Research Article | Open Access
Shiyang Yan, Yizhang Xia, Jeremy S. Smith, Wenjin Lu, Bailing Zhang, "Multiscale Convolutional Neural Networks for Hand Detection", Applied Computational Intelligence and Soft Computing, vol. 2017, Article ID 9830641, 13 pages, 2017. https://doi.org/10.1155/2017/9830641
Multiscale Convolutional Neural Networks for Hand Detection
Unconstrained hand detection in still images plays an important role in many hand-related vision problems, for example, hand tracking, gesture analysis, human action recognition and human-machine interaction, and sign language recognition. Although hand detection has been extensively studied for decades, it is still a challenging task with many problems to be tackled. The contributing factors for this complexity include heavy occlusion, low resolution, varying illumination conditions, different hand gestures, and the complex interactions between hands and objects or other hands. In this paper, we propose a multiscale deep learning model for unconstrained hand detection in still images. Deep learning models, and deep convolutional neural networks (CNNs) in particular, have achieved state-of-the-art performances in many vision benchmarks. Developed from the region-based CNN (R-CNN) model, we propose a hand detection scheme based on candidate regions generated by a generic region proposal algorithm, followed by multiscale information fusion from the popular VGG16 model. Two benchmark datasets were applied to validate the proposed method, namely, the Oxford Hand Detection Dataset and the VIVA Hand Detection Challenge. We achieved state-of-the-art results on the Oxford Hand Detection Dataset and had satisfactory performance in the VIVA Hand Detection Challenge.
Robust hand detection in unconstrained environments is one of the most important yet challenging problems in computer vision. It is closely associated with various hand-related tasks, for example, hand gesture recognition, hand action analysis, human-machine interaction, and sign language recognition. Hand detection is often the first step in the task of action recognition and is also one of the most difficult parts because the hand shapes or hand gestures can have great variability. For example, a hand may hold objects, hands may appear at different scales with closed or open palms, the hand may have different articulations of the fingers, and the hand can also hold other hands. Moreover, the illumination variance and object occlusion also add extra difficulties to the task.
Hand detection has been intensely studied in the last decade. Encouraged by the success of Viola and Jones’s face detection scheme  which combines rectangular Haar-like features and the AdaBoost classification algorithm to train a detector, similar methodologies have been researched for hand detection . Though efficient in face detection, Haar-like features are not sufficient to represent complex and highly articulate objects like the human hand. As appropriate gradient histogram feature descriptors such as histograms of oriented gradients (HOG)  have been extensively investigated for object detection, the same effort has also been made towards hand detection . Despite achieving improvements, the performance is still far from satisfactory due to large variations in the appearance of hands in unconstrained settings.
Aiming to tackle the bottleneck of feature representation in object detection, a promising development, by exploiting a family of channel features, has achieved record performances for pedestrian detection . Channel features compute registered maps of the original images like gradients and histograms of oriented gradients and then extract features on these extended channels. A variant of channel features, called aggregate channel features, has been adopted for hand detection in  where a two-stage scheme was designed for detecting hands and their orientations. Three complementary detectors were applied to propose hand bounding boxes and a second stage classifier learnt to compute a final confidence score for the proposals using these features. Based on the development of feature representation of images, various detecting schemes have been developed. Among them, a part-based model, that is, Deformable Part Model (DPM) proposed by Felzenszwalb et al. , had been in the lead in object detection before 2014. This method specially applied HOG features of images, with latent parts of objects forming a deformable graphical model of objects, and achieved promising results. Aiming to tackle the problem of hand detection, the authors of  also used DPM as the hand shape detector to detect hands in unconstrained images.
However, the aforementioned strategies for object detection in general, and hand detection in particular, exploited hand-crafted features which often have limited representational capability. Recently, convolutional neural networks (CNNs)  have been extensively studied in image recognition and other relevant tasks, often with state-of-the-art performance . Girshick et al.  proposed the Region-Based Convolutional Networks (R-CNNs) framework, in which the high-capacity convolutional networks were applied to bottom-up region proposals in order to localize and segment objects. More comprehensive evaluations of the R-CNN families have recently been published with different benchmarks [13, 15, 16]. An appropriately designed CNN model can learn multiple stages of invariant features of an image and a CNN based object detection is generally an end-to-end system that is jointly optimized for both feature representation and classification.
However, R-CNN also has drawbacks such as expensive multistage training and slow object detection as described in . Recently, much research has tried to improve the R-CNN framework. Spatial pyramid pooling networks (SPPnets)  were proposed to speed up R-CNN by sharing computation but without improving the multistage training pipeline implemented in R-CNN. As a result, Girshick  proposed Fast R-CNN with multitask learning and single-stage training.
How to faithfully describe an object at multiple scales is the core of a successful object detection system, which is particularly true when the objects are subject to scale variations without restrictions. This is the precise situation of hand detection. R-CNNs are often applied to general purpose object detection, where the fixed filter receptive fields from the last layer of CNN could not match with the variable sizes of objects like hands. Some of the recent researches have tried to find solutions for this. In , a multiscale CNN was proposed, which comprises two subnetworks to create complementary multiple detectors.
Rather than designing complex structures, as in , to fit the scale variations of objects, we propose a multiscale detection system for hand objects by exploring the scale rich representations provided by a single CNN. As pointed out by Zeiler and Fergus , the information gathered in the different layers of a CNN model has different abstraction of features and scales. The last layer which is often applied in many recognition schemes [12, 17] is not sufficient to represent multiscale objects such as hands in our system.
While the benefit of gleaning information from multiple layers of CNN has been discovered for image classification , our contributions lie in the integration of different features from intermediate layers to account for multiscale hands, which has not been previously investigated.
To be more specific, our main contributions can be summarized as follows:(1)To achieve multiscale representation of hand objects, we propose a strategy to integrate the features from multiple layers of a CNN model.(2)We verified the effectiveness of the proposed scheme through extensive experiments, with significantly boosted detection performance.(3)We achieved state-of-the-art results on the Oxford Hand Detection Dataset  and competitive results on the VIVA Hand Detection Challenge .
Figure 1 shows one detection example of our methods in unconstrained environments.
The rest of this paper is organized as follows. In Section 2, we briefly introduced previous research in hand detection. This is followed by our proposed approach explained in Section 3. Section 4 details our experimental procedure and presents results from the two datasets used for hand detection. Conclusions are presented in Section 5.
2. Related Works
2.1. Hand Detection
Inspired by the progress of object detection in the field of computer vision, many methods have been proposed for hand detection in the last decade. The simplest method  is based on the detection of skin color, which not only mixes up hands, faces, and arms, but also has problems because of the sensitivity to illumination changes.
As Haar-like features and the AdaBoost classifier [22–24] have been extensively applied in many different object detection applications with outstanding successes, Mao et al.  proposed hand detection by improving Haar-like features with the restriction of asymmetric hand patterns. However, their experimental results demonstrated that the improvements might be marginal for complex backgrounds. Chouvatut et al.  applied the use of the SAMME algorithm , instead of a decision tree, as an estimator for the degree of orientation angles of the hands, mainly from the perspective of avoiding the overfitting problem. Despite the achievements made, it is generally accepted that Haar-like features are not powerful enough to represent complex objects like hands due to the large variations in their appearance.
Dalal and Triggs  applied HOG for human detection. HOG and a number of subsequent variants have been extensively applied as an efficient feature representation in various vision problems. Felzenszwalb et al.  proposed the Deformable Part Model (DPM), which applied HOG features for image representation and made use of latent parts for object detection. DPM won the Visual Object Classes (VOC) object detection challenge from 2007 to 2009. Recently, Mittal et al.  proposed hand detection based on three types of detectors, namely, DPM-based shape detector, color-based skin detector, and detectors with contextual cues (context detector). Although the precision performance was satisfactory, the detection was extremely slow which prevents it from becoming a feasible real-time approach.
2.2. Region-Based CNNs
All of the methods mentioned above applied hand-crafted features before the classification. In recent years, there has been much progress in CNNs targeted at feature learning for object detection and other vision tasks. A typical CNN model can be illustrated by Figure 2, which consists of two convolutional layers, two subsampling layers, and two fully connected layers. The model was proposed by LeCun et al.  to recognize handwritten digits and has only recently gained popularity from the interest in deep learning . The most remarkable success of CNNs is in large scale object recognition  in the ImageNet Large Scale Visual Recognition Challenge (ILSVRC).
Szegedy et al.  applied separate CNNs for object detection, that is, bounding boxes regression, and classification for the verification of whether the predicted boxes contain objects. Girshick et al.  proposed R-CNN, where the regions are generated by some oversegmentation algorithms such as the selective search  and the CNN is fine-tuned with these region proposals. With image features extracted by the trained CNN model, the system is further trained for target recognition with Support Vector Machines (SVM). R-CNN, the first generation of region-based CNN, has become a milestone for object detection, which also inspired a number of other superior methods [17, 18, 31, 32]. Among them, Fast R-CNN  features a joint training framework in which the feature extractor, classifier, and regressor are trained together in a unified framework. Due to these advantages, Fast R-CNN is exploited as the main building block in our approach.
In many real-world applications, some subtly different objects to be discriminated involve fine-grained details. As the differences between subcategories are small, ideal feature representations should take multiscale image patches into account from different CNN layers. However, neither R-CNN nor Fast R-CNN considers the issue of information granularity with regard to fine-grained recognition. This is also one of the main limitations to many other CNN models which only target coarse-grained recognition problems. How to incorporate multiscale features in fully convolutional neural networks to achieve improved performance has become an interesting research issue in computer vision research.
Bell et al.  proposed to account for the multiscale information with an Inside-Outside Network (ION), which combines features at multiple scales and levels of abstraction with the aid of skip pooling and spatial recurrent neural networks. Recently, Zagoruyko et al.  further developed the idea of skip connections to extract features at multiple network layers and presented the MultiPath network to further improve the standard Fast R-CNN object detector.
Our work follows a similar strategy of gathering features from multiple layers by skip pooling for hand detection.
3. Our Methods
The proposed hand detection network is illustrated by Figure 3. Although our improvements to the CNN architecture are not constrained by the type of models, our design is based upon the VGG16 model , a widely applied deep CNN model. The VGG16 network model consists of five convolutional blocks: Conv1 to Conv5. The Conv1 and Conv2 blocks each contain two convolutional layers while there are three convolutional layers in Conv3, Conv4, and Conv5. Instead of pooling the Region of Interest (RoI) features only at the last convolutional layer, we add RoI pooling layers after Conv3, Conv4, and Conv5.
Fast R-CNN  takes the whole image and sets of bounding boxes as inputs and produces a feature map by convolutional and max pooling layers. Each bounding box will be initially projected to the feature map, followed by a pooling operation in a pooling layer, where RoI pooling, a special case of the spatial pyramid pooling layer in SPPnet , is adopted. As the most important component of Fast R-CNN, the RoI pooling layer enables the acceptance of different image sizes of the region proposal, thus improving the R-CNN method. RoI max pooling first divides each RoI feature map into a fixed number of subwindows and then applies max pooling in each window. As a result, different sizes of input can be pooled into fixed lengths of feature representations.
As the different layers in convolutional neural networks represent different abstraction for features, we implemented feature pooling from multiple layers [33, 34]. As previously explained, the paradigm has been generally acknowledged as an important improvement to earlier CNN models where only the last layer of the CNN is exploited for feature representation . The information from the last single layer is only suitable when the task is to generate class labels to images or regions because the last layer is the most sensitive to semantic information . When a task involves fine-grained information, which is the case of our work on hand detection, outputs from the last layer alone are not sufficient to represent the image features. The same statement can be applied to many other tasks such as image segmentation, pose estimation, or fine-grained object recognition. As an efficient solution, features from shallow layers and deeper layers should be fused together to capture multiscale information about a hand image.
Also, tiny hand objects will be difficult to identify based only on the last convolutional layers. Take the VGG16 model as an example where the last convolutional layer has an overall stride of 16. If a hand image is 16 × 16 pixels, the corresponding feature map in this layer would be only 1 pixel, which means the corresponding receptive field is too large to capture the essential information of the hand object. However, if features from multiple layers are aggregated, image representations from shallow layers will be retained which contain much more detailed information on tiny hand objects and accordingly facilitate multiscale detection.
As previously explained, RoI pooling generates fixed length features. One potential problem for the pooled features is the wide range of attribute values as they vary widely in magnitude across different layers. The deeper layers often have much smaller values compared with shallower layers because of the convolution operation. This lack of feature normalization will cause convergence problems when training the CNN model. Also poor performance would be expected as the model will be biased by the larger features values. As a simple solution, we utilized L2 normalization after RoI pooling as suggested in  to normalize the features.
The L2 normalization is implemented after RoI pooling. The L2 normalization is conducted on all the pixels of the feature maps, and all the feature maps are treated independently; that is,where represents the normalized features and represents the original features. In (1), features are L2 normalized. In (2), represents the dimension of each entry of features.
The feature normalization step proposed in  also includes a rescaling operation which is an important concept stemming from . The scale factor can be a fixed value. We empirically set up the scale factor from experiments. Specifically, the mean scale of features pooled from the last convolutional layer (Conv5) on the training set was measured and set as the target scale. Then the mean scale of features from each convolutional layer is computed and the scaling factor can be consequently obtained by simple division.
To match the original shape of the RoI pooled features (), we reduced the concatenated feature dimension using a convolution. Hence, the outputs from our network architecture would be the same as the original VGG16 model. Subsequently, two fully connected layers are applied before the multitask strategies, namely, feature classification and bounding box regression.
In this section, we present the results from our methods on two benchmark datasets: the Oxford Hand Detection Dataset  and the VIVA Hand Detection Challenge . All the experiments were conducted using the Ubuntu 14.04 operating system. The CNN models were trained on the Caffe platform , a C++ deep learning library. The max iteration of training and learning rate were set as 40000 and 0.001, respectively. For the Oxford Hand Detection Dataset, we applied the PASCAL VOC evaluation toolkit for evaluation; for the VIVA Hand Detection Challenge, we submitted our results to the official evaluation server. All the data of the other participators’ methods was obtained from the organizing committee.
4.1. Oxford Hand Detection Dataset
Mittal et al.  collected this dataset for hand and its orientation detection. This is a comprehensive dataset collected from a number of different public image resources. As explained in , no restriction was imposed on the pose or visibility of people, and there was no constraint placed on the environment.
The dataset is split into training (1844 images), validation (406 images), and testing sets (436 images). The details of the dataset can be found in . However, the original annotations of the training dataset are not axes aligned but placed according to the orientation of the hand’s wrist. In our experiment, we reallocate the bounding box annotations of the training set by making it align with the horizontal axis to facilitate the training of the deep learning model. These annotations are new in our research, which are consistent with the locations and scales of the original bounding boxes. The testing set was applied in their original form, so as to compare with other methods.
For all the images and hand instances in the validation and testing dataset, we conducted comparison experiments with both the baseline approach and the proposed model. To compare with previously published methods, we also performed experiments using the original evaluation protocol of  so as to evaluate the detection performance of the big hand instances as in .
Figure 4 presents some image examples from the dataset and the corresponding annotations. As can be seen from the figure, there are large variations in the illumination conditions, scales, viewpoints, and hand poses. Also, the dataset contains a number of small hand objects which adds extra difficulties to the detection task.
The experimental procedure can be further explained as follows.
As a first step, a set of region candidates was generated by Edgeboxes  on the training set. We set the maximum number of candidates to 3,000. The Edgeboxes algorithm would generate bounding boxes according to the confidence values. The top 3,000 candidates have higher probabilities of containing objects. We then trained the proposed CNN model using ground-truth annotations and the generated candidate regions. During training, positive samples were collected with a fixed overlapping ratio. If a candidate region overlaps more than 0.5 with the annotated bounding box, it was considered as positive. Otherwise, the region was treated as a background. The percentages of positive samples and negative samples to all of the candidate regions are 25% and 75%, respectively.
Following the common practice of applying CNN, the model was first pretrained with ImageNet and then fine-tuned with the sampled candidate regions previously explained. The popular Stochastic Gradient Descent (SGD) algorithm was applied for the CNN training, with each SGD minibatch size chosen as 128. As pointed out by Girshick , it is not necessary to fine-tune all the layers. In our experiments, we kept the Conv1 and Conv2 parameters unchanged and fine-tuned the other layers with a maximum iteration of 40,000. During training, we encountered the underfitting problem with the model training. In order to compensate for this, we removed all the drop-out layers of the model  and observed improved results.
After training, the methods were tested on the validation and testing sets separately. We firstly plotted the recall versus intersection over union (IoU) curve on both of the Oxford Validation Set and Test set, as illustrated in Figure 5. The recall versus IoU curve was applied as the main evaluation metric for the region proposal algorithm in . This figure indicates, for certain overlap ratios (IoU) between detected boxes and ground-truth regions, how many true positive samples can be fetched. Hence, in this paper, we also plotted this curve to evaluate the performance of the Edgeboxes algorithm. The Edgeboxes algorithm achieved 81.25% and 77.30% recall rates when the IoU ratio is 0.5 on the validation set and test set, respectively. The recall rate is not very high due to the unconstrained settings of the dataset and the large variances of shape, pose, and the scale of the hands.
We then ran the CNN models using the generated candidate regions. To prove the capability of the proposed model, we set the original VGG16  model as the baseline. To keep the number of detected boxes limited, we applied Non-Maximum Suppression (NMS) with a threshold of 0.3 in the experiment to eliminate redundant bounding boxes. Following the popular Average Precision evaluation protocol, we applied the PASCAL VOC  evaluation tool kit to calculate the Average Precision (AP). As pointed out by Provost et al. , simply using accuracy results can be misleading. A Precision-Recall (PR) curve is normally used as the evaluation metric for object detection . Figure 6 shows the PR curve for the baseline method and our methods. The area below the PR curve is the AP value. We can see clear improvements on the AP results from the figure. Table 1 shows the AP values on the validation and test sets. On both of the validation and test set, our methods outperformed the baseline approach, with AP values of 51.2% and 49.6% on the validation and test set, respectively.
To compare with the previously published methods, experiments were also conducted with the same evaluation protocol of . In , hand instances larger than a fixed area of the bounding box (1500 sq. pixels) are used in evaluation. Reference  also applied the PASCAL VOC evaluation protocol for the evaluation. Hence, our experiments are consistent with the procedure in . Figure 7 shows the PR curve of the proposed model and the baseline approach. From the figure, it is obvious that our method (red curve) has a higher AP value than the baseline method (blue curve). Table 2 shows the AP results of our method and comparisons with other published results. Our method achieved a state-of-the-art AP result of 58.4%.
Figure 8 illustrates some of the detected examples on this dataset. Despite the severe occlusion and small sizes of the hands in some images, the hands can still be correctly detected. Table 2 summarizes the results of our approach and some of the previously published methods, confirming the improved performance from our proposed method.
To investigate the situations where the proposed method was not successful, Figure 9 shows some examples of incorrectly detected images. In most of these instances, the mistake is misclassifying some other objects as hands. For example, feet, corsage, or logos on T-shirts appearing in the image would be misjudged as a hand, as illustrated in the figure. This problem is not trivial and the solution may not be straightforward based on the current method. A possible approach to tackle the issue is to explore the contextual information in the discrimination of some hand-like objects and real hands.
4.2. VIVA Hand Detection Dataset
The University of California, San Diego  assembled an annotated dataset for hand detection under realistic driving conditions, with the objective of serving as a component in the Vision for Intelligent Vehicles and Applications (VIVA) challenge (http://cvrr.ucsd.edu/vivachallenge/index.php/hands/hand-detection/).
There are a number of challenges for the detection of a driver’s hands in real driving conditions. To address these challenges, the dataset was designed to reflect variations in illumination, nonhand objects with similar color, occlusion, and camera viewpoints. Figure 10(a) shows examples of different viewpoints, Figure 10(b) illustrates circumstances where skin-like nonhand objects appear in the image, Figure 10(c) demonstrates an occlusion example, and Figure 10(d) is an example of illumination variation. The VIVA dataset is the first public dataset which can effectively evaluate the performance of a hand detection system inside a vehicle environment.
The dataset includes two parts: the training set and the testing set, each with 5500 images. While the annotations of training sets were released, we manually labelled the testing set for the subsequent experiments. The testing set can be further divided into two parts: Level-1 (L1) and Level-2 (L2). According to the dataset specification, L1 only includes the back view imagery and larger instances (above 70 pixels in height) while L2 comprises imagery from all view points as well as instances larger than 25 pixels, which serves as a more difficult challenge. Results are presented based on both of the subsets.
Similar to the experimental procedure in Section 4.1, after training of candidate regions generated by the Edgeboxes, during evaluation, we first generated a set of region proposals using the Edgeboxes algorithm and evaluated the performance by plotting the recall versus IoU curve, with the results shown in Figure 11. On the L2 dataset, the recall value is 90.0% with IoU 0.5, which is much smaller than the recall value of 97.7% on L1. This is consistent with the fact that L2 is more difficult than L1.
We then performed testing with our model. NMS with a threshold of 0.3 was also conducted to eliminate redundant bounding boxes. Figure 12 illustrates the PR curve for both of the L1 and L2 datasets. This PR curve indicates that our method (the black curve) ranks very highly in terms of the AP value (area under the PR curve). With AP values as the performance indicator, more comprehensive comparisons with results from applying other recently published methods are provided in Table 3. All the figures and values are from the official evaluation server. Among the compared methods, our approach (Multiscale Fast R-CNN) showed satisfactory performance. Specifically, we achieved a state-of-the-art AP result on the L1 dataset, with a 92.8% AP value, and it ranked second on the L2 dataset, with an 84.7% AP value.
As suggested by the challenge, we also utilized the Average Recall (AR) evaluation protocol ; AR was calculated from the ROC curve over 9 evenly sampled points in log space between 10−2 and 100 false positives per image and suitable for summarizing the detection performance at lower false positive rates . Figure 13 shows the ROC curve of our methods on the L1 and L2 datasets. From the figure, it is clear that the area under the curve of our method (black curve) ranks higher than other published results. Table 4 shows the AR results of our method and other participators’ methods. Our method achieved 82.8% and 66.5% AR value on the L1 and L2 dataset, respectively, which are higher than all the other published results.
Figure 14 shows some of the correctly detected examples. Even with different types of variations including occlusions and rescale, our proposed approach can correctly detect hands in most of the situations. Some unsuccessful examples are shown in Figure 15. Occasionally, certain kinds of cloth or part of the body such as an arm or face might be mistaken as hands. As we discussed at the end of Section 4.1, this difficult task will be our next step in working towards developing a highly reliable hand detection system that is applicable in the real world.
This paper presented a Multiscale Fast R-CNN approach to accurately detect human hands in unconstrained images. By fusing multilevel convolutional features, our CNN model is able to achieve better results than the conventional VGG16 model. This method is especially efficient for small hand objects which are often hard to detect with conventional CNN models. Our methods have been validated on two benchmark datasets: the Oxford Hand Detection Dataset and the VIVA Hand Detection Challenge. On the Oxford dataset, we achieved state-of-the-art results with an improvement in performance by a significant margin; for the VIVA Hand Detection Challenge, our results have good performance as listed in the official website. Future work includes the fusion of contextual information to realize reliable hand detection, particularly for the environment inside a vehicle.
Conflicts of Interest
The authors declare that there are no conflicts of interest regarding the publication of this paper.
- P. Viola and M. Jones, “Rapid object detection using a boosted cascade of simple features,” in Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR '01), vol. 1, pp. I–511–I–518, 2001.
- N. H. Dardas and N. D. Georganas, “Real-time hand gesture detection and recognition using bag-of-features and support vector machine techniques,” Instrumentation and Measurement, IEEE Transactions on, vol. 60, no. 11, pp. 3592–3607, 2011.
- N. Dalal and B. Triggs, “Histograms of oriented gradients for human detection,” in Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR '05), vol. 1, pp. 886–893, June 2005.
- X. Meng, J. Lin, and Y. Ding, “An extended hog model: schog for human hand detection,” in Proceedings of the International Conference on Systems and Informatics (ICSAI '12), pp. 2593–2596, China, May 2012.
- P. Dollar, R. Appel, S. Belongie, and P. Perona, “Fast feature pyramids for object detection,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 36, no. 8, pp. 1532–1545, 2014.
- N. Das, E. Ohn-Bar, and M. M. Trivedi, “On performance evaluation of driver hand detection algorithms: challenges, dataset, and metrics,” in Proceedings of the 18th IEEE International Conference on Intelligent Transportation Systems (ITSC '15), pp. 2953–2958, Spain, September 2015.
- P. F. Felzenszwalb, R. B. Girshick, D. McAllester, and D. Ramanan, “Object detection with discriminatively trained part-based models,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 32, no. 9, pp. 1627–1645, 2010.
- A. Mittal, A. Zisserman, and P. Torr, “Hand detection using multiple proposals,” in Proceedings of the British Machine Vision Conference (BMVC '11), pp. 1–11, Dundee, UK, 2011.
- S. Bambach, S. Lee, D. J. Crandall, and C. Yu, “Lending a hand: detecting hands and recognizing activities in complex egocentric interactions,” in Proceedings of the 15th IEEE International Conference on Computer Vision, (ICCV '15), pp. 1949–1957, Chile, December 2015.
- J. Redmon, S. Divvala, R. Girshick, and A. Farhadi, “You only look once: Unified real-time object detection,” in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 779–788, 2016.
- T. Zhou, P. J. Pillai, and V. G. Yalla, “Hierarchical context-aware hand detection algorithm for naturalistic driving,” in Proceedings of the IEEE 19th International Conference on Intelligent Transportation Systems (ITSC '16), pp. 1291–1297, Rio de Janeiro, Brazil, November 2016.
- A. Krizhevsky, I. Sutskever, and G. E. Hinton, “Imagenet classification with deep convolutional neural networks,” in Proceedings of the 26th Annual Conference on Neural Information Processing Systems (NIPS '12), pp. 1097–1105, Lake Tahoe, Nev, USA, December 2012.
- O. Russakovsky, J. Deng, H. Su et al., “Imagenet large scale visual recognition challenge,” International Journal of Computer Vision, vol. 115, no. 3, pp. 211–252, 2015.
- R. Girshick, J. Donahue, T. Darrell, and J. Malik, “Region-based convolutional networks for accurate object detection and segmentation,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 38, no. 1, pp. 142–158, 2016.
- M. Everingham, L. van Gool, C. K. I. Williams, J. Winn, and A. Zisserman, “The pascal visual object classes (VOC) challenge,” International Journal of Computer Vision, vol. 88, no. 2, pp. 303–338, 2010.
- T.-Y. Lin, M. Maire, S. Belongie et al., “Microsoft COCO: Common objects in context,” Lecture Notes in computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 8693, no. 5, pp. 740–755, 2014.
- R. Girshick, “Fast R-CNN,” in Proceedings of the 15th IEEE International Conference on Computer Vision (ICCV '15), pp. 1440–1448, December 2015.
- K. He, X. Zhang, S. Ren, and J. Sun, “Spatial pyramid pooling in deep convolutional networks for visual recognition,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 37, no. 9, pp. 1904–1916, 2015.
- Z. Cai, Q. Fan, R. S. Feris, and N. Vasconcelos, “A unified multi-scale deep convolutional neural network for fast object detection,” in Proceedings of the European Conference on Computer Vision, pp. 354–370, Springer, Berlin, Germany, 2016.
- M. D. Zeiler and R. Fergus, “Visualizing and understanding convolutional networks,” in Proceedings of the Computer Vision—ECCV 2014: 13th European Conference, vol. 8689 of Lecture Notes in Computer Science, pp. 818–833, Springer, Zurich, Switzerland, September 6–12, 2014.
- S. Yang and D. Ramanan, “Multi-scale recognition with DAG-CNNs,” in 15th IEEE International Conference on Computer Vision, ICCV 2015, pp. 1215–1223, chl, December 2015.
- I. F. Ince, M. Socarras-Garzon, and T.-C. Yang, “Hand mouse: real time hand motion detection system based onanalysis of finger blobs,” International Journal of Digital Content Technology and Its Applications, vol. 4, no. 2, pp. 40–56, 2010.
- G.-Z. Mao, Y.-L. Wu, M.-K. Hor, and C.-Y. Tang, “Real-time hand detection and tracking against complex background,” in Proceedings of the 5th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP '09), pp. 905–908, Japan, September 2009.
- V. Chouvatut, C. Yotsombat, R. Sriwichai, and W. Jindaluang, “Multi-view hand detection applying viola-jones framework using SAMME AdaBoost,” in Proceedings of the 7th International Conference on Knowledge and Smart Technology (KST '15), pp. 30–35, Thailand, January 2015.
- J. Zhu, H. Zou, S. Rosset, and T. Hastie, “Multi-class AdaBoost,” Statistics and Its Interface, vol. 2, no. 3, pp. 349–360, 2009.
- Y. LeCun, B. Boser, J. S. Denker et al., “Backpropagation applied to handwritten zip code recognition,” Neural Computation, vol. 1, no. 4, pp. 541–551, 1989.
- Y. Bengio, A. Courville, and P. Vincent, “Representation learning: a review and new perspectives,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 35, no. 8, pp. 1798–1828, 2013.
- C. Szegedy, A. Toshev, and D. Erhan, “Deep neural networks for object detection,” in Advances in Neural Information Processing Systems 26, C. J. C. Burges, L. Bottou, M. Welling, Z. Ghahramani, and K. Q. Weinberger, Eds., pp. 2553–2561, Curran Associates, Inc, Red Hook, NY, USA, 2013.
- R. Girshick, J. Donahue, T. Darrell, and J. Malik, “Rich feature hierarchies for accurate object detection and semantic segmentation,” in Proceedings of the 27th IEEE Conference on Computer Vision and Pattern Recognition (CVPR '14), pp. 580–587, IEEE, Columbus, Ohio, USA, June 2014.
- K. E. A. Van De Sande, J. R. R. Uijlings, T. Gevers, and A. W. M. Smeulders, “Segmentation as selective search for object recognition,” in Proceedings of the IEEE International Conference on Computer Vision (ICCV '11), pp. 1879–1886, IEEE, November 2011.
- S. Ren, K. He, R. Girshick, and J. Sun, “Faster R-CNN: towards real-time object detection with region proposal networks,” in Advances in Neural Information Processing Systems, pp. 91–99, 2015.
- J. Redmon, S. Divvala, R. Girshick, and A. Farhadi, “You only look once: unified, real-time object detection,” https://arxiv.org/abs/1506.02640.
- S. Bell, C. L. Zitnick, K. Bala, and R. Girshick, “Inside-outside net: detecting objects in context with skip pooling and recurrent neural networks,” 2015, https://arxiv.org/abs/1512.04143.
- S. Zagoruyko, A. Lerer, T.-Y. Lin et al., “A multipath network for object detection,” https://arxiv.org/abs/1604.02135.
- K. Simonyan and A. Zisserman, “Very deep convolutional networks for large-scale image recognition,” 2014, https://arxiv.org/abs/1409.1556.
- B. Hariharan, P. Arbeláez, R. Girshick, and J. Malik, “Hypercolumns for object segmentation and fine-grained localization,” in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR '15), pp. 447–456, Boston, Mass, USA, June 2015.
- W. Liu, A. Rabinovich, and A. C. Berg, “Parsenet: looking wider to see better,” https://arxiv.org/abs/1506.04579.
- Y. Jia, E. Shelhamer, J. Donahue et al., “Caffe: convolutional architecture for fast feature embedding,” in Proceedings of the ACM International Conference on Multimedia, pp. 675–678, ACM, Orlando, Fla, USA, November 2014.
- C. L. Zitnick and P. Dollár, “Edge boxes: locating object proposals from edges,” in Proceedings of the European Conference on Computer Vision (ECCV '14), pp. 391–405, Springer, Zurich, Switzerland, September 2014.
- J. Hosang, R. Benenson, P. Dollar, and B. Schiele, “What makes for effective detection proposals?” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 38, no. 4, pp. 814–830, 2016.
- F. J. Provost, T. Fawcett, and R. Kohavi, “The case against accuracy estimation for comparing induction algorithms,” in Proceedings of the International Conference on Machine Learning (ICML '98), vol. 98, pp. 445–453, 1998.
Copyright © 2017 Shiyang Yan et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.