VFM: Visual Feedback Model for Robust Object Recognition

被引:0
|
作者
Chong Wang
Kai-Qi Huang
机构
[1] Institute of Automation,National Laboratory of Pattern Recognition
[2] Chinese Academy of Sciences,undefined
来源
Journal of Computer Science and Technology | 2015年 / 30卷
关键词
object recognition; object classification; object detection; visual feedback;
D O I
暂无
中图分类号
学科分类号
摘要
Object recognition, which consists of classification and detection, has two important attributes for robustness: 1) closeness: detection windows should be as close to object locations as possible, and 2) adaptiveness: object matching should be adaptive to object variations within an object class. It is difficult to satisfy both attributes using traditional methods which consider classification and detection separately; thus recent studies propose to combine them based on confidence contextualization and foreground modeling. However, these combinations neglect feature saliency and object structure, and biological evidence suggests that the feature saliency and object structure can be important in guiding the recognition from low level to high level. In fact, object recognition originates in the mechanism of “what” and “where” pathways in human visual systems. More importantly, these pathways have feedback to each other and exchange useful information, which may improve closeness and adaptiveness. Inspired by the visual feedback, we propose a robust object recognition framework by designing a computational visual feedback model (VFM) between classification and detection. In the “what” feedback, the feature saliency from classification is exploited to rectify detection windows for better closeness; while in the “where” feedback, object parts from detection are used to match object structure for better adaptiveness. Experimental results show that the “what” and “where” feedback is effective to improve closeness and adaptiveness for object recognition, and encouraging improvements are obtained on the challenging PASCAL VOC 2007 dataset.
引用
收藏
页码:325 / 339
页数:14
相关论文
共 50 条
  • [21] Visual object recognition in multiple sclerosis
    Laatu, S
    Revonsuo, A
    Hämäläinen, P
    Ojanen, V
    Ruutiainen, J
    JOURNAL OF THE NEUROLOGICAL SCIENCES, 2001, 185 (02) : 77 - 88
  • [22] Learning visual variation for object recognition
    Leksut, Jatuporn Toy
    Zhao, Jiaping
    Itti, Laurent
    IMAGE AND VISION COMPUTING, 2020, 98
  • [23] Deep Learning based Visual Object Recognition for Manipulator Grasps
    Lee, Min-Fan Ricky
    Hsu, Fu-Yao
    Doan, Hoang-Phuong
    To, Quang-Duy
    Kristanto, Yavier
    2022 18TH IEEE/ASME INTERNATIONAL CONFERENCE ON MECHATRONIC AND EMBEDDED SYSTEMS AND APPLICATIONS (MESA 2022), 2022,
  • [24] Invariant visual object and face recognition: neural and computational bases, and a model, VisNet
    Rolls, Edmund T.
    FRONTIERS IN COMPUTATIONAL NEUROSCIENCE, 2012, 6
  • [25] Combination of prior relations with visual information by random walk model for object recognition
    Lin Xiao
    Xiao Guoqiang
    2012 INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING (ISISE), 2012, : 390 - 395
  • [26] A Robust Object Recognition Method for Soccer Robots
    Lu, Huimin
    Zheng, Zhiqiang
    Liu, Fei
    Wang, Xiangke
    2008 7TH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-23, 2008, : 1645 - 1650
  • [27] Integration of multiple methods for robust object recognition
    Mansur, A.
    Kuno, Yoshinori
    PROCEEDINGS OF SICE ANNUAL CONFERENCE, VOLS 1-8, 2007, : 1985 - 1990
  • [28] Depth aspect images for robust object recognition
    Takeguchi, T
    Kaneko, S
    OPTOMECHATRONIC SYSTEMS IV, 2003, 5264 : 54 - 65
  • [29] A robust real time object detection and recognition algorithm for multiple objects
    Modwel G.
    Mehra A.
    Rakesh N.
    Mishra K.K.
    Recent Advances in Computer Science and Communications, 2021, 14 (01) : 331 - 338
  • [30] Object detection and recognition by using enhanced Speeded Up Robust Feature
    Al-asadi, Tawfiq A.
    Obaid, Ahmed J.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2016, 16 (04): : 66 - 71