Upgrade to Pro — share decks privately, control downloads, hide ads and more …

VSS 2018

Avatar for Jordan Suchow Jordan Suchow
September 04, 2018

VSS 2018

Hm...

Avatar for Jordan Suchow

Jordan Suchow

September 04, 2018
Tweet

Other Decks in Science

Transcript

  1. 1 A learned generative model of faces for experiments on

    human identity jordan suchow, josh peterson, & tom griffiths
  2. Goal: Create a universal (and usable) generative model of human

    identity and appearance. Applications in: - Psychology & neuroscience - Computer vision & technology - Art & design
  3. A. The so-called “face space” and B. The renderer and

    C. The training data learned generative models of identity & appearance
  4. Photorealistic images Not uncanny High resolution Quick to render Existing

    in a low-dimensional, smooth face space Diverse, representative…universal? desiderata
  5. 1. Find the perfect image set. 2. Train a model

    w/ an architecture well suited to human identity. 3. Explore model’s latent face space & generated images. 4. Test suitability with challenging experimental paradigms. plan of attack
  6. 1. Find the perfect image set. 2. Train a model

    w/ an architecture well suited to human identity. 3. Explore model’s latent face space & generated images. 4. Test suitability with challenging experimental paradigms. plan of attack
  7. 1. Find the perfect image set. 2. Train a model

    w/ an architecture well suited to human identity. 3. Explore model’s latent face space & generated images. 4. Test suitability with challenging experimental paradigms. plan of attack
  8. 1. Find the perfect image set. 2. Train a model

    w/ an architecture well suited to human identity. 3. Explore model’s latent face space & generated images. 4. Test suitability with challenging experimental paradigms. plan of attack
  9. 1. Find the perfect image set. 2. Train a model

    w/ an architecture well suited to human identity. 3. Explore model’s latent face space & generated images. 4. Test suitability with challenging experimental paradigms. plan of attack
  10. 1. Find the perfect image set. 2. Train a model

    w/ an architecture well suited to human identity. 3. Explore model’s latent face space & generated images. 4. Test suitability with challenging experimental paradigms. plan of attack
  11. held constant Photographer Camera model Lens model Lens focal length

    Focal point Aperture Exposure time Distance to subject Camera placement Light design Facial expression Pose Background texture Ambient lighting Level of comfort / arousal Image resolution Digital format Color grading White balance Gamma correction Compression level & quality Watermarking (i.e., none) Digital alteration & touchups
  12. varies Age Skin tone Place of origin Gender identity Hair

    style Profession Economic status Disability Injury & illness Body modification & cosmetic surgery Makeup Hair dying Tattooing
  13. 1. Find the perfect image set. 2. Train a model

    w/ an architecture well suited to human identity. 3. Explore model’s latent face space & generated images. 4. Test suitability with challenging experimental paradigms. plan of attack
  14. 1. Find the perfect image set. 2. Train a model

    w/ an architecture well suited to human identity. 3. Explore model’s latent face space & generated images. 4. Test suitability with challenging experimental paradigms. plan of attack
  15. 1. Find the perfect image set. 2. Train a model

    w/ an architecture well suited to human identity. 3. Explore model’s latent face space & generated images. 4. Test suitability with challenging experimental paradigms. plan of attack
  16. generative model of identity - Probability distribution over images -

    Deep neural networks as function approximators - Many different network architectures
  17. 1. Find the perfect image set. 2. Train a model

    w/ an architecture well suited to human identity. 3. Explore model’s latent face space & generated images. 4. Test suitability with challenging experimental paradigms. plan of attack
  18. 1. Find the perfect image set. 2. Train a model

    w/ an architecture well suited to human identity. 3. Explore model’s latent face space & generated images. 4. Test suitability with challenging experimental paradigms. plan of attack
  19. 1. Find the perfect image set. 2. Train a model

    w/ an architecture well suited to human identity. 3. Explore model’s latent face space & generated images. 4. Test suitability with challenging experimental paradigms. plan of attack
  20. 1. Find the perfect image set. 2. Train a model

    w/ an architecture well suited to human identity. 3. Explore model’s latent face space & generated images. 4. Test suitability with challenging experimental paradigms. plan of attack
  21. 1. Find the perfect image set. 2. Train a model

    w/ an architecture well suited to human identity. 3. Explore model’s latent face space & generated images. 4. Test suitability with challenging experimental paradigms. plan of attack
  22. 1 2 3 4 5 6 7 8 9 10

    Round Seed Samples “A five-year-old girl with long blonde hair” “A forty-year- woman with sho ⋮
  23. 1. Find the perfect image set. 2. Train a model

    w/ an architecture well suited to human identity. 3. Explore model’s latent face space & generated images. 4. Test suitability with challenging experimental paradigms. plan of attack
  24. 1. Find the perfect image set. 2. Train a model

    w/ an architecture well suited to human identity. 3. Explore model’s latent face space & generated images. 4. Test suitability with challenging experimental paradigms. plan of attack
  25. A. The so-called “face space”: isotropic Gaussian and B. The

    renderer: variational autoencoder’s decoder and C. The training data: Humanæ conclusion