Professional Documents
Culture Documents
Complexity Reduced Face Detection Using
Complexity Reduced Face Detection Using
Abstract—The Adaboosting has attracted attention for its lection to extract a small subset of all possible RFs form the
efficient face-detection performance. However, in the training improvement of detection results.
process, the large number of possible Haar-like features in a The recent research has made substantial improvement on
standard sub-window becomes time consuming, which makes
specific environment feature adaptation extremely difficult. This
two aspects of the face-detection problem. One was on the se-
letter presents a two-stage hybrid face detection scheme using lection of effective features and the other one was on the clas-
Probability-based Face Mask Pre-Filtering (PFMPF) and the sifier designation with effective learning algorithm. Recently,
Pixel-Based Hierarchical-Feature Adaboosting (PBHFA) method a new set of rotated Haar-like features was presented by Lien-
to effectively solve the above-mentioned problems in cascade Ad- hart [3], which can improve the accuracy for the cases of rotated
aboosting. The two stages both provide far less training time than face. Rowley et al., also developed a neural network system for
that of the cascade Adaboosting and thus reduce the computation
complexity in face-detection tasks. In particular, the proposed
facial detection [4]. In addition, comparisons have been made
PFMPF can effectively filter out more than 85% nonface in an about training time under different feature numbers. However,
image and the remaining few face candidates are then secondly the practical detection time cannot be improved comparing to
filtered with a single PBHF Adaboost strong classifier. Given a the typical Adaboost.
sub-window, the number of possible PBH features is In this letter, a two-stage hybrid face detection scheme is pro-
simplified down to a level less than , which significantly posed for significantly reducing training time and detection time
reduces the length of the training period by a factor of 1500.
Moreover, when the two-stage hybrid face detection scheme are
to improve the feasibility of specific environment feature adap-
employed for practical face-detection tasks, the complexity is tation in face detection. Each method has a different advantage:
still lower than that of the integral-image based approach in the The first stage, PFMPF, can filter out most nonface and thus
traditional Adaboosting method. Experimental results obtained accurately reserve face candidates for the second stage, PBHF
using the gray feret database show that the proposed two-stage Adaboost strong classifier.
hybrid face detection scheme is significantly more effective than The rest of this work is organized as follows. The proposed
Haar-like features.
PFMPF is introduced in Section II. Section III describes the pro-
Index Terms—Adaboost, face detection, hierarchical feature, posed pixel-based hierarchical-feature. Experimental results are
probability-based face mask. presented in Section IV, and Section V draws the conclusions.
Fig. 1. Example of PBH features selection. (a) Step 2 to produce binary image.
(b) Step 3 to produce the order table.
TABLE I
PERFORMANCE COMPARISONS BETWEEN TRADITIONAL ADABOOSTING AND
THE PROPOSED METHOD USING FERET AND CMU DATABASE
V. CONCLUSIONS
In this letter, a hybrid face detector with the Probability-based
Convolutional Face Mask (PFMPF) and the Pixel-Based Hier-
archical-Feature Adaboosting (PBHFA) is proposed. The goal is
to improve the processing efficiency for the classification of face
and nonface candidates. As documented in the experimental re-
sults, the training time is significantly reduced, and the detection
rate remains competitive to the traditional Adaboosting method.
In summary, the proposed method is an effective approach and
difference in training time is around by a factor of 1500. The
reason is that too many Haar-like features cause data swapping the implementation is straightforward. The simplicity and com-
putation efficiency make this approach an excellent candidate
between memory and hard drive, while the proposed PBH fea-
for real-time surveillance system.
tures can be solely put in the memory, and thus which causes
the huge difference in training time.
Table II documents the computation complexity comparisons REFERENCES
of these two methods when applied to practical detection. The [1] P. Viola and M. J. Jones, “Robust real-time object detection,” Int. J.
Comput. Vis., vol. 57, no. 2, pp. 137–154, 2004.
upper part shows the complexity proportional to a sub-window [2] Y. Freund and R. Schapire, “A decision theoretic generalization of
size, . The complexity of using Haar-like features is fur- on-line learning and an application to boosting,” J. Comput. Syst. Sci.,
ther divided into integral image evaluation and K weak classi- vol. 55, pp. 119–139, 1997.
[3] R. Lienhart, A. Kuranov, and V. Pisarevsky, “Empirical analysis of
fiers value calculation. Since the histogram equalization is ap- detection cascades of boosted classifiers for rapid object,” in DAGM
plied to each sub-window to ease the lighting effect, each sub- 25th Pattern Recognition Symp., 2003, pp. 297–304.
window has to compute its corresponding integral image. So the [4] H. A. Rowley, S. Baluja, and T. Kanade, “Neural network-based face
detection,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 20, no. 1, pp.
complexity of computing the integral image is . The 23–38, 1998.
lower part of Table II shows the complexity when [5] P. J. Phillips, H. Wechsler, J. Huang, and P. Rauss, “The FERET
. The best scenario by [1] using Haar-like features is database and evaluation procedure for face recognition algorithms,” J.
Image Vis. Comput., vol. 16, no. 5, pp. 295–306, 1998.
1784 addition/subtraction when all the weak classifiers [6] P. J. Phillips, H. Moon, S. A. Rizvi, and P. J. Rauss, “The FERET
are 2-rectangle features. However, when 3-rectangle or 4-rec- evaluation methodology for face recognition algorithms,” IEEE Trans.
tangle features are involved, the number of operations is higher Pattern Anal. Mach. Intell., vol. 22, pp. 1090–1104, 2000.
than 1784. [7] CBCL Face Database #1 MIT Center for Biological and Compu-
tation Learning [Online]. Available: http://cbcl.mit.edu/cbcl/soft-
An example using the majority voting strategy is illustrated ware-datasets/FaceData2.html
in Fig. 4. The five images on the left are corresponding to the [8] J.-M. Guo and M.-F. Wu, “Pixel-based hierarchical-feature face detec-
scaled images from the original image with the scaling factor tion,” in IEEE Int. Conf. on Acoustics Speech and Signal Processing
(ICASSP), March 2010, pp. 1638–1641.
. As it can be seen, all the test faces have been suc- [9] CMU Frontal Face Images [Online]. Available: http://vasc.ri.cmu.edu//
cessfully detected for . When and , two idb/html/face/frontal_images/index.html