当前位置:网站首页>Fundamentals of face recognition (facenet)
Fundamentals of face recognition (facenet)
2022-07-02 13:05:00 【Konjaku in the east wind】
List of articles
Main ideas for reference :
- FaceNet The paper :FaceNet: A Unified Embedding for Face Recognition and Clustering
- Wu Enda video
- Keras bosses
Face verification VS Face recoginition
For face verification , We can regard it as a binary classification problem , But face recognition has developed to the present , We still use face recognition to solve .
Encoder
- We enter a picture into encoder, Through a series of Networks , Output a unique password , This string of passwords compiles this person .
- When we compare , Pass the current picture through encoder Code to get a string of passwords , Compare this string of passwords with all the passwords in the database . If f ( k e y , k e y i d a t a b a s e ) ≤ α f(key,key_{i_{database}}) \leq\alpha f(key,keyidatabase)≤α, We think this person is the person in the database .
Triplet Loss
That's the question : How do we train this network (Encoder)?
We divide the data into three groups .
( A n c h o r , P o s i t i v e , N e g a t i v e ) A n c h o r surface in I People Need to be want knowledge other Of this individual people , P o s i t i v e surface in The people Of another One Zhang chart slice , N e g a t i v e surface in another One individual people Of chart slice . (Anchor,Positive,Negative)\\ Anchor Indicates the person we need to identify ,Positive Another picture of the person \\,Negative A picture of another person . (Anchor,Positive,Negative)Anchor surface in I People Need to be want knowledge other Of this individual people ,Positive surface in The people Of another One Zhang chart slice ,Negative surface in another One individual people Of chart slice .
I People set The righteous T r i p l e t L o s s : M a x ( ∣ ∣ ( k e y A n c h o r ) − ( k e y P o s i t i v e ) ∣ ∣ − ∣ ∣ ( k e y A n c h o r ) − ( k e y N e g a t i v e ) ∣ ∣ + α , 0 ) We define Triplet Loss:\\ Max(||(key_{Anchor}) - (key_{Positive})|| -||(key_{Anchor})\\ - (key_{Negative})|| + \alpha ,0) I People set The righteous TripletLoss:Max(∣∣(keyAnchor)−(keyPositive)∣∣−∣∣(keyAnchor)−(keyNegative)∣∣+α,0)
We are optimizing Encoder When , We need different photos of the same person Encoder The compiled key The gap should be as small as possible , At the same time, I hope that the pictures of different people will be compiled key The gap should be as big as possible .
As for the neural network in the middle , You can write your own , You can even use the previous image classification VGG perhaps ConvNet.
边栏推荐
- 传感器 ADXL335BCPZ-RL7 3轴 加速度计 符合 RoHS/WEEE
- Ltc3307ahv meets EMI standard, step-down converter qca7005-al33 phy
- Linear DP acwing 897 Longest common subsequence
- Unity SKFramework框架(十八)、RoamCameraController 漫游视角相机控制脚本
- Js1day (input / output syntax, data type, data type conversion, VaR and let differences)
- JDBC prevent SQL injection problems and solutions [preparedstatement]
- Tencent three sides: in the process of writing files, the process crashes, and will the file data be lost?
- Jerry's watch ringtone audition [article]
- 哈希表 AcWing 841. 字符串哈希
- How to get the operating system running PHP- How to get the OS on which PHP is running?
猜你喜欢
Counter attack of flour dregs: MySQL 66 questions, 20000 words + 50 pictures in detail! A little six
spfa AcWing 851. spfa求最短路
spfa AcWing 851. SPFA finding the shortest path
Heap acwing 839 Simulated reactor
哈希表 AcWing 841. 字符串哈希
[error record] cannot open "XXX" because Apple cannot check whether it contains malware
JDBC prevent SQL injection problems and solutions [preparedstatement]
spfa AcWing 852. spfa判断负环
Get started REPORT | today, talk about the microservice architecture currently used by Tencent
[opencv learning] [image filtering]
随机推荐
Dijkstra AcWing 850. Dijkstra finding the shortest circuit II
Unity SKFramework框架(十九)、POI 兴趣点/信息点
Wechat official account payment prompt MCH_ ID parameter format error
Browser node event loop
获取文件版权信息
Hash table acwing 840 Simulated hash table
Obtain file copyright information
About the loading of layer web spring layer components, the position of the layer is centered
堆 AcWing 839. 模拟堆
Ali was killed by two programming problems at the beginning, pushed inward again, and finally landed (he has taken an electronic offer)
堆 AcWing 838. 堆排序
js5day(事件监听,函数赋值给变量,回调函数,环境对象this,全选反选案例,tab栏案例)
8 examples of using date commands
Hundreds of web page special effects can be used. Don't you come and have a look?
js1day(輸入輸出語法,數據類型,數據類型轉換,var和let區別)
JDBC prevent SQL injection problems and solutions [preparedstatement]
基于STM32的OLED 屏幕驱动
线性DP AcWing 896. 最长上升子序列 II
bellman-ford AcWing 853. Shortest path with side limit
What data types does redis have and their application scenarios