This video belongs to the openHPI course Künstliche Intelligenz und Maschinelles Lernen in der Praxis. Do you want to see more?
An error occurred while loading the video player, or it takes a long time to initialize. You can try clearing your browser cache. Please try again later and contact the helpdesk if the problem persists.
Scroll to current position
- 00:00Welcome to Unit Introduction Computer Vision.
- 00:04In this unit we will present a short thematic Introducing Computer Vision,
- 00:09before we get into the practical Take a look at the example.
- 00:13Computer Vision is the term used to describe that field in machine learning, where you can take pictures on a computer.
- 00:18the most varied types and How processed and analyzed.
- 00:23In the Computer Vision area, some tasks, such as face recognition or
- 00:28the recognition of Gestures or poses in pictures.
- 00:30Of course, the Recognition of objects in images is important.
- 00:35It is important to distinguish between: if you only have one object in each
- 00:40image or several.
- 00:43It is also important to to distinguish whether you only want to classify an image
- 00:47or the objects localize or segment.
- 00:52However, we want to first a step back.
- 00:55What are the Images for a computer?
- 00:59On screens, images are naturally colored , but pictures are taken from a
- 01:04Computer only as numbers and saved.
- 01:07In this picture, a black-and-white image is by Abraham Lincoln.
- 01:15In a black-and-white color space with eight bits per Color pixel stands for black and 255 for white.
- 01:24Of course, the least Pictures black and white.
- 01:27Most of the time, however, there are for colorful Pictures three so-called channels.
- 01:31That means for every pixel three values for blue, green and red.
- 01:37But how exactly can one get out of this Matrix of numbers now recognize patterns or even faces?
- 01:45Very prominent in this field are convolutional neural networks.
- 01:50Convolutional Neural Networks are very well known before all things through image processing
- 01:54or the processing of audio data.
- 01:58A convolutional neural network has always three main components,
- 02:03which are installed in a row. The convolution layer, the pooling layer
- 02:08and the Fully Connected Layer.
- 02:12You can create multiple convolutional and pooling layers
- 02:15in a row.
- 02:16However, before you start using Fully Connected Layer at the end of the network, you have to
- 02:22Flatten or to German flatten.
- 02:26We will each be briefly on the different types of layers.
- 02:31Convolutional Layer use kernels,
- 02:33different sizes to relevant patterns for prediction.
- 02:40As mentioned briefly, we have of course not just a so-called channel,
- 02:43It could be multiple.
- 02:45These can also be used,
- 02:47to achieve a common result.
- 02:51iterate convolutional layers
- 02:54in a certain order over the image.
- 02:56And only the result of the kernel calculations is passed to the next layer.
- 03:02Pooling layers are used for
- 03:04reduce complexity and reduce complexity pass on data to the following levels.
- 03:11An example of a Pooling function is the max function.
- 03:14That means we only take the maximum value of an image part
- 03:19and pass it to the next layer.
- 03:23Before taking the results in a Fully Connected Layer,
- 03:27The results are flattened.
- 03:29So we don't two-dimensional images or matrices,
- 03:35because they can do Fully Connected Layer do not process.
- 03:39Fully connected layers are also classic often part of other neural networks.
- 03:44In this layer, each node is connected to each Nodes connected in the previous level.
- 03:52At the end of the course we still have an output layer, for example in three
- 03:57different classes, dog, cat and mouse.
- 04:02Even if the subject is not really fits into the rubric "Basics",
- 04:06so we wanted to briefly.
- 04:10Under an Adversarial Attack, too German enemy Attack, understood in the context of machine learning
- 04:16the use of Adversarial Examples, examples hostile to German,
- 04:21for manipulating classification results.
- 04:25An Adversarial Example is a specially manipulated input signal
- 04:29a neural network, which deliberately misclassifications.
- 04:36These types of attacks are not to Computer Vision.
- 04:39But here, the examples are very illustrative.
- 04:43In the left example, it is on the one hand, by means of a fully sprayed stop sign,
- 04:49that stop signs no longer as such.
- 04:52In this case the sign was called 50s Shield detected. The right stop sign became conscious
- 04:59with four small adhesives which had the same effect.
- 05:04The adhesives were deliberately applied at these locations because the people knew which parts
- 05:08of the image, the model is particularly respected.
- 05:12On the right is a glued to see glasses with which you can almost
- 05:16facial recognition system. man is then no longer perceived as a person.
- 05:23Students have the same of another university.
- 05:26For example, if you apply the following image: so you won't be using the Computerv Vision model
- 05:31as a person.
- 05:34After this short excursion to the topic Adversarial Attacks here a short note.
- 05:41If you are more interested in the details, there is a special openHPI course.
- 05:47Here is the topic of practical introduction to Deep Learning for Computer Vision.
- 05:53Since this course mainly focuses on Computer vision,
- 05:56of course, topics will be discussed significantly deeper.
- 06:00After this short introduction in the topic Computer Vision,
- 06:03Will we be in the next unit with the practical project.
- 06:08This is about recognition sign language in pictures.
- 06:11In doing so, we will present the Convolutional Neural Network.
To enable the transcript, please select a language in the video player settings menu.
About this video
- openHPI Kurs Praktische Einführung in Deep Learning für Computer Vision von Benedikt Schenkel, Leonard Petter, Hendrik Patzlaff, Georg Lange und Roman Dahm