.04%, 10.56%, and 5.35% on Market-1501, VIPeR, and CUHK03 datasets, respectively.

Second, when we integrate geometric constraints by stripe matching, we observe consistent improvement in recognition accuracy. On Market-1501 dataset, for example, mAP increases from 3.26% to 8.46% (+5.20%), and an even larger improvement can be seen from rank-1 matching rate, from 9.04% to 21.23% (+12.19%). On VIPeR dataset, the rank-1 matching rate rises from 9.95% to 15.35% (+5.40%). The improvement on CUHK03 is very similar. Our results are consistent with previous studies [40, 23] in that when narrowing the matching scope, matching precision can be improved.

Third, it is clear that the Gaussian mask works well on all three datasets. Specifically, we observe +5.63% in mAP, +4.24% in rank-1 matching rate, and +5.74% in rank-1 matching rate on Market-1501, VIPeR, CUHK03 datasets, respectively. Therefore, the prior that pedestrian is located more or less in the center of the bounding box is statistically sound. Previous methods [6] address this issue by isolating foreground from background, a method which may be influenced by complex background. Another possible direction consists in modeling the background in video. At this point, we plan to release the video together with the bounding boxes, so that a more precise foreground segmentation result can be produced.

Figure 6: Comparison with the state-of-the-art methods on VIPeR dataset. For our method, we combine HS and CN features, as well as the eSDC method.

Then, we test multiple queries on CUHK03 and Market-1501 datasets, where each query identity has multiple bounding boxes. From the results, we can see that the usage of multiple queries further improves recognition accuracy. The improvement is more prominent on Market-1501 dataset, where the query images take on more diverse appearance (see Fig. 3). Moreover, we notice that multi-query by max pooling is slightly superior to average pooling, probably because max pooling gives more weights to the rare but salient features and improves recall.

Stage SDALF SDC Ours
Feat. Extraction (s) 2.92 0.76 0.62
Search (s) 2644.80 437.97 0.98
Rerank (s) - - 0.98
Table 6: Average query time of different steps on Market-1501 dataset. Our method achieves significant speedup.
Methods CUHK03 Market-1501
r = 1 r = 1 mAP
SDALF [6] 4.87 20.53 8.20
ITML [4] 5.14 - -
lMNN [35] 6.25 - -
eSDC [41] 7.68 33.54 13.54
RANK [28] 8.52 - -
LDM [10] 10.92 - -
KISSME [19] 11.70 - -
FPNN [23] 19.89 - -
Ours (no MultiQ) 18.89 34.40 14.09
Ours (MultiQ) 22.95 42.14 19.20
Ours (+HS) 24.33 47.25 21.88
Table 7: Comparison with the state-of-the-art methods on CUHK03 and Market-1501 datasets.

Figure 7: Sample re-identification results on Market-1501 dataset. Four rows correspond to four configurations, i.e., “BoW”, “BoW + Geo + Gauss”, “BoW + Geo + Gauss + MultiQ”, and “BoW + Geo + Gauss + MultiQ + Rerank”. The original query is in blue bounding box, and the added multiple queries are in yellow. Images with the same identity as the query is in green box, otherwise red.

Finally, we observe from Table 4 and Table 5 that the reranking process generates higher mAP. Nevertheless, one recurrent problem with reranking is the sensitivity to the quality of initial rank list. On Market-1501 and CUHK03 datasets, since a majority of queries DO NOT have a top-1 match, the improvement in mAP is relatively small. For poor initial ranks, reranking would generate inferior results. Therefore, algorithms that produce higher accuracy may benefit more from reranking. Another tentative solution is to involve human interaction in the loop.

Timings. When the gallery gets scaled up (consider a city-scale re-identification system for an example), a fast response time is desirable. To evaluate this property, we compare our method with SDALF [6] and SDC [41] in two aspects, i.e., feature extraction and search time.

Our evaluation is performed on a server with 3.46 GHz CPU and 128 GB memory, and efficiency results are shown in Table 6. We report the total timing by HS (we extract a 20-dim HS histogram and generate another BoW vector for fusion with CN) and CN features for our method. Compared with SDC, we achieve over two orders of magnitude efficiency improvement. In the SDALF method, three features are employed, i.e., MSCR, wHSV, and RHSP. The feature extraction time is 0.09s, 0.03s, 2.79s, respectively; the search time is 2643.94s, 0.66s, and 0.20s, respectively. Therefore, our method is faster than SDALF by three orders of magnitude. From these results, we can see that a major efficiency gain is achieved.

Comparison with the state-of-the-arts. We compare our results with the state-of-the-art methods in Fig. 6 and Table 7. On VIPeR dataset (Fig. 6), we first compare with unsupervised methods, e.g., eSDC [41], SDALF [6]. We can see that our approach is superior to both methods. Specifically, we achieve a rank-1 identification rate of 26.08% when two features are used, i.e., Color Names (CN) and HS Histogram (HS). When eSDC [41] is further integrated, the matching rate increases to 32.15%, a competitive accuracy among all competing methods.

Moreover, on CUHK03 dataset, our method without multiple-query (MultiQ) significantly outperforms almost all presented approaches. Compared with FPNN [23] which builds a deep learning architecture, our accuracy is slightly lower by 1.00%. But when multiple queries and HS feature are integrated, our rank-1 matching rate exceeds [23] by +4.44% on CUHK03 dataset. On Market-1501 dataset, compared with SDALF [6], eSDC [41], and KISSME [19], our results are consistently higher.

Some sample results on Market-1501 dataset are provided in Fig. 7. Apart from the mAP increase with the method evolution, another finding which should be noticed is that the distractors detected by DPM on complex background or body parts severely affect re-identification accuracy. Previous works typically focus on “good” bounding boxes with person only, and rarely study the detector errors. In this sense, the Market-1501 dataset provides a more realistic environment for such evaluation.

6 Conclusions and Insights

This paper focuses on person re-identification. Overall, two major contributions are made. The first contribution consists in bridging the gap between person re-identification and BoW based image search. Specifically, the bag-of-words model with extensive improvements is applied, which considers the spatial constraints and the multi-query multi-groundtruth information. Second, a new person re-identification dataset, the Market-1501, is introduced. This dataset gets closer to the realistic settings, and once released, is one of the largest datasets in this field. Bounding boxes in the Market-1501 dataset are detected by DPM. Apart from annotated pedestrian images, we also include a number of false positive detection results, and view them as distractor or junk images.

The BoW representation, though unsupervised, achieves competitive results on three datasets, while speeding up the search process by over two orders of magnitude. Both are desirable properties in industrial usage and provide new perspectives in the field of person re-identification. We speculate that this model can be further improved in several directions. First, supervised approaches can be readily incorporated, e.g., RankSVM, metric learning, etc, so that the global vector is more discriminatively weighted. This idea also works for multi-feature fusion, where descriptors such as VLAD [17], CNN [18], can be effectively combined. Second, our experiment highlights the importance of geometric constraints and foreground estimation. In fact, the geometric cues can be more elaborately encoded [39, 47]; the root and parts detected by DPM can be also incorporated. Moreover, the foreground can be more precisely located by modeling background statistics through video analysis. Finally, the strength of multiple queries can be further explored by SVM [32] or spatial verification [29]. The Market-1501 dataset will be a useful benchmark enabling these research possibilities.


  • [1] R. Arandjelovic and A. Zisserman. Multiple queries for large scale specific object retrieval. In BMVC, 2012.
  • [2] D. S. Cheng, M. Cristani, M. Stoppa, L. Bazzani, and V. Murino. Custom pictorial structures for re-identification. In BMVC, volume 2, page 6, 2011.
  • [3] A. Das, A. Chakraborty, and A. K. Roy-Chowdhury. Consistent re-identification in a camera network. In ECCV. 2014.
  • [4] J. V. Davis, B. Kulis, P. Jain, S. Sra, and I. S. Dhillon. Information-theoretic metric learning. In ICML, 2007.
  • [5] M. Dikmen, E. Akbas, T. S. Huang, and N. Ahuja. Pedestrian recognition with a learned metric. In ACCV. 2011.
  • [6] M. Farenzena, L. Bazzani, A. Perina, V. Murino, and M. Cristani. Person re-identification by symmetry-driven accumulation of local features. In CVPR, 2010.
  • [7] P. F. Felzenszwalb, R. B. Girshick, D. McAllester, and D. Ramanan. Object detection with discriminatively trained part-based models. PAMI, 32(9):1627–1645, 2010.
  • [8] D. Gray, S. Brennan, and H. Tao. Evaluating appearance models for recognition, reacquisition, and tracking. In IEEE International workshop on performance evaluation of tracking and surveillance, 2007.
  • [9] D. Gray and H. Tao. Viewpoint invariant pedestrian recognition with an ensemble of localized features. In ECCV. 2008.
  • [10] M. Guillaumin, J. Verbeek, and C. Schmid. Is that you? metric learning approaches for face identification. In ICCV, 2009.
  • [11] M. Hirzer, C. Beleznai, P. M. Roth, and H. Bischof. Person re-identification by descriptive and discriminative classification. In Image Analysis, pages 91–102. Springer, 2011.
  • [12] M. Hirzer, P. M. Roth, M. Köstinger, and H. Bischof. Relaxed pairwise learned metric for person re-identification. In ECCV.
  • [13] D. Hoiem, R. Sukthankar, H. Schneiderman, and L. Huston. Object-based image retrieval using the statistical structure of images. In CVPR, 2004.
  • [14] H. Jégou and O. Chum. Negative evidences and co-occurences in image retrieval: The benefit of pca and whitening. In ECCV. 2012.
  • [15] H. Jégou, M. Douze, and C. Schmid. Hamming embedding and weak geometric consistency for large scale image search. In ECCV, 2008.
  • [16] H. Jégou, M. Douze, and C. Schmid. On the burstiness of visual elements. In CVPR, 2009.
  • [17] H. Jégou, M. Douze, C. Schmid, and P. Pérez. Aggregating local descriptors into a compact image representation. In CVPR, 2010.
  • [18] Y. Jia. Caffe: An open source convolutional architecture for fast feature embedding., 2013.
  • [19] M. Kostinger, M. Hirzer, P. Wohlhart, P. M. Roth, and H. Bischof. Large scale metric learning from equivalence constraints. In CVPR, 2012.
  • [20] S. Lazebnik, C. Schmid, and J. Ponce. Beyond bags of features: spatial pyramid matching for recognizing natual scene categories. In CVPR, 2006.
  • [21] W. Li and X. Wang. Locally aligned feature transforms across views. In CVPR, 2013.
  • [22] W. Li, R. Zhao, and X. Wang. Human reidentification with transferred metric learning. In ACCV. 2013.
  • [23] W. Li, R. Zhao, T. Xiao, and X. Wang. Deepreid: Deep filter pairing neural network for person re-identification. In CVPR, 2014.
  • [24] C. Liu, C. C. Loy, S. Gong, and G. Wang. Pop: Person re-identification post-rank optimisation. In ICCV, 2013.
  • [25] Z. Liu, H. Li, W. Zhou, and Q. Tian. Embedding spatial context information into inverted filefor large-scale image retrieval. In ACM Multimedia, 2012.
  • [26] D. G. Lowe. Distinctive image features from scale invariant keypoints. IJCV, 2004.
  • [27] B. Ma, Y. Su, and F. Jurie. Local descriptors encoded by fisher vectors for person re-identification. In ECCV, Workshops and Demonstrations, 2012.
  • [28] B. McFee and G. R. Lanckriet. Metric learning to rank. In ICML, 2010.
  • [29] J. Philbin, O. Chum, M. Isard, and A. Zisserman. Object retrieval with large vocabularies and fast sptial matching. In CVPR, 2007.
  • [30] B. Prosser, W.-S. Zheng, S. Gong, T. Xiang, and Q. Mary. Person re-identification by support vector ranking. In BMVC, volume 1, page 5, 2010.
  • [31] D. Qin, S. Gammeter, L. Bossard, T. Quack, and L. Van Gool. Hello neighbor: accurate object retrieval with k-reciprocal nearest neighbors. In CVPR, 2011.
  • [32] A. Relja and A. Zisserman. Three things everyone should know to improve object retrieval. In CVPR, 2012.
  • [33] X. Shen, Z. Lin, J. Brandt, S. Avidan, and Y. Wu. Object retrieval and localization with spatially-constrained similarity measure and k-nn re-ranking. In CVPR, 2012.
  • [34] J. Van De Weijer, C. Schmid, J. Verbeek, and D. Larlus. Learning color names for real-world applications. Image Processing, IEEE Transactions on, 18(7):1512–1523, 2009.
  • [35] K. Q. Weinberger, J. Blitzer, and L. K. Saul. Distance metric learning for large margin nearest neighbor classification. In NIPS, 2005.
  • [36] C. Wengert, M. Douze, and H. Jégou. Bag-of-colors for improved image search. In ACM MM, 2011.
  • [37] C. Wojek, S. Walk, and B. Schiele. Multi-cue onboard pedestrian detection. In CVPR, 2009.
  • [38] S. Zhang, Q. Tian, G. Hua, Q. Huang, and S. Li. Descriptive visual words and visual phrases for image applications. In ACM MM, 2009.
  • [39] Y. Zhang, Z. Jia, and T. Chen. Image retrieval with geometry-preserving visual phrases. In CVPR, 2011.
  • [40] R. Zhao, W. Ouyang, and X. Wang. Person re-identification by salience matching. In ICCV, 2013.
  • [41] R. Zhao, W. Ouyang, and X. Wang. Unsupervised salience learning for person re-identification. In CVPR, 2013.
  • [42] R. Zhao, W. Ouyang, and X. Wang. Learning mid-level filters for person re-identification. In CVPR, 2014.
  • [43] L. Zheng, S. Wang, Z. Liu, and Q. Tian. Lp-norm idf for large scale image search. In CVPR, 2013.
  • [44] L. Zheng, S. Wang, Z. Liu, and Q. Tian. Packing and padding: Coupled multi-index for accurate image retrieval. In CVPR, pages 1947–1954, 2014.
  • [45] W.-S. Zheng, S. Gong, and T. Xiang. Associating groups of people. In BMVC, 2009.
  • [46] W.-S. Zheng, S. Gong, and T. Xiang. Person re-identification by probabilistic relative distance comparison. In CVPR, 2011.
  • [47] W. Zhou, Y. Lu, H. Li, Y. Song, and Q. Tian. Spatial coding for large scale partial-duplicate web image search. In ACM MM, 2010.
Comments 0
Request Comment
You are adding the first comment!
How to quickly get a good reply:
  • Give credit where it’s due by listing out the positive aspects of a paper before getting into which changes should be made.
  • Be specific in your critique, and provide supporting evidence with appropriate references to substantiate general statements.
  • Your comment should inspire ideas to flow and help the author improves the paper.

The better we are at sharing our knowledge with each other, the faster we move forward.
The feedback must be of minimum 40 characters and the title a minimum of 5 characters
Add comment
Loading ...
This is a comment super asjknd jkasnjk adsnkj
The feedback must be of minumum 40 characters
The feedback must be of minumum 40 characters

You are asking your first question!
How to quickly get a good answer:
  • Keep your question short and to the point
  • Check for grammar or spelling errors.
  • Phrase it like a question
Test description