IEICE TRANS. FUNDAMENTALS, VOL.E95–A, NO.12 DECEMBER 2012

2470

PAPER

Image Recovery by Decomposition with Component-Wise Regularization Shunsuke ONO†a) , Student Member, Takamichi MIYATA† , Member, Isao YAMADA† , and Katsunori YAMAOKA† , Senior Members

SUMMARY Solving image recovery problems requires the use of some efficient regularizations based on a priori information with respect to the unknown original image. Naturally, we can assume that an image is modeled as the sum of smooth, edge, and texture components. To obtain a high quality recovered image, appropriate regularizations for each individual component are required. In this paper, we propose a novel image recovery technique which performs decomposition and recovery simultaneously. We formulate image recovery as a nonsmooth convex optimization problem and design an iterative scheme based on the alternating direction method of multipliers (ADMM) for approximating its global minimizer efficiently. Experimental results reveal that the proposed image recovery technique outperforms a state-of-the-art method. key words: image recovery, decomposition, regularization, sparsity, convex optimization, alternating direction method of multipliers (ADMM)

1.

m

(−∞, ∞], each of which the proximity operator (explained in Sect. 2) is available with reasonably low computational cost. Then the optimization problem is as follows: min

Many image recovery problems can be posed as the inversion of the linear system (1)

where uorg ∈ RN is the unknown original image with N(= nh × nw ) pixels, v ∈ R M(≤N) is a known degraded observation, η ∈ R M is an unknown additive noise term (e.g. white Gaussian noise), and Φ : RN → R M is a known linear degradation operator. Because of the existence of small singular values of Φ and/or the existence of an additive noise, this inverse problem cannot be solved satisfactorily by a standard leastsquares approach (for example by the pseudo-inverse of Φ). To obtain a better approximation of uorg , the so-called regularization is employed in many optimization scenarios by introducing penalty terms. The regularization utilizes a prior knowledge relevant to the unknown original signal. In the last decade, regularization approaches focusing on the sparsity of signals have gained considerable attention within convex optimization frameworks [12]–[14], [23]. Particularly in the field of image recovery, regularization approaches based on the total variation (TV) semi-norm and 1 norm of certain frame coefficients have been widely considered as powerful choices. These approaches restore an image by solving convex optimization problems, and Manuscript received May 2, 2012. The authors are with the Tokyo Institute of Technology, Tokyo, 152-8552 Japan. a) E-mail: [email protected] DOI: 10.1587/transfun.E95.A.2470 †

N Problem m1.1: Let u1 , . . . , um ∈ R be components which satisfy k=1 uk = u (u denotes a recovered image), and F1 , . . . , F p be proper lower semicontinuous convex functions (see Appendix A) from  RN × . . . × RN =: U to

(u1 ,...,um )∈U

Introduction

v = Φuorg + η,

most of them can be dealt with the following problem formulation.

p 

Fk (u1 , . . . , um ).

(2)

k=1

In the case of m = 1 (i.e., u1 = u) and p = 2, the problem (2) is a general formulation of standard regularization approaches which employ one regularization function and one fidelity control function. This type of formulation is found, for example, in [1], [3], and [26]. In the case of m = 1 and p ≥ 3, the problem (2) utilizes multiple regularization functions. Many image recovery techniques use this type of formulation [2], [16], [21], [22], [24], [25]. In the case of m ≥ 2 and p ≥ 3, the problem (2) applies multiple regularization functions individually to each component u1 , . . . , um . In [7], geometry and texture components are restored from a degraded observation (i.e., m = 2). Similar decomposition has been studied in [4], [12], and [28]. Intuitively, it is very natural to assume that an image consists of the sum of the following three conflicting components: smooth, edge, and texture components. These components are characterized by the following properties: • Smooth component consists of almost flat areas with similar values or smooth gradation. • Edge component consists of lines and contours that possess strong directionalities. • Texture component consists of repetitive patterns with local fluctuation. For brevity, we refer to these three as SET (Smooth, Edge, and Texture) components. Under the assumption above, in this paper, we propose an image recovery technique called “decomposed SET (DSET) recovery” with a novel use of multiple regularization functions. First, we introduce an optimization problem in

c 2012 The Institute of Electronics, Information and Communication Engineers Copyright 

ONO et al.: IMAGE RECOVERY BY DECOMPOSITION WITH COMPONENT-WISE REGULARIZATION

2471

the form of (2) associated with multiple regularization functions which take the property of SET components into consideration (i.e., m = 3). Then, we reformulate the optimization problem into a standard form suitable for a convex optimization algorithm called the alternating direction method of multipliers (ADMM) [15]. Finally, the proposed ADMM-based iterative scheme which efficiently approximates the solution of the optimization problem is presented. Hence, the proposed method is expected to achieve an effective image recovery with simultaneous reconstruction of conflicting components. This paper is organized as follows. Section 2 presents basic mathematical tools utilized in our proposed method. Then, we propose D-SET recovery in Sect. 3. In Sect. 4, the efficacy of D-SET recovery is demonstrated through some numerical experiments. Finally, in Sect. 5, we conclude the paper with some remarks.

(∇2 x)i, j

⎧ ⎪ ⎪ ⎨ xi, j+1 − xi, j =⎪ ⎪ ⎩ xi,1 − xi, j

if j < nw , if j = nw .

(6)

In this case, the operation (3) is equal to the computation of the minimization of the well-known TV-based regularization called the ROF model [27]. First, Chambolle [10] proposed an iterative scheme for the computation of the minimizer of the ROF model which is subsequently known as the projected gradient method. Its accelerated version is found in [5] and [33]. Indeed, if (TVl (y, γ))∞ l=0 denotes the sequence of the projected gradient method for approximating the minimizer in (3), we have proxγh (y) = lim TVl (y, γ).

(7)

l→∞

Example 2.2: Define h : RN → [0, ∞) by  |xi |. h : x := (x0 , . . . , xN−1 )t → x 1 :=

(8)

i

2.

Preliminaries

2.1 Proximity Operator In this paper, we use the notion of proximity operator which was introduced originally by Moreau in 1962 [20]. For elementary terminologies in convex analysis, see Appendix A. Definition 2.1 (Proximity operator): Let Γ0 (RN ) be the class of proper lower semicontinuous convex functions on RN . The proximity operator of index γ ∈ (0, ∞) of h ∈ Γ0 (RN ) is defined by 

proxγh

1 2 : R → R : y → argmin h(x)+ y−x 2 , 2γ x∈RN (3) N

N

where the existence and uniqueness of the minimizer are guaranteed respectively by the coercivity and strict convex1 y − · 22 . ity of h(·) + 2γ Here, · 2 denotes the 2 Euclidean norm. The proximity operator has been widely employed in image and signal processing [14], [31]. The computational complexity of the proximity operator depends on the function h. We introduce some examples of h as follows that will be used in our method. Example 2.1: Define h : Rnh ×nw (=N) → [0, ∞) by 

h : x(:= [xi, j ]) → x T V := |(∇1 x)i, j |2+|(∇2 x)i, j |2 , i, j

(4) where · T V denotes the total variation (TV) semi-norm, ∇1 , ∇2 ∈ RN×N are the discrete horizontal and vertical gradient operators defined as follows: ⎧ ⎪ ⎪ ⎨ xi+1, j − xi, j , if i < nh , (∇1 x)i, j = ⎪ (5) ⎪ ⎩ x1, j − xi, j , if i = nh ,

In this case, the proximity operator is simply given by the soft thresholding [18], i.e., for i = 0,. . . , N − 1, ⎧ ⎪ y − γ, if yi > γ, ⎪ ⎪ ⎪ i ⎨ [proxγh (y)]i = [ST(y, γ)]i = ⎪ yi + γ, if yi < −γ, (9) ⎪ ⎪ ⎪ ⎩0, if |yi | ≤ γ. Example 2.3: For a given nonempty closed convex set C ⊂ RN , define the indicator function ιC : RN → [0, ∞] by ⎧ ⎪ ⎪ ⎨0, if y ∈ C, ιC (y) = ⎪ (10) ⎪ ⎩∞, otherwise. The proximity operator of ιC is given by the metric projection onto C, i.e., proxγιC (y) = PC (y) := argmin y − x 2 .

(11)

x∈C

2.2 Alternating Direction Method of Multipliers (ADMM) Problem 2.1: Suppose G ∈ RNz ×Ny has full-column rank and let f ∈ Γ0 (RNy ) and g ∈ Γ0 (RNz ). The problem is to find (y , z ) ∈

argmin (y,z)∈RNy ×RNz

f (y) + g(z) s.t. z = Gy. (12)

ADMM [15], as shown in Algorithm 2.1, is an iterative scheme which approximates a solution of problem (12). Variants of ADMM are proposed in [32]. Remark 2.1: The proof of the objective convergence limk→∞ f (y(k) ) + g(z(k) ) = f (y ) + g(z ) and residual convergence limk→∞ z(k) − Gy(k) 2 = 0 of ADMM are found in Sect. 3.2 of [6]. 2.3 Discrete Curvelet Transform (DCvT) and ShiftInvariant Redundant Discrete Cosine Transform (RDCT) The curvelet transform [8] provides an essentially optimal

IEICE TRANS. FUNDAMENTALS, VOL.E95–A, NO.12 DECEMBER 2012

2472

Algorithm 2.1 (ADMM) 1: Set k = 0, choose z(0) and b(0) . 2: while a stop criterion is not satisfied do   1 3: y(k+1) = argmin f (y) + 2γ z(k) − Gy − b(k) 22 y∈RNy   1 (k+1) 4: z = argmin g(z) + 2γ z − Gy(k+1) − b(k) 22 z∈RNz

5: 6: 7:

b(k+1) = b(k) + Gy(k+1) − z(k+1) k ←k+1 end while

inally designed for the sparse representation of both edge and texture. On the other hand, if we only consider texture, a block-wise transform like RDCT is expected to easily pick up its associated local features. RDCT is used in the superresolution decoding of JPEG image in [17]. 3.

Proposed Method

3.1 Proposed Image Recovery Model Consider the decomposition of a recovered image u as

representation of a certain 2-D function (a continuous image) which is said to be of class C 2 except for discontinuities along piecewise C 2 curves. In other words, if we denote f M as the approximation of f which is reconstructed by M largest curvelet coefficients of f , the approximation error f − f M 2 is lower than cM −2 (log2 M)3 (c denotes a certain constant). This error rate is much improved compared to that of the wavelet transform O(M −1 ). For the numerical implementation in this paper, we use the discrete curvelet transform (DCvT) [9] with source-code (CurveLab package [34]) which was proposed as the discrete approximation of the original curvelet transform [8]. If we denote Ψc ∈ RNc ×N (Nc is the number of curvelet coefficients) as the DCvT matrix, it satisfies Ψtc Ψc = IN where Ψtc corresponds to the pseudo inverse DCvT (IN ∈ RN×N denotes the identity matrix). DCvT is expected to provide a sparse representation of the edge component because we assumed that the edge component only consists of directional lines and contours, and the other areas in which there is no edge are flat, i.e., the edge component has almost as same property as the function f which was characterized above. For its high level of edge awareness, DCvT is utilized for detecting retinal blood vessels in medical images [19]. The shift-invariant redundant discrete cosine transform (RDCT) is constructed from the orthogonal block discrete cosine transform (DCT). RDCT amounts to applying the orthogonal block DCT to the overlapped sub-blocks of an image u, where the size of each block is B × B and the number of blocks is nh × nw . Hence the number of RDCT coeffi2 cients becomes B2 N. The RDCT matrix Ψr ∈ RB N×N can be defined as ⎤ ⎡ −1 ⎢⎢⎢ B D1,1 ⎥⎥⎥ ⎥⎥⎥ ⎢⎢⎢ .. ⎥⎥⎥ , Ψr = ⎢⎢⎢ (13) . ⎥⎦ ⎢⎣ −1 B Dnh ,nw where Di, j ∈ RB ×N comprises the bases of the DCT transform matrix corresponding to the (i,j)-th block and the other entries are zero. The pseudo inverse RDCT transform is equal to Ψtr which satisfies Ψtr Ψr = IN . RDCT is expected to represent the local repetitive patterns of texture more sparsely compared to the so-called scale-shift transforms (e.g. the shift-invariant discrete wavelet transform) which have been used for sparse texture representation (e.g. [24]). One of the reasons is that scale-shift transforms are orig-

u = u1 + u2 + u3 ,

(14)

where u1 , u2 , u3 are the restored components by our method. We call them pseudo SET components. Let X = RN × RN × RN be a real Hilbert space where the inner product ·, ·X : X × X → R and its induced norm · X are defined as

(x1 , x2 , x3 ), (y1 , y2 , y3 )X := xt1 y1 + xt2 y2 + xt3 y3 , (15)  (16) (x1 , x2 , x3 ) X := (x1 , x2 , x3 ), (x1 , x2 , x3 )X , for (x1 , x2 , x3 ), (y1 , y2 , y3 ) ∈ X respectively. In the framework (2), we propose the following nonsmooth convex optimization problem. Problem 3.1 (D-SET optimization problem): min

(u1 ,u2 ,u3 )∈X

F(u1 , u2 , u3 ) = F1 (u1 ) + F2 (Ψc u2 ) + F3 (Ψr u3 ) +F4 (u1 + u2 + u3 ) + F5 (Φ(u1 + u2 + u3 )),(17)

where F1 : x → w1 x T V , F2 : x → w2 x 1 , F3 : x → w3 x 1 , F4 : x → ιC (x), F5 : x → ιS ε,v (x). Remark 3.1 (Roles of the functions in Problem 3.1): F1 : suppressing this regularization function is expected to approximate the smooth component because the TV semi-norm of smooth component becomes small. F2 : suppressing this regularization function is expected to pick up the edge component because DCvT presents the sparse representation of lines and contours. F3 : suppressing this regularization function is expected to decompose the texture component from an image because RDCT presents the sparse representation of the locally repetitive patterns of texture. F4 : this is the constraint on the numerical range of pixels represented by the following nonempty closed convex set

2

C = {x ∈ RN | xi ∈ [0, 255] for i = 1, . . . , N}. (18) F5 : this is the fidelity constraint with respect to v represented by the following nonempty closed convex set S ε,v = {x ∈ R M | x − v 2 ≤ ε}, where ε is determined by the power of noise.

(19)

ONO et al.: IMAGE RECOVERY BY DECOMPOSITION WITH COMPONENT-WISE REGULARIZATION

2473

The functions F4 and F5 constantly take 0 as long as u ∈ C and Φu ∈ S ε,v , otherwise they take ∞. As a consequence, by minimizing F in (17), the SET components are expected to be restored simultaneously. Proposition 3.1: There exists (u1 , u2 , u3 ) ∈ X which achieves F(u1 , u2 , u3 ) ≤ F(u1 , u2 , u3 ) (∀(u1 , u2 , u3 ) ∈ X). The proof of Proposition 3.1 is given in Appendix B. 3.2 Reformulation of the D-SET Optimization Problem into an ADMM Applicable Form In this section, we demonstrate that Problem 3.1 (D-SET optimization problem) can be reformulated into a special case of Problem 2.1. Let z1 = u1 ∈ RN , z2 = Ψc u2 ∈ RNc , 2 z3 = Ψr u3 ∈ RB N , z4 = u1 + u2 + u3 ∈ RN , z5 = Φ(u1 + u2 + u3 ) ∈ R M , and set y = [ut1 ut2 ut3 ]t ∈ R3N , 2 z = [zt1 . . . zt5 ]t ∈ R2N+Nc +B N+M , ⎡ ⎢⎢⎢IN ⎢⎢⎢⎢ O ⎢ G = ⎢⎢⎢⎢⎢ O ⎢⎢⎢I ⎢⎣ N Φ

O Ψc O IN Φ

⎤ O ⎥⎥ ⎥ O ⎥⎥⎥⎥ 2 ⎥ Ψr ⎥⎥⎥⎥ ∈ R(2N+Nc +B N+M)×3N . ⎥⎥⎥ IN ⎥⎥⎦ Φ

(20)

(k+1) = u(k+1) + b(k) = Ψc u(k+1) + b(k) where r(k+1) 1 1 1 , r2 2 2 , 3 (k+1) (k+1) (k) (k+1) (k+1) (k) = Ψr u3 + b3 , r4 = i=1 (ui ) + b4 , and r3  t t t r(k+1) = 3i=1 (Φu(k+1) ) + b(k) i 5 5 (note b = [b1 · · · b5 ] ). Evidently, (23) are decoupled with respect to z1 , . . . , z5 . Hence, it can be solved separately as   1 z(k+1) = argmin F j (z j ) + z j − r(k+1) 22 j j 2γ zj

= proxγF j (r(k+1) ) j

for j = 1, . . . , 5. Since g1 (z1 ) = w1 z1 T V , by (7), the proximity operator of F1 can be calculated as z(k+1) = proxγF1 (r(k+1) ) = lim TVl (r(k+1) , w1 γ). 1 1 1 l→∞

(y,z)∈R3N ×R2N+Nc +B2 N+M

s.t. z = Gy,

= proxγF2 (r(k+1) ) = ST(r(k+1) , w2 γ), z(k+1) 2 2 2

(26)

z(k+1) 3

(27)

=

proxγF3 (r(k+1) ) 3

=

ST(r(k+1) , w3 γ). 3

By (11), the proximity operators of F4 (z4 ) = ιC (z4 ) and F5 (z5 ) = ιS ε,v (z5 ) are simply the projections onto each set respectively, i.e., for l = 1, . . . , N, = proxγF4 (r(k+1) ) z(k+1) 4 4 = PC (r(k+1) ) ⎧ 4 (k+1) ⎪ ⎪ < 0, 0, if r4,l ⎪ ⎪ ⎪ ⎨ (k+1) (k+1) =⎪ r , if 0 ≤ r ≤ 255, ⎪ 4,l 4,l ⎪ ⎪ (k+1) ⎪ ⎩255, if r4,l > 255,

Problem 3.2 (ADMM-applicable form of Problem 3.1): f (y) + g(z)

(25)

Also by (9), the proximity operators of F2 (z2 ) = w2 z2 1 and F3 (z3 ) = w3 z3 1 can be exactly implemented as

Then, Problem 3.1 can be rewritten in the following form.

min

(24)

(21)

z(k+1) = proxγF5 (r(k+1) ) 5 5

5

where f : y → 0, g : z → j=1 F j (z j ) = w1 z1 T V + w2 z2 1 + w3 z3 1 + ιC (z4 ) + ιS ε,v (z5 ). Problem 3.2 is of the same form as (12) and G is obviously full column rank. Therefore, we can solve the D-SET optimization problem by applying ADMM (Algorithm 2.1) to Problem 3.2.

(28)

= PS ε,v (r(k+1) ) ⎧ (k+1)5 ⎪ ⎪ if r(k+1) − v 2 ≤ ε, ⎪ 5 ⎨r5 , (k+1) =⎪ r5 −v ⎪ ⎪ ⎩v + ε r(k+1) −v , otherwise. 5

(29)

2

3.3 Iterative Scheme for the D-SET Optimization Problem

Finally, we obtain an ADMM-based iterative scheme for solving the D-SET optimization problem as Algorithm 3.1.

Let us explain how to calculate each step of ADMM as applied to Problem 3.2. First, we consider Step 3. The fact that f (y) = 0 turns Step 3 of ADMM into

Remark 3.2 (Implementation of proxγF1 ): We approximate the proximity operator of F1 by the accelerated projected gradient method [5] with a finite number of iterations. Our experimental results show that Algorithm 3.1 works well even in the case.

y(k+1) = argmin y∈R3N

1 (k) z − Gy − b(k) 22 . 2γ

(22)

Since Gt G is positive-definite by definition of G, the minimizer of (22) exists uniquely. This minimizer is obtained by solving a system of linear equations (see Appendix C). Step 4 of ADMM can be rewritten as ⎡ (k+1) ⎤ ⎢⎢⎢z1 ⎥⎥⎥ 5    ⎢⎢⎢ . ⎥⎥⎥ 1 ⎢⎢⎢ . ⎥⎥⎥ = argmin 22 , (23) F j (z j ) + z j − r(k+1) j ⎢⎢⎣ . ⎥⎥⎦ 2γ z1 ,...,z5 j=1 z(k+1) 5

4.

Numerical Experiments

We demonstrate the efficacy of D-SET recovery by applying it to two image recovery problems and comparing its performance with a state-of-the-art image recovery method. 4.1 Method for Comparison We compare our method with the decomposed geometrytexture (D-GT) recovery proposed in [7]. The D-GT recovery model is posed as the following optimization problem:

IEICE TRANS. FUNDAMENTALS, VOL.E95–A, NO.12 DECEMBER 2012

2474

Algorithm 3.1 (Iterative scheme for the D-SET optimization problem) 1: Set k = 0 and choose w1 , w2 , w3 , γ. 2: for j = 1 to 5 do 3: z(0) j =0 4: 5: 6: 7:

b(0) j =0 end for while a stop criterion is not satisfied do 1 y(k+1) = argmin 2γ z(k) − Gy − b(k) 22 y∈R3N

8: 9: 10: 11: 12: 13:

for j = 1 to 5 do z(k+1) = proxγF j (r(k+1) ) (see, (23) - (29)) j j end for b(k+1) = b(k) + Gy(k+1) − z(k+1) k ←k+1 end while

min

(ug ,ut )∈RN ×RN

wg ug T V + w s Ψ s ut 1 + ιC (ug + ut ) +ιEδ (ug + ut ) + ιS ε,v (Φ(ug + ut )),

(30)

where ug ∈ RN and ut ∈ RN are the geometry and texture components, respectively. The matrix Ψ s ∈ RN×2N is the dual-tree symlet transform matrix with length 6 applied over 3 resolution levels, and ιEδ is the indicator function of the nonempty closed convex set Eδ defined as Eδ = {x ∈ RN | Px 22 ≤ δ},

(31)

where P ∈ CN×N is the discrete Fourier transform matrix. The two components ug and ut satisfy ug + ut = u. Hence the D-GT optimization problem (30) is a special case of (2) for m = 2. Additionally, to verify the advantage of SET decomposition, we design the non-decomposed SET (ND-SET) recovery for comparison. The optimization problem associated with ND-SET recovery is formulated as min F1 (u)+F2 (Ψc u)+F3 (Ψr u)+F4 (u)+F5 (Φu). (32)

u∈RN

The ND-SET optimization problem applies the same functions employed in the D-SET optimization problem to an image u without any decomposition. Thus, the ND-SET optimization problem can be categorized as an m = 1 case of (2). 4.2 Experimental Setting We use eight standard images (256 × 256 = 65,536 [pixels]) shown in Fig. 1. We employ DCvT with 4 scales and 16 angles as Ψc and RDCT with an 8 × 8 block as Ψr . The weights of each regularization function w1 , w 2 , w3 are changed from 0.1 to 0.8 by 0.1 steps, satisfying 3i=1 wi = 1, and selected to maximize PSNR or SSIM, respectively. SSIM is an image quality assessment measure based on the degradation of structural information, and it is known that SSIM is more close to human visual estimation than PSNR.

For complete information about SSIM, see [29]. The iteration number of Algorithm 3.1 is fixed to 100. The approximation of the proximity operator of F1 is implemented by the accelerated projected gradient method [5] with 20 iterations. We obtain the value of ε for S ε,v by using the original image uorg , i.e., ε = Φuorg − v 2 . The parameter γ is set to 0.1. The parameters of the methods to be compared are selected in the same way. In the first experiment we apply our method to image deblurring. Test images are blurred with a 5×5 uniform blur kernel and contaminated by additive white Gaussian noise with a standard deviation σ = 0.1275 (the range of pixel values is from 0 to 255). The blurring process is represented by a circulant convolution matrix, i.e., Φ = P∗ HP ∈ RN×N ((·)∗ denotes the complex conjugate transpose of ·) where H ∈ RN×N is a diagonal matrix determined by a blur kernel. In the second experiment, we address image recovery from incomplete measurements. In this problem, Φ ∈ R M×N is a measurement matrix, and v ∈ R M represents incomplete measurements. We employ the noiselet measurement matrix Φ with 50% measurement (M = 0.5N) without any noise (thus, ε = 0). This problem setting can be found in some recent studies of image compression, for example, [26] and [30]. The noiselet measurement matrix Φ is represented as Φ = RΨn where R ∈ R M×N is a “row selector” matrix that comprised a subset of the rows of the identity matrix, and Ψn ∈ RN×N is the noiselet transform matrix [11] which satisfies Ψtn Ψn = Ψn Ψtn = IN . 4.3 Results and Discussion Tables 1, 2 present the comparison of PSNR [dB] and SSIM in all the experiments. For all the test images and all the experiments, the resulting images of D-SET recovery achieved the highest PSNR and SSIM. The results of the first experiment (deblurring problem) on the test image ‘Mandrill’ are shown in Fig. 2. Figure 2(b) shows the blurred and noise-added image v (input). Figure 2(c) is the recovered image by using D-SET recovery. Sharp edges and detailed textures are seen to be well recovered. Figures 2(d)–(f) show the pseudo SET components. It is clear that all the components are well reconstructed. However, we also remark that the pseudo SET components do not always match standard intuition perfectly due to the dependency between edge and texture, for example, in what appears in the body hair of ‘Mandrill’. The results from the second experiment (incomplete measurement recovery problem) on the test image ‘Lena’ are shown in Fig. 3. Figure 3(b) shows the reconstructed image Φ† v with the Moore-Penrose pseudo inverse of Φ. In this case, unlike the deblurring case shown in Fig. 2, it is difficult to visualize the input v because v is randomly sampled noiselet coefficients and is meaningless to human eyes. Serious artifacts occur in Φ† v due to the singularity of the measurement matrix Φ. On the other hand, Fig. 3(c), which is the restored image by using D-SET recovery, well approximates the original image in terms of the perceptual quality.

ONO et al.: IMAGE RECOVERY BY DECOMPOSITION WITH COMPONENT-WISE REGULARIZATION

2475 Table 1

D-GT recovery [7] ND-SET recovery D-SET recovery (proposed)

PSNR SSIM PSNR SSIM PSNR SSIM

Table 2

D-GT recovery [7] ND-SET recovery D-SET recovery (proposed)

(a) ‘Barbara’

(b) ‘Bridge’

Comparison of PSNR [dB] and SSIM in image deblurring. Barbara 29.54 0.9053 27.09 0.8424 32.00 0.9423

Building 32.56 0.9323 30.20 0.8826 35.30 0.9651

Cameraman 30.32 0.9128 32.56 0.8989 33.62 0.9473

Lena 32.16 0.9277 31.22 0.9171 34.68 0.9552

Lighthouse 28.29 0.9024 26.51 0.8405 31.02 0.9473

Mandrill 28.27 0.8500 26.11 0.7270 29.63 0.8877

Woman 32.06 0.9140 30.78 0.8910 34.38 0.9517

Mandrill 28.07 0.8060 28.52 0.8210 28.67 0.8213

Woman 35.48 0.9140 36.21 0.9461 36.56 0.9478

Comparison of PSNR [dB] and SSIM in incomplete measurement recovery.

PSNR SSIM PSNR SSIM PSNR SSIM

Barbara 29.38 0.8669 31.92 0.9241 33.95 0.9418

(c) ‘Building’ Fig. 1

Fig. 2

Bridge 26.64 0.8524 24.44 0.7288 27.90 0.8966

Bridge 25.88 0.8005 25.78 0.7999 26.06 0.8041

Building 32.26 0.9162 32.72 0.9266 33.07 0.9312

(d) ‘Cameraman’

Cameraman 36.66 0.9416 35.64 0.9304 37.05 0.9470

(e) ‘Lena’

Lena 36.93 0.9530 37.44 0.9572 38.01 0.9615

Lighthouse 31.19 0.8813 30.45 0.8748 31.60 0.8958

(f) ‘Lighthouse’

(g) ‘Mandrill’

(h) ‘Woman’

8 test images used in the numerical experiments.

Deblurring on the test image ‘Mandrill’.

Fig. 3

Incomplete measurement recovery on the test image ‘Lena’.

IEICE TRANS. FUNDAMENTALS, VOL.E95–A, NO.12 DECEMBER 2012

2476

future work. Acknowledgement We are grateful to Wemer Wee for his fruitful comments on this paper. This work was partially supported by Grant-inAid for JSPS Fellows (24.2522). References Fig. 4 Evolution of the objective function value of the D-SET optimization problem on incomplete measurement recovery using the test image ‘Lena’. Table 3

Comparison of CPU time [sec] with 100 iterations.

Deblurring Incomplete measurement recovery

D-GT 58 58

ND-SET 220 222

D-SET 220 222

Additionally, the pseudo SET components (Figs. 3(d)–(f)) are restored as well as shown in Figs. 1(d)–(f). Figure 4 plots the evolution of the objective function value of the D-SET optimization problem (17) applied to the incomplete measurement recovery problem. We confirm that the function value converges. This fact verifies that Algorithm 3.1 works appropriately in practical use. We also discuss the computational cost of D-SET recovery. All of the experiments were performed using MATLAB on a Windows 7 desktop computer equipped with Intel Core i7 2.8-GHz processor and 8 GB of RAM. Table 3 lists the CPU times of each method on both of the experiments with 100 iterations (for only the test image ‘Lena’). As indicated in the table, the CPU times of D-SET (and NDSET) recovery are about four times longer than that of D-GT recovery. This is because, by the current implementation scheme, the RDCT process requires much higher computational cost than the other processes. However, the RDCT process for each block can be easily parallelized across multiple GPUs and CPU-cores. Moreover, Step 11–13 (the calculation of the proximity operator of each function) of Algorithm 3.1 also can be parallelized. Therefore, the computational cost of the proposed method is expected to be reduced significantly by employing such parallel implementations. 5.

Conclusion

We have proposed a novel image recovery technique utilizing component-wise regularization. We formulated our image recovery model as a nonsmooth convex optimization problem. This optimization problem was designed to restore the three conflicting components called SET components which comprise an image. The proposed iterative scheme based on ADMM was presented for solving the optimization problem through variable splitting and reformulation. The extensive experiments showed that our proposed recovery technique works well for various image recovery problems compared to a state-of-the-art method. The acceleration of the proposed method by using parallel implementation is our

[1] M. Afonso, J. Bioucas-Dias, and M. Figueiredo, “Fast image recovery using variable splitting and constrained optimization,” IEEE Trans. Image Process., vol.19, no.9, pp.2345–2356, 2010. [2] M. Afonso, J. Bioucas-Dias, and M. Figueiredo, “An augmented Lagrangian approach to linear inverse problems with compound regularization,” Proc. IEEE ICIP, Hong Kong, 2010. [3] M. Afonso, J. Bioucas-Dias, and M. Figueiredo, “An augmented lagrangian approach to the constrained optimization formulation of imaging inverse problems,” IEEE Trans. Image Process., vol.20, no.3, pp.681–695, 2011. [4] J. Aujol, G. Gilboa, T. Chan, and S. Osher, “Structure-texture image decomposition — Modeling, algorithms, and parameter selection,” I.J. Computer Vision, vol.67, pp.111–136, 2006. [5] A. Beck and M. Teboulle, “Fast gradient-based algorithms for constrained total variation image denoising and deblurring problems,” IEEE Trans. Image Process., vol.18, no.11, pp.2419–2434, 2009. [6] S. Boyd, N. Parikh, E. Chu, B. Peleato, and J. Eckstein, “Distributed optimization and statistical learning via the alternating directino method of multipliers,” Foundations and Trends in Machine Learning, vol.3, pp.1–122, 2011. [7] L.M. Briceno-Arias, P.L. Combettes, J.-C. Pesquet, and N. Pustelnik, “Proximal algorithms for multicomponent image recovery problems,” J. Math. Imaging and Vision, vol.41, no.1, pp.3–22, 2011. [8] E.J. Cand`es and D.L. Donoho, “New tight frames of curvelets and optimal representations of objects with piecewise singularities,” Commun. on Pure and Applied Math., vol.57, pp.219–266, 2004. [9] E.J. Cand`es, L. Demanet, D.L. Donoho, and L. Ying, “Fast discrete curvelet transforms,” SIAM J. Multiscale Modeling & Sim., vol.5, no.3, pp.861–899, 2006. [10] A. Chambolle, “An algorithm for total variation minimization and applications,” J. Math. Imaging and Vision, vol.20, pp.89–97, 2004. [11] R. Coifman, F. Geshwind, and Y. Meyer, “Noiselets,” Applied and Computational Harmonic Analysis, vol.10, pp.27–44, 2001. [12] P.L. Combettes and V. Wajs, “Signal recovery by proximal forwardbackward splitting,” SIAM J. Multiscale Modeling & Sim., vol.4, pp.1168–1200, 2005. [13] P.L. Combettes and J.-C. Pesquet, “A Douglas-Rachford splitting approach to nonsmooth convex variational signal recovery,” IEEE J. Sel. Top. Signal Process., vol.1, no.4, pp.564–574, 2007. [14] P.L. Combettes and J.-C. Pesquet, “Proximal splitting methods in signal processing,” in Fixed-Point Algorithms for Inverse Problems in Science and Engineering, pp.185–212, Springer-Verlag, 2011. [15] D. Gabay and B. Mercier, “A dual algorithm for the solution of nonlinear variational problems via finite-element approximations,” Computers & Mathematics with App., vol.2, pp.17–40, 1976. [16] T. Goldstein and S. Osher, “The split Bregman method for l1 regularized problems,” SIAM J. Imaging Sci., vol.3, pp.323–343, 2009. [17] T. Komatsu, Y. Ueda, and T. Saito, “Super-resolution decoding of JPEG-compressed image data with the shrinkage in the redundant DCT domain,” Proc. PCS, Nagoya, 2010. [18] S. Mallat, A Wavelet Tour of Signal Processing, 2nd ed., Academic Press, 1999. [19] M.S. Miri and A. Mahloojifar, “Retinal image analysis using curvelet transform and multistructure elements morphology by reconstruction,” IEEE Trans. Biomed. Eng., vol.58, no.5, pp.1183–

ONO et al.: IMAGE RECOVERY BY DECOMPOSITION WITH COMPONENT-WISE REGULARIZATION

2477

1192, 2011. [20] J. Moreau, “Proximite et dualite dans un espace hilbertien,” Bulletin de la Societe Mathematique de France, vol.93, pp.273–299, 1965. [21] S. Ono, T. Miyata, and K. Yamaoka, “Total variation-waveletcurvelet regularized optimization for image restoration,” Proc. IEEE ICIP, Brussels, 2011. [22] S. Ono, T. Miyata, I. Yamada, and K. Yamaoka, “Missing region recovery by promoting blockwise low-rankness,” Proc. IEEE ICASSP, Kyoto, 2012. [23] S. Osher, Y. Mao, B. Dong, and W. Yin, “Fast linearized Bregman iteration for compressive sensing and sparse denoising,” Communications in Mathematical Sciences, vol.8, pp.93–111, 2010. [24] G. Plonka and J. Ma, “Curvelet-wavelet regularized split Bregman iteration for compressed sensing,” I.J. Wavelets, Multiresolution and Information Processing, vol.9, pp.79–110, 2011. [25] N. Pustelnik, C. Chaux, and J.-C. Pesquet, “Parallel proximal algorithm for image restoration using hybrid regularization,” IEEE Trans. Image Process., vol.20, no.9, pp.2450–2462, 2011. [26] J. Romberg, “Imaging via compressive sampling,” IEEE Signal Process. Mag., vol.25, no.2, pp.14–20, 2008. [27] L. Rudin, S. Osher, and E. Fatemi, “Nonlinear total variation based noise removal algorithms,” Physica D, vol.60, pp.259–268, 1992. [28] T. Saito and T. Komatsu, “Image-processing approach based on nonlinear image-decomposition,” IEICE Trans. Fundamentals, vol.E92A, no.3, pp.696–707, March 2009. [29] Z. Wang, A.C. Bovik, H.R. Sheikh, and E.P. Simoncelli, “Image quality assessment: from error visibility to structural similarity,” IEEE Trans. Image Process., vol.13, no.4, pp.600–612, 2004. [30] J. Wen, Z. Chen, Y. Han, J.D. Villasenor, and S. Yang “A compressive sensing image compression algorithm using quantized DCT and noiselet information,” Proc. IEEE ICASSP, Prague, 2010. [31] I. Yamada, M. Yukawa, and M. Yamagishi, “Minimizing the Moreau envelope of nonsmooth convex functions over the fixed point set of certain quasi-nonexpansive mappings,” in Fixed-Point Algorithms for Inverse Problems in Science and Engineering, eds. H.H. Bauschke, et al., pp.345–390, Springer-Verlag, 2011. [32] M. Yamagishi, S. Ono, and I. Yamada, “Two variants of alternating direction method of multipliers without inner iterations and their application to image super-resolution,” Proc. IEEE ICASSP, Kyoto, 2012. [33] M. Yamagishi and I. Yamada, “Overrelaxation of the fast iterative shrinkage-thresholding algorithm with variable stepsize,” IOP Science Inverse Problems, vol.27, 2011. [34] E.J. Cand`es, L. Demanet, D. Donoho, and L. Ying, “Curvelet.org,” http://www.curvelet.org/

called proper if dom( f ) := {x ∈ H | f (x) < ∞}  ∅.

(A· 2)

(c) (Lower semicontinuous function) A function f : H → (−∞, ∞] is called lower semicontinuous if the set lev≤α ( f ) := {x ∈ H | f (x) ≤ α} is closed for every α ∈ R (Note that if f is continuous over H, f is lower semicontinuous). The set of all proper lower semicontinuous convex functions is denoted by Γ0 (H). (d) (Coercivity) A function f ∈ Γ0 (H) is called coercive if x → ∞ ⇒ f (x) → ∞.

(A· 3)

In this case, the existence of a minimizer of f , i.e., {x ∈ H | f (x ) ≤ f (x) (∀x ∈ H)}  ∅

(A· 4)

is guaranteed. Appendix B: Proof of Proposition 3.1 Clearly, F is convex and lower semicontinuous on X. Moreover, F(u1 , u2 , u3 ) < ∞ for any (u1 , u2 , u3 ) ∈ X s.t. u1 + u2 + u3 = uorg . Therefore, F ∈ Γ0 (X). Now it is enough to show the function F is coercive (see Definition A. 1(d)). We prove the coercivity of F by contradiction. Suppose there exists a sequence (k) (k) (u(k) 1 , u2 , u3 ) ∈ X (k = 1, 2, 3 . . .) satisfying (k) (k) lim (u(k) 1 , u2 , u3 ) X → ∞,

(A· 5)

(k) (k) lim F(u(k) 1 , u2 , u3 )  ∞.

(A· 6)

k→∞ k→∞

In this case, there exists M > 0 which satisfies (k) (k) F(u(k) 1 , u2 , u3 ) ≤ M,

(∀p ∈ N, ∃k ≥ p)

(A· 7)

which ensures of existence of some subsequence (u1m(l) , u2m(l) , u3m(l) ) ∈ X (l = 1, 2, 3 . . .) satisfying m(l) F(u1m(l) , u2m(l) , u3m(l) ) = u1m(l) T V + Ψc um(l) 2 1 + Ψr u3 1

Appendix A: Elements of Convex Analysis

+ιC (u1m(l) + u2m(l) + u3m(l) )

We list minimum notations in convex analysis. Let H be a real Hilbert space equipped with an inner product ·, · and its induced norm · .

+ιS ε,v (Φ(u1m(l) + u2m(l) + u3m(l) )) ≤ M (∀l ∈ N).

Definition A. 1: (a) (Convex set) A set C ⊂ H is called convex if λx + (1 − λ)y ∈ C for every x, y ∈ C and every λ ∈ [0, 1]. If a set C ⊂ H is closed as well as convex, it is called closed convex. (b) (Proper convex function) A function f : H → (−∞, ∞] := R ∪ {∞} is called convex if for every x, y ∈ H and every λ ∈ (0, 1) f (λx + (1 − λ)y) ≤ λ f (x) + (1 − λ) f (y).

(A· 1)

In particular, a convex function f : H → (−∞, ∞] is

(A· 8)

By (A· 8), we have Ψc u2m(l) 1 ≤ M

(∀l ∈ N),

(A· 9)

Ψr u3m(l) 1 ≤ M ιC (u1m(l) + um(l) + 2

(∀l ∈ N),

(A· 10)

um(l) 3 )

≤M

(∀l ∈ N).

(A· 11)

Applying the equivalence of all norms in RN and Ψtc Ψc = Ψtr Ψr = IN to (A· 9) and (A· 10), we have for some μ2 , μ3 > 0, that u2m(l) 2 = Ψc u2m(l) 2 ≤ μ2 M

(∀l ∈ N),

(A· 12)

u3m(l) 2

(∀l ∈ N).

(A· 13)

=

Ψr um(l) 3 2

Moreover, by (A· 11)

≤ μ3 M

IEICE TRANS. FUNDAMENTALS, VOL.E95–A, NO.12 DECEMBER 2012

2478

u1m(l) + u2m(l) + u3m(l) ∈ C

(∀l ∈ N).

(A· 14)

Shunsuke Ono received the B.E. and M.E. degree from the Tokyo Institute of Technology in 2010 and 2012, respectively. He joined the Department of Communications and Integrated Systems at the Tokyo Institute of Technology in 2010 and is currently undertaking a Ph.D. course of Tokyo Institute of Technology. His research interests include image processing and optimization.

Boundedness of C and (A· 12)–(A· 14) guarantee the existence of μ1 > 0, s.t. u1m(l) 2 ≤ μ1 M

(∀l ∈ N).

(A· 15)

Finally, by (A· 12), (A· 13), and (A· 15), we have (u1m(l) , u2m(l) , u3m(l) ) X ≤

μ21 + μ22 + μ23 M

(∀l ∈ N), (A· 16)

Takamichi Miyata received the B.E. and M.E. degrees from the University of Toyama in 2001 and 2003, respectively, and Ph.D. degree from Tokyo Institute of Technology in 2006 and joined Dept. of Communications and Integrated Systems at Tokyo Institute of Technology as an assistant professor. Currently, he is an associate professor in the Department of Electrical, Electronics and Computer Engineering, Chiba Institute of Technology. His current research interests include image processing and image cod-



which contradicts (A· 5). Appendix C: Calculation of the Minimizer of (22) (22) is obviously equal to ⎡ (k+1) ⎤ ⎢⎢⎢u1 ⎥⎥⎥  ⎢⎢⎢ (k+1) ⎥⎥⎥ ⎢⎢⎢u ⎥⎥⎥ =argmin z(k) −u1 −b(k) 22+ z(k) −Ψc u2 −b(k) 22 1 1 2 2 ⎢⎢⎣ 2(k+1) ⎥⎥⎦ u1 ,u2 ,u3 u3

ing.

(k) 2 + z(k) 3 − Ψr u3 − b3 2 (k) 2 + z(k) 4 − (u1 + u2 + u3 ) − b4 2

 (k) 2 + z(k) − Φ(u + u + u ) − b 1 2 3 5 5 2 . (A· 17) The solution of (A· 17) is obtained by solving the system of the linear equations and we get u(k+1) = (4IN + 3Φt Φ)−1 r, 1 u(k+1) 2 u(k+1) 3

= =

uk+1 1 uk+1 1

− (z1 − b1 ) + − (z1 − b1 ) +

(A· 18) Ψtc (z2 Ψtr (z3

− b2 ),

(A· 19)

− b3 ),

(A· 20)

where r = (3IN + 2Φt Φ)(z1 − b1 ) − (IN + Φt Φ){Ψtc (z2 − b2 ) + Ψtr (z3 − b3 )} + (z4 − b4 ) + Φt (z5 − b5 ). (A· 21)

Isao Yamada is a Professor in the Department of Communications and Integrated Systems, Tokyo Institute of Technology. He received the B.E. degree in computer science from the University of Tsukuba in 1985 and the M.E. and Ph.D. degrees in electrical and electronic engineering from the Tokyo Institute of Technology in 1987 and 1990, respectively. His current research interests are in mathematical signal processing, nonlinear inverse problem and optimization theory. He received Excellent Paper Awards in 1991, 1995, 2006, 2009, the Young Researcher Award in 1992 and the Achievement Award in 2009 from the IEICE; the ICF Research Award from the International Communications Foundation in 2004; the Docomo Mobile Science Award (Fundamental Science Division) from Mobile Communication Fund in 2005; and the Fujino Prize from Tejima Foundation in 2008.

Katsunori Yamaoka received the B.E., M.E., and Ph.D. degrees from the Tokyo Institute of Technology in 1991, 1993 and 2000, respectively. He left Ph.D. program in 1994 and joined the Tokyo Institute of Technology as an assistant professor at that time. In 2000, he joined the National Institute of Multimedia Education (NIME) in Japan as an associate professor at the Tokyo Institute of Technology. Since 2001, he has been an associate professor at the Tokyo Institute of Technology. He has also been a visiting associate professor of the National Institute of Informatics (NII) in Japan since 2004. His research interests include network QoS control for multimedia communications.

Image Recovery by Decomposition with Component ...

Dec 12, 2012 - tion approaches which employ one regularization function and one fidelity ...... ceived the B.E. degree in computer science from the University ...

2MB Sizes 5 Downloads 164 Views

Recommend Documents

Intrinsic Image Decomposition Using a Sparse ...
A 3D plot of the WRBW coefficients (across RGB). updated using the computed detail coefficients stored .... used the “box” example from the MIT intrinsic image database [24]. This is shown in Fig. 4. We perform the. WRBW on both the original imag

Medicinal product with a textile component
Jan 28, 2000 - structed in compact parallel bundles, whereas the meshwork .... spanned by a continuous thread 18 according to FIG. 3,. Which for example ...

Software Synthesis through Task Decomposition by Dependency ...
Software Synthesis through Task Decomposition by Dependency Analysis. Youngsoo Shin Kiyoung Choi. School of Electrical Engineering. Seoul National ...

Software Synthesis through Task Decomposition by ... - kaist
The software interface module combines device driver routine calls, I/O function calls, and load/store commands to read/write data from/to the system bus.

Medicinal product with a textile component
Jan 28, 2000 - Foreign Application Priority Data. Feb. 4, 1999. (EP) . ... medical products such as wound compresses consist for example of woven fabric,.

Component Testing
Jul 8, 2002 - silicon atom. ... you really have to understand the nature of the atom. ..... often that you see a desktop computer burst into flames and burn down ...

Recovery Image for the ASUS G750JX .pdf
Whoops! There was a problem loading more pages. Retrying... Main menu. Displaying Recovery Image for the ASUS G750JX .pdf.

Component Testing
Jul 8, 2002 - use a meter to test suspect components and troubleshoot electronic circuits. ..... The valence electron is held loosely to the atom and moves.

Just Noticeable Difference for Images with Decomposition ... - CSUSAP
difference in each image pixel (for pixel domain JND) or image subbands ... registration, etc. ..... Lancini and three anonymous reviewers' helpful advice on our.

Notes on Decomposition Methods - CiteSeerX
Feb 12, 2007 - Some recent reference on decomposition applied to networking problems ...... where di is the degree of net i, i.e., the number of subsystems ...

CDO mapping with stochastic recovery - CiteSeerX
B(d, T) := BaseProtection(d, T) − BasePremium(d, T). (11) to which the payment of any upfront amounts (usually exchanged on the third business day after trade date) should be added. A Single Tranche CDO can be constructed as the difference of two b

SPARSE RECOVERY WITH UNKNOWN VARIANCE
Section 5 studies the basic properties (continuity, uniqueness, range of the .... proposed by Candès and Plan in [9] to overcome this problem is to assume.

CDO mapping with stochastic recovery - CiteSeerX
Figure 2: Base correlation surface for CDX IG Series 11 on 8 January. 2009 obtained using the stochastic recovery model. 4.2 Time and strike dimensions.

Cheap Game Accessories With Component Hdtv Av High Definition ...
Cheap Game Accessories With Component Hdtv Av High ... I ⁄ 720P Hdtv, Free Shipping & Wholesale Price.pdf. Cheap Game Accessories With Component ...

Deploying F5 with SAP ERP Central Component - F5 Networks
Jun 11, 2013 - 10. SSL Encryption. 12. ASM. 14. Application Firewall Manager (BIG-IP AFM). 14 ... f5.sap_erp iApp template, see Upgrading an Application Service from .... The BIG-IP LTM chooses the best available ECC device based on the load .... Thi

Component symbols.pdf
Cell Supplies electrical energy to a circuit, the longer line ... Loudspeaker Converts electrical energy into sound energy. Page 1 of 1. Component symbols.pdf.

Capacity component -
Dec 1, 2016 - Draft JAO/DAO on biodiversity tagging formulated. • Draft DAO on recommended modes of. PPP for biodiversity conservation. • DAO on establishment of PPP unit in. DENR signed and implemented. • “Establishment of a Carbon. Sequestr

Deploying F5 with SAP ERP Central Component - F5 Networks
Jun 11, 2013 - F5 Analytics (also known as Application Visibility and Reporting or AVR) is ...... first install and configure the necessary server software for these.