Journal of Computer Applications ›› 2025, Vol. 45 ›› Issue (3): 832-839.DOI: 10.11772/j.issn.1001-9081.2024101538
• Frontier research and typical applications of large models • Previous Articles Next Articles
Qiang LI1, Shaoxiong BAI1, Yuan XIONG2, Wei YUAN3()
Received:
2024-10-31
Revised:
2024-12-02
Accepted:
2024-12-04
Online:
2025-01-06
Published:
2025-03-10
Contact:
Wei YUAN
About author:
LI Qiang, born in 1996, M. S., engineer. His research interests include intelligent system construction, intelligent device update, operation safe.通讯作者:
袁薇
作者简介:
李强(1996—),男,山西神池人,工程师,硕士,主要研究方向:智慧化系统建设、智能装备革新、安全运营CLC Number:
Qiang LI, Shaoxiong BAI, Yuan XIONG, Wei YUAN. Privacy preserving localization of surveillance images based on large vision models[J]. Journal of Computer Applications, 2025, 45(3): 832-839.
李强, 白少雄, 熊源, 袁薇. 基于视觉大模型隐私保护的监控图像定位[J]. 《计算机应用》唯一官方网站, 2025, 45(3): 832-839.
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.joca.cn/EN/10.11772/j.issn.1001-9081.2024101538
场景类型 | 主要对象 | 水平 间隔/m | 垂直 间隔/m | 横摆角 间隔/(°) | 俯仰角 间隔/(°) |
---|---|---|---|---|---|
市区 | 高楼 | 100 | 30 | 60 | 30 |
村庄 | 民房 | 60 | 20 | 30 | 15 |
社区 | 道路 | 30 | 10 | 15 | 10 |
Tab. 1 Interval for off-line data generation in different outdoor scenes
场景类型 | 主要对象 | 水平 间隔/m | 垂直 间隔/m | 横摆角 间隔/(°) | 俯仰角 间隔/(°) |
---|---|---|---|---|---|
市区 | 高楼 | 100 | 30 | 60 | 30 |
村庄 | 民房 | 60 | 20 | 30 | 15 |
社区 | 道路 | 30 | 10 | 15 | 10 |
方法 | RMSE | PSNR/dB | SSIM | FID |
---|---|---|---|---|
SD-CN-Normal | 98.938 | 8.377 | 0.224 | 286.16 |
SD-CN-Depth | 107.040 | 7.609 | 0.193 | 316.13 |
SD-CN-LSD | 102.090 | 8.019 | 0.128 | 316.05 |
SD-CN-Edge | 0.238 | 339.77 | ||
SD-CN-Canny | 86.994 | 9.465 | 0.216 | |
SD-CN-Tile | 39.421 | 16.239 | 174.55 |
Tab. 2 Evaluation for style transfer image generation quality
方法 | RMSE | PSNR/dB | SSIM | FID |
---|---|---|---|---|
SD-CN-Normal | 98.938 | 8.377 | 0.224 | 286.16 |
SD-CN-Depth | 107.040 | 7.609 | 0.193 | 316.13 |
SD-CN-LSD | 102.090 | 8.019 | 0.128 | 316.05 |
SD-CN-Edge | 0.238 | 339.77 | ||
SD-CN-Canny | 86.994 | 9.465 | 0.216 | |
SD-CN-Tile | 39.421 | 16.239 | 174.55 |
图像 | 方法 | KPS | RPJE/px | POS/m | ROT/(°) | PSNR/dB |
---|---|---|---|---|---|---|
无风格 迁移 图像 | DenseVLAD | 40.50 | 14.660 | 6.936 | 3.185 | 11.158 |
MeshLoc | 242.60 | 3.361 | 0.677 | 0.342 | 12.281 | |
VirtualLoc | 284.10 | 3.120 | 0.248 | 0.181 | 12.476 | |
本文方法 | 293.20 | 3.032 | 0.241 | 0.178 | 12.480 | |
风格 迁移 图像 | DenseVLAD | 35.12 | 63.050 | 8.993 | 4.561 | 11.626 |
MeshLoc | 88.43 | 54.910 | 8.064 | 4.045 | 11.717 | |
VirtualLoc | 142.10 | 46.270 | 7.949 | 3.982 | 11.729 | |
本文方法 | 187.30 | 3.826 | 1.212 | 0.601 | 13.298 |
Tab. 3 Experimental results of style transfer visual localization
图像 | 方法 | KPS | RPJE/px | POS/m | ROT/(°) | PSNR/dB |
---|---|---|---|---|---|---|
无风格 迁移 图像 | DenseVLAD | 40.50 | 14.660 | 6.936 | 3.185 | 11.158 |
MeshLoc | 242.60 | 3.361 | 0.677 | 0.342 | 12.281 | |
VirtualLoc | 284.10 | 3.120 | 0.248 | 0.181 | 12.476 | |
本文方法 | 293.20 | 3.032 | 0.241 | 0.178 | 12.480 | |
风格 迁移 图像 | DenseVLAD | 35.12 | 63.050 | 8.993 | 4.561 | 11.626 |
MeshLoc | 88.43 | 54.910 | 8.064 | 4.045 | 11.717 | |
VirtualLoc | 142.10 | 46.270 | 7.949 | 3.982 | 11.729 | |
本文方法 | 187.30 | 3.826 | 1.212 | 0.601 | 13.298 |
1 | TORFT C, MADDERN W, TORII A, et al. Long-term visual localization revisited [J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2022, 44(4):2074-2088. |
2 | SATTLER T, TORII A, SIVIC J, et al. Are large-scale 3D models really necessary for accurate visual localization [C]// Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition. Piscataway: IEEE, 2017:1637-1646. |
3 | TORII A, ARANDJELOVIĆ R, SIVIC J, et al. 24/7 place recognition by view synthesis [C]// Proceedings of the 2015 IEEE Conference on Computer Vision and Pattern Recognition. Piscataway: IEEE, 2015:1808-1817. |
4 | ARANDJELOVIĆ R, GRONAT P, TORII A, et al. NetVLAD: CNN architecture for weakly supervised place recognition [J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2018, 40(6): 1437-1451. |
5 | HAUSLER S, GARG S, XU M, et al. Patch-NetVLAD: multi-scale fusion of locally-global descriptors for place recognition [C]// Proceedings of the 2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition. Piscataway: IEEE, 2021:14136-14147. |
6 | KENDALL A, GRIMES M, CIPOLLA R. PoseNet: a convolutional network for real-time 6-DOF camera relocalization [C]// Proceedings of the 2015 IEEE International Conference on Computer Vision. Piscataway: IEEE, 2015:2938-2946. |
7 | SATTLER T, ZHOU Q, POLLEFEYS M, et al. Understanding the limitations of CNN-based absolute camera pose regression [C]// Proceedings of the 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition. Piscataway: IEEE, 2019: 3297-3307. |
8 | QI C R, SU H, MO K, et al. PointNet: deep learning on point sets for 3D classification and segmentation [C]// Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition. Piscataway: IEEE, 2017: 77-85. |
9 | QI C R, YI L, SU H, et al. PointNet++: deep hierarchical feature learning on point sets in a metric space [C]// Proceedings of the 31st International Conference on Neural Information Processing Systems. Red Hook: Curran Associates Inc., 2017: 5105-5114. |
10 | SARLIN P E, CADENA C, SIEGWART R, et al. From coarse to fine: robust hierarchical localization at large scale [C]// Proceedings of the 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition. Piscataway: IEEE, 2019: 12708-12717. |
11 | SARLIN P E, UNAGAR A, LARSSON M, et al. Back to the feature: learning robust camera localization from pixels to pose[C]// Proceedings of the 2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition. Piscataway: IEEE, 2021: 3246-3256. |
12 | PANEK V, KUKELOVA Z, SATTLER T. MeshLoc: mesh-based visual localization [C]// Proceedings of the 2022 European Conference on Computer Vision, LNCS 13682. Cham: Springer, 2022:589-609. |
13 | YUAN X, JINGRU W, ZHONG Z. VirtualLoc: large-scale visual localization using virtual images [J]. ACM Transactions on Multimedia Computing, Communications, and Applications, 2024, 20(3): No.66. |
14 | SPECIALE P, SCHÖNBERGER J L, KANG S B, et al. Privacy preserving image-based localization [C]// Proceedings of the 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition. Piscataway: IEEE, 2019: 5488-5498. |
15 | PIETRANTONI M, HUMENBERGER M, SATTLER T, et al. SegLoc: learning segmentation-based representations for privacy-preserving visual localization [C]// Proceedings of the 2023 IEEE/CVF Conference on Computer Vision and Pattern Recognition. Piscataway: IEEE, 2023: 15380-15391. |
16 | 秦川,董腾林,姚恒. 基于风格迁移纹理合成与识别的构造式信息隐藏[J]. 软件学报, 2023, 34(12):5773-5786. |
QIN C, DONG T L, YAO H. Constructive data hiding based on texture synthesis and recognition with image style transfer [J]. Journal of Software, 2023, 34(12):5773-5786. | |
17 | 杨盼,张敏情,葛虞,等. 基于风格迁移过程的彩色图像信息隐藏算法[J]. 计算机应用, 2023, 43(6):1730-1735. |
YANG P, ZHANG M Q, GE Y, et al. Color image information hiding algorithm based on style transfer process [J]. Journal of Computer Applications, 2023, 43(6): 1730-1735. | |
18 | 谢艺艺,张玉书,赵若宇,等. 基于CycleGAN的图像隐私保护[J]. 应用科学学报, 2023, 41(2):228-239. |
XIE Y Y, ZHANG Y S, ZHAO R Y, et al. Image privacy protection based on cycle-consistent generative adversarial networks [J]. Journal of Applied Sciences, 2023, 41(2): 228-239. | |
19 | ROMBACH R, BLATTMANN A, LORENZ D, et al. High-resolution image synthesis with latent diffusion models [C]// Proceedings of the 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition. Piscataway: IEEE, 2022: 10674-10685. |
20 | RADFORD A, KIM J W, HALLACY C, et al. Learning transferable visual models from natural language supervision [C]// Proceedings of the 38th International Conference on Machine Learning. New York: JMLR.org, 2021: 8748-8763. |
21 | ZHANG L, RAO A, AGRAWALA M. Adding conditional control to text-to-image diffusion models [C]// Proceedings of the 2023 IEEE/CVF International Conference on Computer Vision. Piscataway: IEEE, 2023: 3836-3847. |
22 | 张泽宇,王铁君,郭晓然,等. AI绘画研究综述[J]. 计算机科学与探索, 2024, 18(6):1404-1420. |
ZHANG Z Y, WANG T J, GUO X R, et al. Survey of AI painting [J]. Journal of Frontiers of Computer Science and Technology, 2024, 18(6): 1404-1420. | |
23 | 艾浩军,曾维珂,陶荆杰,等. 基于扩散模型的室内定位射频指纹数据增强方法[J]. 通信学报, 2023, 44(11):201-212. |
AI H J, ZENG W K, TAO J J, et al. Radio frequency fingerprint data augmentation for indoor localization based on diffusion model [J]. Journal on Communications, 2023, 44(11):201-212. | |
24 | LOWE D G. Distinctive image features from scale-invariant keypoints [J]. International Journal of Computer Vision, 2004, 60(2):91-110. |
25 | ZHOU H, ZHANG T, JAGADEESAN J. Re-weighting and 1-point RANSAC-based PnP solution to handle outliers [J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2019, 41(12):3022-3033. |
26 | WANG Z, BOVIK A C, SHEIKH H R, et al. Image quality assessment: from error visibility to structural similarity [J]. IEEE Transactions on Image Processing, 2004, 13(4):600-612. |
27 | DAI A, CHANG A X, SAVVA M, et al. ScanNet: richly-annotated 3D reconstructions of indoor scenes [C]// Proceedings of the 2017 IEEE Conference on Conference on Computer Vision and Pattern Recognition. Piscataway: IEEE, 2017: 2432-2443. |
28 | YANG L, KANG B, HUANG Z, et al. Depth anything: unleashing the power of large-scale unlabeled data [C]// Proceedings of the 2024 IEEE/CVF Conference on Computer Vision and Pattern Recognition. Piscataway: IEEE, 2024: 10371-10381. |
29 | GU G, KO B, GO S, et al. Towards light-weight and real-time line segment detection [C]// Proceedings of the 36th AAAI Conference on Artificial Intelligence. Palo Alto: AAAI Press, 2022:726-734. |
30 | XIE S, TU Z. Holistically-nested edge detection [C]// Proceedings of the 2015 IEEE International Conference on Computer Vision. Piscataway: IEEE, 2015: 1395-1403. |
31 | CANNY J. A computational approach to edge detection [J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 1986, PAMI-8(6): 679-698. |
[1] | Chenyang LI, Long ZHANG, Qiusheng ZHENG, Shaohua QIAN. Multivariate controllable text generation based on diffusion sequences [J]. Journal of Computer Applications, 2024, 44(8): 2414-2420. |
[2] | Jinsong XU, Ming ZHU, Zhiqiang LI, Shijie GUO. Location control method for generated objects by diffusion model with exciting and pooling attention [J]. Journal of Computer Applications, 2024, 44(4): 1093-1098. |
[3] | Yusheng LIU, Xuezhong XIAO. High-fidelity image editing based on fine-tuning of diffusion model [J]. Journal of Computer Applications, 2024, 44(11): 3574-3580. |
[4] | Dongying ZHU, Yong ZHONG, Guanci YANG, Yang LI. Research progress on motion segmentation of visual localization and mapping in dynamic environment [J]. Journal of Computer Applications, 2023, 43(8): 2537-2545. |
[5] | Chunyong YIN, Ying LI. Fast sanitization algorithm based on BCU-Tree and dictionary for high-utility mining [J]. Journal of Computer Applications, 2023, 43(2): 413-422. |
[6] | Le ZHAO, En ZHANG, Leiyong QIN, Gongli LI. Multi-party privacy preserving k-means clustering scheme based on blockchain [J]. Journal of Computer Applications, 2022, 42(12): 3801-3812. |
[7] | YANG Shuxin, LIANG Wen, ZHU Kaili. Reverse influence maximization algorithm in social networks [J]. Journal of Computer Applications, 2020, 40(7): 1944-1949. |
[8] | MA Minyao, WU Lian, LIU Zhuo, XU Yi. Privacy-preserving determination of integer point-interval relationship [J]. Journal of Computer Applications, 2020, 40(7): 1983-1988. |
[9] | LONG Yangyang, CHEN Yuling, XIN Yang, DOU Hui. Secure energy transaction scheme based on alliance blockchain [J]. Journal of Computer Applications, 2020, 40(6): 1668-1673. |
[10] | MA Minyao, XU Yi, LIU Zhuo. Privacy preserving Hamming distance computing problem of DNA sequences [J]. Journal of Computer Applications, 2019, 39(9): 2636-2640. |
[11] | DING Doujian, ZHAO Xiaolin, WANG Changgen, GAO Guangen, KOU Lei. Autonomous localization and obstacle detection method of robot based on vision [J]. Journal of Computer Applications, 2019, 39(6): 1849-1854. |
[12] | ZHANG Shuxuan, KANG Haiyan, YAN Han. Privacy preserving for social network relational data based on Skyline computing [J]. Journal of Computer Applications, 2019, 39(5): 1394-1399. |
[13] | SHI Zhicai, WANG Yihan, ZHANG Xiaomei, CHEN Shanshan, CHEN Jiwei. Provable radio frequency identification authentication protocol with scalability [J]. Journal of Computer Applications, 2019, 39(3): 774-778. |
[14] | LUO Xiaoshuang, YANG Xiaoyuan, WANG Xu'an. A private set intersection protocol against malicious attack [J]. Journal of Computer Applications, 2017, 37(6): 1593-1598. |
[15] | LUO Xiaoshuang, YANG Xiaoyuan, WANG Xu'an. Privacy preserving interest matching scheme for social network [J]. Journal of Computer Applications, 2016, 36(12): 3322-3327. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||