• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Chu Zhen, Mi Qing, Ma Wei, Xu Shibiao, Zhang Xiaopeng. Part-Level Occlusion-Aware Human Pose Estimation[J]. Journal of Computer Research and Development, 2022, 59(12): 2760-2769. DOI: 10.7544/issn1000-1239.20210723
Citation: Chu Zhen, Mi Qing, Ma Wei, Xu Shibiao, Zhang Xiaopeng. Part-Level Occlusion-Aware Human Pose Estimation[J]. Journal of Computer Research and Development, 2022, 59(12): 2760-2769. DOI: 10.7544/issn1000-1239.20210723

Part-Level Occlusion-Aware Human Pose Estimation

Funds: This work was supported by the National Natural Science Foundation of China (61771026, 62176010) and the Key Project of Beijing Municipal Education Commission, China ( KZ201910005008).
More Information
  • Published Date: November 30, 2022
  • With the rapid development of deep learning, human pose estimation technology has made remarkable progress in recent years, but the existing methods are still difficult to deal with the common occlusion problem. To address this problem, a human pose estimation method based on keypoint-level occlusion inference is proposed in this paper. Firstly, a baseline human pose estimation network is used to obtain the noisy representation of each keypoint of human body from images with occlusion noises. Then, the occluded keypoints are estimated through the occlusion part prediction module to obtain the visibility vector. The occlusion part prediction module is proposed in this study, which consists of two submodules: occlusion part classification network and visibility encoder. The occlusion part classification network predicts the occlusion state of each keypoint of the human body. Based on the channel attention mechanism, the visibility encoder converts the predicted occlusion state into a set of weight parameters. Finally, the visibility vector and noise features are fused by channel re-weighting method to obtain the keypoint-level occlusion aware features, which are used to calculate the heatmaps of the keypoints. Experimental results on MPII and LSP(leeds sports pose) datasets show that, compared with the baseline human pose estimation network, the proposed method can better deal with the occlusion problem at a small extra computational cost, and achieve better results than existing state-of-the-art methods.
  • Related Articles

    [1]Lai Baoqiang, Li Zheng, Zhao Ruilian, Guo Junxia. Context-Aware Based API Recommendation with Diversity[J]. Journal of Computer Research and Development, 2023, 60(10): 2335-2347. DOI: 10.7544/issn1000-1239.202220317
    [2]Tang Dan, Cai Hongliang, Geng Wei. Decoding Method of Reed-Solomon Erasure Codes[J]. Journal of Computer Research and Development, 2022, 59(3): 582-596. DOI: 10.7544/issn1000-1239.20210575
    [3]Zhang Bing, Wen Zheng, Wei Xiaoyu, Ren Jiadong. InterDroid: An Interpretable Android Malware Detection Method for Conceptual Drift[J]. Journal of Computer Research and Development, 2021, 58(11): 2456-2474. DOI: 10.7544/issn1000-1239.2021.20210560
    [4]Yang Wang, Gao Mingzhe, Jiang Ting. A Malicious Code Static Detection Framework Based on Multi-Feature Ensemble Learning[J]. Journal of Computer Research and Development, 2021, 58(5): 1021-1034. DOI: 10.7544/issn1000-1239.2021.20200912
    [5]Guo Jinyang, Shao Chuanming, Wang Jing, Li Chao, Zhu Haojin, Guo Minyi. Programming and Developing Environment for FPGA Graph Processing: Survey and Exploration[J]. Journal of Computer Research and Development, 2020, 57(6): 1164-1178. DOI: 10.7544/issn1000-1239.2020.20200106
    [6]Zheng Zhen, Zhai Jidong, Li Yan, Chen Wenguang. Workload Analysis for Typical GPU Programs Using CUPTI Interface[J]. Journal of Computer Research and Development, 2016, 53(6): 1249-1262. DOI: 10.7544/issn1000-1239.2016.20148354
    [7]Jiao Sibei, Ying Lingyun, Yang Yi, Cheng Yao, Su Purui, and Feng Dengguo. An Anti-Obfuscation Method for Detecting Similarity Among Android Applications in Large Scale[J]. Journal of Computer Research and Development, 2014, 51(7): 1446-1457.
    [8]Dong Longming, Wang Ji, Chen Liqian, Dong Wei. Memory Leak Detection for Heap-Manipulating Programs Based on Local Heap Abstraction[J]. Journal of Computer Research and Development, 2012, 49(9): 1832-1842.
    [9]Ma Peijun, Wang Tiantian, and Su Xiaohong. Automatic Grading of Student Programs Based on Program Understanding[J]. Journal of Computer Research and Development, 2009, 46(7): 1136-1142.
    [10]Wang Zhaofei and Huang Chun. Static Detection of Deadlocks in OpenMP Fortran Programs[J]. Journal of Computer Research and Development, 2007, 44(3).
  • Cited by

    Periodical cited type(4)

    1. 葛继科,何明坤,陈祖琴,凌劲,张一帆. 基于多模态特征融合的Android恶意程序检测方法研究. 电子技术应用. 2025(01): 62-68 .
    2. 朱晋恺,方兰婷,季小文,黄杰. 基于行为特征和语义特征的多模态Android恶意软件检测方法. 电子科技. 2024(05): 71-78 .
    3. 桑道松. 基于知识图谱的恶意软件信息检测方法研究. 九江学院学报(自然科学版). 2024(03): 79-84 .
    4. 殷建艳. 面向云数据库的Android应用风险评估方法. 信息与电脑(理论版). 2023(17): 177-179 .

    Other cited types(6)

Catalog

    Article views (226) PDF downloads (123) Cited by(10)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return