• Guest
HabraHabr
  • Main
  • Users

  • Development
    • Programming
    • Information Security
    • Website development
    • JavaScript
    • Game development
    • Open source
    • Developed for Android
    • Machine learning
    • Abnormal programming
    • Java
    • Python
    • Development of mobile applications
    • Analysis and design of systems
    • .NET
    • Mathematics
    • Algorithms
    • C#
    • System Programming
    • C++
    • C
    • Go
    • PHP
    • Reverse engineering
    • Assembler
    • Development under Linux
    • Big Data
    • Rust
    • Cryptography
    • Entertaining problems
    • Testing of IT systems
    • Testing Web Services
    • HTML
    • Programming microcontrollers
    • API
    • High performance
    • Developed for iOS
    • CSS
    • Industrial Programming
    • Development under Windows
    • Image processing
    • Compilers
    • FPGA
    • Professional literature
    • OpenStreetMap
    • Google Chrome
    • Data Mining
    • PostgreSQL
    • Development of robotics
    • Visualization of data
    • Angular
    • ReactJS
    • Search technologies
    • Debugging
    • Test mobile applications
    • Browsers
    • Designing and refactoring
    • IT Standards
    • Solidity
    • Node.JS
    • Git
    • LaTeX
    • SQL
    • Haskell
    • Unreal Engine
    • Unity3D
    • Development for the Internet of things
    • Functional Programming
    • Amazon Web Services
    • Google Cloud Platform
    • Development under AR and VR
    • Assembly systems
    • Version control systems
    • Kotlin
    • R
    • CAD/CAM
    • Customer Optimization
    • Development of communication systems
    • Microsoft Azure
    • Perfect code
    • Atlassian
    • Visual Studio
    • NoSQL
    • Yii
    • Mono и Moonlight
    • Parallel Programming
    • Asterisk
    • Yandex API
    • WordPress
    • Sports programming
    • Lua
    • Microsoft SQL Server
    • Payment systems
    • TypeScript
    • Scala
    • Google API
    • Development of data transmission systems
    • XML
    • Regular expressions
    • Development under Tizen
    • Swift
    • MySQL
    • Geoinformation services
    • Global Positioning Systems
    • Qt
    • Dart
    • Django
    • Development for Office 365
    • Erlang/OTP
    • GPGPU
    • Eclipse
    • Maps API
    • Testing games
    • Browser Extensions
    • 1C-Bitrix
    • Development under e-commerce
    • Xamarin
    • Xcode
    • Development under Windows Phone
    • Semantics
    • CMS
    • VueJS
    • GitHub
    • Open data
    • Sphinx
    • Ruby on Rails
    • Ruby
    • Symfony
    • Drupal
    • Messaging Systems
    • CTF
    • SaaS / S+S
    • SharePoint
    • jQuery
    • Puppet
    • Firefox
    • Elm
    • MODX
    • Billing systems
    • Graphical shells
    • Kodobred
    • MongoDB
    • SCADA
    • Hadoop
    • Gradle
    • Clojure
    • F#
    • CoffeeScript
    • Matlab
    • Phalcon
    • Development under Sailfish OS
    • Magento
    • Elixir/Phoenix
    • Microsoft Edge
    • Layout of letters
    • Development for OS X
    • Forth
    • Smalltalk
    • Julia
    • Laravel
    • WebGL
    • Meteor.JS
    • Firebird/Interbase
    • SQLite
    • D
    • Mesh-networks
    • I2P
    • Derby.js
    • Emacs
    • Development under Bada
    • Mercurial
    • UML Design
    • Objective C
    • Fortran
    • Cocoa
    • Cobol
    • Apache Flex
    • Action Script
    • Joomla
    • IIS
    • Twitter API
    • Vkontakte API
    • Facebook API
    • Microsoft Access
    • PDF
    • Prolog
    • GTK+
    • LabVIEW
    • Brainfuck
    • Cubrid
    • Canvas
    • Doctrine ORM
    • Google App Engine
    • Twisted
    • XSLT
    • TDD
    • Small Basic
    • Kohana
    • Development for Java ME
    • LiveStreet
    • MooTools
    • Adobe Flash
    • GreaseMonkey
    • INFOLUST
    • Groovy & Grails
    • Lisp
    • Delphi
    • Zend Framework
    • ExtJS / Sencha Library
    • Internet Explorer
    • CodeIgniter
    • Silverlight
    • Google Web Toolkit
    • CakePHP
    • Safari
    • Opera
    • Microformats
    • Ajax
    • VIM
  • Administration
    • System administration
    • IT Infrastructure
    • *nix
    • Network technologies
    • DevOps
    • Server Administration
    • Cloud computing
    • Configuring Linux
    • Wireless technologies
    • Virtualization
    • Hosting
    • Data storage
    • Decentralized networks
    • Database Administration
    • Data Warehousing
    • Communication standards
    • PowerShell
    • Backup
    • Cisco
    • Nginx
    • Antivirus protection
    • DNS
    • Server Optimization
    • Data recovery
    • Apache
    • Spam and antispam
    • Data Compression
    • SAN
    • IPv6
    • Fidonet
    • IPTV
    • Shells
    • Administering domain names
  • Design
    • Interfaces
    • Web design
    • Working with sound
    • Usability
    • Graphic design
    • Design Games
    • Mobile App Design
    • Working with 3D-graphics
    • Typography
    • Working with video
    • Work with vector graphics
    • Accessibility
    • Prototyping
    • CGI (graphics)
    • Computer Animation
    • Working with icons
  • Control
    • Careers in the IT industry
    • Project management
    • Development Management
    • Personnel Management
    • Product Management
    • Start-up development
    • Managing the community
    • Service Desk
    • GTD
    • IT Terminology
    • Agile
    • Business Models
    • Legislation and IT-business
    • Sales management
    • CRM-systems
    • Product localization
    • ECM / EDS
    • Freelance
    • Venture investments
    • ERP-systems
    • Help Desk Software
    • Media management
    • Patenting
    • E-commerce management
    • Creative Commons
  • Marketing
    • Conferences
    • Promotion of games
    • Internet Marketing
    • Search Engine Optimization
    • Web Analytics
    • Monetize Web services
    • Content marketing
    • Monetization of IT systems
    • Monetize mobile apps
    • Mobile App Analytics
    • Growth Hacking
    • Branding
    • Monetize Games
    • Display ads
    • Contextual advertising
    • Increase Conversion Rate
  • Sundry
    • Reading room
    • Educational process in IT
    • Research and forecasts in IT
    • Finance in IT
    • Hakatonas
    • IT emigration
    • Education abroad
    • Lumber room
    • I'm on my way

PIFR - a method of generating a 3D mask, regardless of the angle of rotation of the face

 3r33333. 3r3-31. PIFR - a method of generating a 3D mask, regardless of the angle of rotation of the face
 3r33333.
 3r33333. We will bring you the translation of the article “ PIFR: Pose Invariant 3D Face Reconstruction ".
 3r33333.
 3r33333. In many real-world applications, including face detection and recognition, the generation of 3D emoticons and stickers, the geometry of the face needs to be restored from flat images. However, this task remains difficult, especially when most of the information about a person is unknowable.
 3r33333.
 3r33333. Jiang and Wu from Jiangnan University (China) and Kittler from the University of Surrey (United Kingdom) offer 3r317. A new algorithm for 3D-reconstruction of the face - PIFR 3r-3285. , which significantly increases the accuracy of the reconstruction, even in difficult poses. 3DMM models. developed by Branton and others;
 3r33333.
3r350. 3D model of a person with a multi-resolution
provided by the University of Surrey (United Kingdom);
 3r33333.
3r3355. large-scale model of the face (CMML) 3r3285. created by Imperial College.
 3r33333.
 3r33333.
 3r33333. The article uses the BML model, which is the most popular.
 3r33333.
 3r33333. There are several approaches to recreating a 3D model from a flat image, including:
 3r33333.
 3r33333. 3r3196.  3r33333.
method cascading regression;
 3r33333.
a combination of landmark face detection and 3D face reconstruction, as well as indexing of signs for constructing 3r380. tree regression model
;
 3r33333.
method normalization of expression and position of the face ;
 3r33333.
3DMM extension (3r390. E-3DMM 3r-3285.), which takes into account the change in facial expression;
 3r33333.
3r395. weighted fit
LandMark 3DMM based on the traditional regression method.
 3r33333.
 3r33333.
 3r33333.

The proposed method is PIFR


 3r33333. The article by Jiang, Wu and Kitler proposes a new algorithm for setting invariant 3D face reconstruction - POSE (Pose-Invariant 3D Face Reconstruction - PIFR), based on the 3DMM method.
 3r33333.
 3r33333. First, the authors propose to generate a frontal image, normalizing one input face image. This step allows you to recover additional identity information of the person.
 3r33333.
 3r33333. The next step is to use the weighted sum of the 3D features of the two images: frontal and original. This allows us not only to maintain the position of the original image, but also to expand the identification information.
 3r33333.
 3r33333. Scheme of the proposed approach:
 3r33333.
 3r33333. 3r3124.
 3r33333.
 3r33333. Experiments show that the PIVL algorithm has significantly improved the performance of 3D face reconstruction compared to previous methods, especially in complex poses.
 3r33333.
 3r33333. Consider the proposed model in more detail.
 3r33333.
 3r33333.

Description of the method


 3r33333. The PIVL method relies heavily on the 3DMM fitting process, which can be expressed as minimizing the error in calculating the coordinates of 3D projections of key points. However, the face created by the 3D model has about 5?000 vertices, and therefore iterative calculations lead to slow and inefficient convergence.
 3r33333.
 3r33333. To overcome this problem, researchers suggest using key points (for example, the center of the eye, the corner of the mouth and the tip of the nose) as the main truth in the process of fitting the mask. In particular, weighted fit 3DMM fit is used.
 3r33333.
 3r33333. 3r3149.
 3r33333. [i] Top row: original image and landmark. Bottom row: 3D-model of the face and its alignment on the 2D image 3r-3252.
 3r33333.
 3r33333. The next task is to recreate a 3D face mask on a close-up. To solve this problem, researchers use high-precision normalization of posture and expression (VNPV) , but to normalize only posture, not facial expressions. In addition, 3r3-3160. editing Poisson
used to restore the area of ​​the face, closed due to the angle of view.
 3r33333.
 3r33333.

Performance comparison with other methods


 3r33333. The effectiveness of the PIVL method was evaluated to recreate the face: 3r-3288.  3r33333.
 3r33333. 3r3174.  3r33333.
in small and medium poses;
 3r33333.
close ups;
 3r33333.
complex postures (deviation angles ± 90).
 3r33333. 3r3185.
 3r33333.
 3r33333. For this, researchers used Three publicly available :
 3r33333.
 3r33333. 3r3196.  3r33333.
The AFW dataset, created using Flickr images, contains 205 images with 468 marked faces, complex backgrounds and facial poses.
 3r33333.
An LFPW dataset containing 224 face images in the test set and 811 face images in the training set; each image is marked with 68 characteristic dots; 900 images from both sets were selected for testing in this study.
 3r33333.
The AFLW dataset is a large-scale database of individuals that contains about 250 million images tagged by hand, and each image is labeled with 21 feature points. In this study, only images in complex positions of a person from this data set were used for qualitative analysis.
 3r33333.
 3r33333.
 3r33333.
 3r33333.
Quantitative analysis of r3r3241.
 3r33333. Using the Average Euclidean Metric (CEM), the study compares the performance of the PIFR method with the E-3DMM and FW-3DMM in the AFW and lfpw data sets. The cumulative error distribution curves (RNO) are as follows: 3r-3288.  3r33333.
 3r33333.
 3r33333. [i] Comparison of the cumulative error distribution (PHO) curves in the AFW and LFPW 3r3252 data sets.
 3r33333.
 3r33333. As can be seen from these graphs and tables below, the WIVL method shows superior performance compared with the other two methods. Especially good is the effectiveness of recreation for close-ups.
 3r33333.
 3r33333.
 3r33333.
 3r33333.
Qualitative analysis 3r33232.
 3r33333. The method was also evaluated qualitatively based on photographs of the face in a different position from the AFLW data set. The results are shown in the figure below.
 3r33333.
 3r33333.
 3r33333. [i] Comparison of 3D face reconstruction: (a) source image; (b) FW-3DMM; (c) E-3DMM; (d) the proposed approach is 3r33252.
 3r33333.
 3r33333. Even if half of the landmarks are not visible due to non-trivial posture, which leads to large errors and failures of other methods, the PIFR method still works well.
 3r33333.
 3r33333. The following are additional examples of the effectiveness of the WAVL method based on images from the AFW dataset.
 3r33333.
 3r33333.
 3r33333. Top row: enter 2D images. Middle row: 3D mask. Bottom row: alignment of the mask
 3r33333.
 3r33333.

The result is


 3r33333. The new algorithm for the reconstruction of the face of the WIVL gives good results of reconstruction even in difficult poses. Taking both the original and frontal images for a weighted merge, the method allows you to recover enough information about the faces to recreate the 3D mask.
 3r33333.
 3r33333. In the future, the researchers plan to recover even more information about the face in order to improve the accuracy of the mask re-creation.
 3r33333.
 3r33333. Original
 3r33333.
 3r33333. Translated - Farid Gasratov
3r33333. 3r33333. 3r33333.
3r33333.
3r33333. 3r33333. 3r33333. 3r33333.

It may be interesting

  • Comments
  • About article
  • Similar news
Santiago 12 December 2019 11:55
During picture editing a lot of angles and factors that we have to check and a lot of work we have to do. The professional writing services share some of the software which you can use for your picture edit.
Peter 25 January 2020 20:09
I like glancing through a post that will make individuals think. Additionally, thank you for permitting me to remark! Top 5 Most Aggressive Bowling Balls Reviews

weber

Author

4-12-2018, 07:23

Publication Date

Algorithms / Machine learning

Category
  • Comments: 2
  • Views: 364
SHOCK! New software for phishing does
Let's talk about metrics as a way to
“How to turn a simple project into a
Rome Club Report 201? Chapter 1.5: The
The story of one game or 4 strategy,
Notes IoT provider. Case: we make a
Write a comment
Name:*
E-Mail:


Comments
Visit Our website If You Need Custom thanksgiving couple shirts, Shirts For Your Company, Family Or Friends & We’ll Cook Something Special for you!
Yesterday, 21:10

raymond weber

Inursing test bank was very pleased  to find this site.I wanted to thank you for this great read!! I definitely  enjoying every little bit of it and I have you bookmarked to check out new  stuff you post.  
Yesterday, 18:20

taxiseo2

You completed certain  reliable points there. I did a search on the subject and found nearly all  persons will agree with your blog.  
nursing test bank
Yesterday, 18:04

taxiseo2

Great post i must say  and thanks for the information. Education is definitely a sticky subject.  However, is still among the leading topics of our time. I appreciate your  post and look forward to more.
nursing test bank
Yesterday, 17:29

taxiseo2

So good! This web post provides knowledge, knowledge, good news, and is very useful. Thank you for everything Taxi Driver Jacket
Yesterday, 15:35

MalenaMorgan

Adv
Website for web developers. New scripts, best ideas, programming tips. How to write a script for you here, we have a lot of information about various programming languages. You are a webmaster or a beginner programmer, it does not matter, useful articles will help to make your favorite business faster.

Login

Registration Forgot password