15
Signal Processing 85 (2005) 591–605 Event detection and period extraction using multi-scale symmetry and entropy Robert Jackson a , David Pycock b, , Ming Xu c , Mounther Salous b , Mark Knowles d , Stephen Harman d a Altera, European Technology Centre, Holmers Farm Way, High Wycombe, HP12 4XF, UK b Electronic Electrical and Computer Engineering, The University of Birmingham, Edgbaston, Birmingham, B15 2TT, UK c City University, London, Northampton Square, London, EC1V 0HB, UK d QinetiQ, Sensors and Electronics Division, St. Andrews Road, Malvern, Worcs., WR14 3PS, UK Received 26 September 2003; received in revised form 23 June 2004 Abstract We present a system for detecting discrete periodic events over a short interval and in the presence of interference. In the first stage symmetries are identified using scale-space representation. This process detects signal events with a low signal-to-noise ratio but has the potential to introduce a number of false responses. This process is followed by an entropy-based algorithm that can robustly extract periodicities from a set of observed discrete events in the presence of a large number of false alarms. The event detection and period extraction processes have a low computational cost and can extract signal periodicity after a short observation time. This scheme was evaluated against four previously reported methods. Results demonstrate that the period extraction algorithm presented here is more reliable than three of the previously reported algorithms. The reliability of the algorithm presented here was similar to that of the fourth method but the computational cost was much less. r 2004 Elsevier B.V. All rights reserved. Keywords: Scale-space; Multi-scale; Medial-axis transform; Period isolation; Parameter extraction; Entropy; Symmetry 1. Introduction In radar, communications and signal identifica- tion it is often necessary to determine the periodicity of a process by detecting and measur- ing a sequence of discrete events. In many situations, radar, radio and communication sources (such as satellite transmitters, beacons and ground transmitters) can be identified in this way. To extract the period quickly it is necessary to apply computationally efficient algorithms which can detect as many events as possible, including those with low signal-to-noise ratios, and rapidly extract their period. ARTICLE IN PRESS www.elsevier.com/locate/sigpro 0165-1684/$ - see front matter r 2004 Elsevier B.V. All rights reserved. doi:10.1016/j.sigpro.2004.10.019 Corresponding author. Tel.: +44 121 414 4330; fax: +44 121 414 4291. E-mail address: [email protected] (D. Pycock).

Event detection and period extraction using multi-scale symmetry and entropy

Embed Size (px)

Citation preview

Page 1: Event detection and period extraction using multi-scale symmetry and entropy

ARTICLE IN PRESS

0165-1684/$ - se

doi:10.1016/j.sig

�Correspondi+44 121 414 429

E-mail addre

Signal Processing 85 (2005) 591–605

www.elsevier.com/locate/sigpro

Event detection and period extraction using multi-scalesymmetry and entropy

Robert Jacksona, David Pycockb,�, Ming Xuc, Mounther Salousb,Mark Knowlesd, Stephen Harmand

aAltera, European Technology Centre, Holmers Farm Way, High Wycombe, HP12 4XF, UKbElectronic Electrical and Computer Engineering, The University of Birmingham, Edgbaston, Birmingham, B15 2TT, UK

cCity University, London, Northampton Square, London, EC1V 0HB, UKdQinetiQ, Sensors and Electronics Division, St. Andrews Road, Malvern, Worcs., WR14 3PS, UK

Received 26 September 2003; received in revised form 23 June 2004

Abstract

We present a system for detecting discrete periodic events over a short interval and in the presence of interference. In

the first stage symmetries are identified using scale-space representation. This process detects signal events with a low

signal-to-noise ratio but has the potential to introduce a number of false responses. This process is followed by an

entropy-based algorithm that can robustly extract periodicities from a set of observed discrete events in the presence of

a large number of false alarms. The event detection and period extraction processes have a low computational cost and

can extract signal periodicity after a short observation time. This scheme was evaluated against four previously reported

methods. Results demonstrate that the period extraction algorithm presented here is more reliable than three of the

previously reported algorithms. The reliability of the algorithm presented here was similar to that of the fourth method

but the computational cost was much less.

r 2004 Elsevier B.V. All rights reserved.

Keywords: Scale-space; Multi-scale; Medial-axis transform; Period isolation; Parameter extraction; Entropy; Symmetry

1. Introduction

In radar, communications and signal identifica-tion it is often necessary to determine theperiodicity of a process by detecting and measur-

e front matter r 2004 Elsevier B.V. All rights reserve

pro.2004.10.019

ng author. Tel.: +44 121 414 4330; fax:

1.

ss: [email protected] (D. Pycock).

ing a sequence of discrete events. In manysituations, radar, radio and communicationsources (such as satellite transmitters, beaconsand ground transmitters) can be identified in thisway. To extract the period quickly it is necessaryto apply computationally efficient algorithmswhich can detect as many events as possible,including those with low signal-to-noise ratios,and rapidly extract their period.

d.

Page 2: Event detection and period extraction using multi-scale symmetry and entropy

ARTICLE IN PRESS

R. Jackson et al. / Signal Processing 85 (2005) 591–605592

A common approach to extracting signals of aknown characteristic at low signal-to-noise ratiosis to use a matched filter [14]. However, inapplications where the periodic response arisesfrom a large number of possible sources or whereevents possess variable and previously unknowncharacteristics, the detector would require anumber of matched filters and the capability togenerate new filters at run-time. This leads to ahigh system complexity.

We present an approach which detects events byidentifying symmetries in their scale-space repre-sentation. Symmetries are extracted using amedial-axis transform previously used in computervision applications [18]. An algorithm (SPINDLE)which identifies periodicity through a processes ofresampling (or ‘‘folding’’ [15]), binning and en-tropy-based comparison is then applied.

Section 2 introduces the concept of scale-spacerepresentation, Sections 3 and 4 define the periodestimation problem and review previously re-ported algorithms for period extraction. Ourproposed mechanisms for detecting events usingsymmetry and extracting their period are defined

0 50 100 150 200 250 300-2

0

2

4

6

8

10

12

0 50 100 1-2

0

2

4

6

8

10

12

(a) (b

(c)

Fig. 1. Multi-scale depiction of a signal (a) original signal (b) coarse-

filter) (c) fine-scale view (equivalent to original).

in Sections 5 and 6. Results are presented inSections 7–9.

2. Scale-space techniques

Objects, be they events recorded from a radarsystem or real world images, are perceived ashaving structure at a range of scales. For example,a sine wave modulated by a square wave willappear to have the structure of the square wavewhen examined at a coarse scale; the sine wavebecoming apparent when the signal is observed ata higher level of detail, as shown in Fig. 1. Scalecan be considered as an additional continuousdimension in our analysis of signals [9]. Note thatscale representation is not the same as timedomain filtering.The scale-space representation of a signal is

constructed by applying a diffusion operation. AGaussian smoothing filter is used as the diffusionoperator, to construct a linear scale-space repre-sentation. This linear scale-space is shift invariantand does not cause local extrema to be enhanced

0 50 100 150 200 250 300-2

0

2

4

6

8

10

12

50 200 250 300

)

scale view (constructed by repeated application of a smoothing

Page 3: Event detection and period extraction using multi-scale symmetry and entropy

ARTICLE IN PRESS

R. Jackson et al. / Signal Processing 85 (2005) 591–605 593

or created as scale changes from fine to coarse [9].These properties allow features to be trackedacross scale without discontinuity [8]. Uncorre-lated and slightly correlated noise is only repre-sented at fine scale and is rapidly attenuated asscale is increased [1]. Theories of Gaussian scale-space can be extended to discrete formulations [8].Multi-resolution techniques yield some of theproperties of scale-space analysis in that theyabstract and remove detail. However, a scale-spacerepresentation makes scale a metric dimension sothat scale can be interpreted with the spatial andtime axes.

An alternative approach to multi-resolutionprocessing is to use a wavelet representation ofthe data and to select basis functions andcoefficients that optimally differentiate signal fromnoise. However, it has been shown that forrelatively unstructured signals such as thoseencountered here (see Fig. 9(a)) it is not easy toidentify wavelet coefficients which characterise thesignal [7].

3. Periodic signal model

The information from which the periodicity ofthe process must be extracted can be modelled as asignal containing a series of discrete eventsoccurring with period T. The detection time ofthe first event determines the phase, t; of the signal(0ptoT). A sequence of n observed events shouldtherefore occur at times mT þ t;m 2 f1; 2; . . . ; ng:

We assume that only a fraction of events arecorrectly identified. The set of detected events isgiven as fkig: The probability that an event isincluded in the set, Pðm 2 fkigÞ; is given by Pdetect:

The detector or generating process introducessome error or jitter, ZðiÞ; in the time at which eachevent is detected. We assume that ZðiÞ is anindependent random variable with zero mean,uniformly distributed over some fraction of theinterval � T

2;þ T

2

� �: The set of detected events is

given by fkiT þ tþ ZðiÞg:The detection process introduces nFA false

alarms. Each false alarm in the setfFA1;FA2; . . . ;FAnFAg is assumed to be indepen-dent and uniformly distributed over the interval

½0; nT þ t: The set of events from which the periodmust be extracted is therefore given by

y ¼ fkiT þ tþ ZðiÞg [ fFA1; . . .g (1)

and yðiÞ is the time of detection of the ith event.

4. Period extraction: background

Previously reported methods for extracting theperiod from a set of measurements have beenbased on histograms of time differences[2,3,10,11,17], Kalman Filtering [5], forward dy-namic programming [12] and spectral analysis [6].A histogram of the difference between the time

of event detection is simply computed as fyðiÞ �

yðjÞg; i; j ¼ 1; 2; 3; . . . : The period can be deter-mined by recognising a peak (at T) and itsharmonics [10,11,17]. Alternatively, the time dif-ference between successive events, fyði þ 1Þ � yðiÞg;can be examined [2,3]. Both approaches requirethe signal to be observed for a large number ofperiods before an accurate value for T can beestimated and are sensitive to false alarms.To apply Kalman filtering [5], a simple state

machine is constructed to model the generatingprocess

Tkþ1

tkþ1

" #¼

1 0

1 1

� �Tk

tk

" #þ

Z1Z2

" #(2)

with initial state

T0

t0

" #¼

T

t

� �; (3)

where Z1; Z2 correspond to a zero mean Gaussianwhite noise sequence, termed process noise, whichaccommodates jitter, and T0; t0 are the initialvalues of T and t:The Kalman filter approach has three main

drawbacks:

If the initial conditions ðt0;T0Þ are not appro-priate then the filter may require a long periodof observation (considerably more than the 10cycles envisaged here) to correctly identify T.

The state-space model does not include anymechanism for representing missed events.
Page 4: Event detection and period extraction using multi-scale symmetry and entropy

ARTICLE IN PRESS

R. Jackson et al. / Signal Processing 85 (2005) 591–605594

As with missed events, false alarms cause thefilter to modify its state variables ðtk;TkÞ toaccept the observations and, as a results, tomove away from the correct state.

Robust methods designed to overcome theselimitations significantly increase computationalcost. Elton and Slocumb [5] describe a pulsegating modification, commonly used in pulse trainde-interleaving and filtering, that can accommo-date false and missed alarms. A gating window isconstructed, centred on the predicted detectiontime of the next event and with width proportionalto the Kalman filter’s belief in the accuracy of itsstate estimate. Whilst this modification can copewith missed and false alarms it increases sensitivityto initial state values ðt0;T0Þ: Should the filterbecome fixated on an incorrect value of T or aharmonic such as 2T ; or T

2; gating may exclude

detected events that would otherwise allow acorrection of the estimate.

Moore and Krishnamurthy [12] proposed ascheme of forward dynamic processing (FDP) tode-interleave and track interleaved pulse trainsfrom multiple periodic sources. In effect, allpossible interpretations of event origin are con-sidered by looking ahead (over a finite time span)and the Kalman filter error term is used todetermine the most appropriate interpretation.This search step introduces a computational costof order OðNDþ3Þ; where N is the number ofsources and D is the number of events the look-ahead operates over. Robustness to false alarmswas incorporated by allowing the look-aheadalgorithm to designate some events as false alarms.Both modifications increase the computationalcost considerably. Extending this technique tocope with frequent false alarms is possible butfurther increases the computational cost.

Fogel and Gavish [6] proposed an algorithm forestimating periodicity by inspecting the spectralcomponents of the signal. Given that yðiÞ is the timeof detection of the ith event, T can be identifiedfrom a range of test values, T ; by selecting the valuewhich has the largest Fourier co-efficient:

T ¼ arg maxT

Xi

ej2pyðiÞ=T

����������: (4)

When no false alarms are present Eq. (4) is amaximum likelihood estimator of T [6]. Thisalgorithm is computationally intensive requiring acomplex exponentiation and summation for a largerange of possible values of T.Eq. (4) favours lower estimates of T. The

summation gives the same value when T ¼ T2as

it does when T ¼ T : In effect the algorithm doesnot distinguish between an interpretation of thesignal as having period T

2 with 50% of its eventsmissing and an interpretation having period T withno missed events. Signals with lower periodsshould yield larger coefficients as more events willhave been observed. If the signal is observed for aperiod l and has period T the summation shouldreturn a value of l

T: We therefore propose a

modified form the algorithm, which scales each co-efficient by dividing by its expected value. Hencethe modified form:

T ¼ arg maxT

T

l

Xi

e j2pyðiÞ=T

����������: (5)

Elton and Gray [4] described a mechanism for thedetection of pulse trains of a known period byconstructing a modulo-T resampled (or ‘‘folded’’)distribution, as defined in Eq. (6). The twoextremes of the new distribution are equivalentand it is therefore regarded as a continuous loop.The Z2

m circular statistic of Eq. (7) is tested todetect the presence of a periodic process.

fðyðiÞÞ ¼ 2pyðiÞ

T�

yðiÞ

T

� �; (6)

Z2m ¼

2

N

Xm

l¼1

XN

i¼1

cosðlfðyðiÞÞÞ

" #28<:

þXN

i¼1

sinðlfðyðiÞÞÞ

" #29=;; ð7Þ

where N is the number of events observed and m,the number of harmonics present in the signal.The periodicity of a signal can be determined

by selecting the value of T that maximises Z2m

(Eq. (8)).

T ¼ arg maxT

Z2mðTÞ (8)

Page 5: Event detection and period extraction using multi-scale symmetry and entropy

ARTICLE IN PRESS

R. Jackson et al. / Signal Processing 85 (2005) 591–605 595

Computing the Z2m statistic has a computational

cost of order OðmNÞ: However, each stepinvolves evaluating a number of trigonometricfunctions and is therefore relatively expensive tocompute.

5. Event detection using multi-scale symmetries

To detect events which have a weak or varyingstructure we have applied a non-linear multi-scalemedial-axis (MMA) algorithm [13] which identifiesaxes of symmetry occurring at different scales. Theadvantages of this algorithm, the concordance-based medial-axis transform (CMAT) [18], overother linear MMA algorithms are improvedfeature localisation and width identification whilstretaining robustness to noise.

MMA algorithms are typically used to find axesin images or data with greater than one dimension,however, they can be efficiently used to detectsymmetries in 1D signals.

Fig. 2 illustrates medial-axis computation.Initial processing, convolution with the derivativeof a Gaussian, identifies evidence for potentialboundary points (boundariness) at a given scale(s). Boundariness information is combined, insuch a way that symmetries resulting from the twosides of an object reinforce each other, to indicatemedialness. A skeletal representation of thestructure can be constructed by extracting themedialness ridges.

Boundariness

Medialness

Signal

Medialness operator

r

r = k

Fig. 2. Constructing the MMA of a signal.

5.1. Multi-dimensional definition of CMAT

The first step in computing a CMAT medial axisinvolves calculating the boundariness of the signalat each scale. The boundary response at point a

and scale s; Bðs; aÞ; has two components: bðs; aÞthe strength of the boundary at a and nðs; aÞ thedirection to the centre of the structure of whichBðs; aÞ forms the boundary. B can be computed byconvolving the signal data with a filter based onthe first derivative of the Gaussian kernel. Theradius of the structure is taken as r ¼ ks where k isa constant relating the scale of smoothing to theradius of the operator, r. As the Gaussian responseis reduced by 95% and 99% after 2 and 3 standarddeviations, respectively, non-critical parameter k

normally takes an arbitrary value around 2 or 3.This ensures that the area considered by theboundary detection process is similar to the widthof the symmetry detector. Therefore, the boundari-ness at point a contributes to the initial medialnessresponse at point x ¼ aþ rnðs; aÞ by bðs; aÞ:By summing all the contributions we can

construct an initial description of the medialness,the Laplacian of the Gaussian medialness [18], fora given scale

mðs;xÞ ¼Xa

bðs; aÞdðx� a� rnðs; aÞÞ; (9)

where dðnÞ is the discrete Delta function defined as:dðnÞ ¼ 1 if n ¼ 0; otherwise dðnÞ ¼ 0.This initial medialness surface contains boun-

dariness contributions from single edge points.The CMAT algorithm computes a weight (theconcordance) for each boundariness point whichemphasises symmetric boundaries. The concor-dance criterion is defined as

cðs; aÞ ¼mðs; xÞ � bðs; aÞ

mðs;xÞ: (10)

The form of the concordance function cðs; aÞ andalternative expressions are discussed in a previouspaper [18]. The final CMAT response is given as

Mðs;xÞ ¼Xa

bðs; aÞcðs; aÞdðx� a� rnðs; aÞÞ:

(11)

Page 6: Event detection and period extraction using multi-scale symmetry and entropy

ARTICLE IN PRESS

t

Background Background

Medialness

Test

Excluded

σ

Fig. 3. Two-dimensional windowed significance operator.

R. Jackson et al. / Signal Processing 85 (2005) 591–605596

5.2. Definition of the 1D CMAT

In the case of a 1D signal we can simplify thecomputation of the CMAT. Boundary strength,bðs; tÞ; is computed as before. However, it is muchsimpler to determine the centre of the structure:the centre is either r samples before or after t.

A positive value of b indicates the beginning of astructure and a negative value indicates the end.Positive values of bðs; tÞ; therefore, contribute tothe medialness of point t þ r whereas negativevalues contribute to the medialness of point t � r:Two boundariness subsets can be formed:

bnegðs; tÞ ¼ j bðs; t þ rÞ j bo0;

bposðs; tÞ ¼ bðs; t � rÞ b40 ð12Þ

the initial medialness can be computed as before:

mðs; tÞ ¼ bnegðs; tÞ þ bposðs; tÞ; (13)

the concordance for each point of bneg and bpos is

cnegðs; tÞ ¼mðs; tÞ � bnegðs; tÞ

mðs; tÞ;

cposðs; tÞ ¼mðs; tÞ � bposðs; tÞ

mðs; tÞ: ð14Þ

Substituting Eq. (13) for mðs; tÞ in Eq. (14)

cneqðs; tÞ ¼bposðs; tÞ

bnegðs; tÞ þ bposðs; tÞ;

cposðs; tÞ ¼bnegðs; tÞ

bnegðs; tÞ þ bposðs; tÞð15Þ

and the final medialness is computed as

Mðs; tÞ ¼ cnegðs; tÞbnegðs; tÞ þ cposðs; tÞbposðs; tÞ

¼2bnegðs; tÞbposðs; tÞ

bnegðs; tÞ þ bposðs; tÞ: ð16Þ

5.3. Multi-scale feature detection

To distinguish simple structures from noise wetest the medialness signal for evidence of symme-tries that persist across a number of scales. Weassume that noise is unstructured and thereforewill not possess symmetries that persist. Noise israpidly attenuated across scale and so signalsymmetries are more apparent at coarser scales

[16]. At fine scales the impact of noise is greaterbut the presence of less extensive structures can beidentified.The set of scales at which the medialness is

examined is given by the generalised arithmeticprogression

rn ¼ ban þ g; (17)

where g represents the minimum scale at which thesignal is present and a and b are arbitraryconstants [9]. The sampling of scale-space isdesigned to follow the geometric pattern createdby the successive reductions of scale using a seriesof convolutions. The rate of progression of thissampling is chosen so that the first step is a unit ofchange in scale and the range of covered scales isbetween one and two orders of magnitude in arelatively small number of samples.A windowed 2D significance operation is used

to integrate medialness information that is thre-sholded to detect events. The significance operator(Eq. (18)) compares the mean medialness over theregion of medialness space under test (mT) withthat in the background (mB) and returns thedifference in terms of multiples of the standarddeviation of the background (SDB):

sigðtÞ ¼ 1þmT � mBSDB

: ð18Þ

The significance operator is depicted in Fig. 3.Small regions either side of the area under test areexcluded when computing background values toprevent increased values of medialness near themain point of symmetry effecting mB and SDB

(Fig. 4). A threshold is applied to sigðtÞ in order todetect events. The value of this threshold and theSNR of the data are reflected in the probability offalse alarms (PFA) and the probability that anevent is detected (Pdetect). The selection ofan appropriate threshold depends on the

Page 7: Event detection and period extraction using multi-scale symmetry and entropy

ARTICLE IN PRESS

Fig. 4. Pseudo-code description of CMAT algorithm.

R. Jackson et al. / Signal Processing 85 (2005) 591–605 597

characteristics of subsequent processing steps (i.e.sensitivity to false alarms, expected SNR). Thechoice of this threshold is not critical because therole of the event detection process is to generatecues; a list of possible events and not to detect onlytrue events. Here, SNR is defined as the ratio ofthe mean signal power over the mean noise power.

6. Entropy-based period extraction

We propose a computationally efficient algo-rithm which uses entropy to select a moduloresampling of the set of detected events corre-sponding to T. The algorithm includes a binningoperation that reduces computational costs andprovides robustness to signal jitter.

Assuming

yðkÞ ¼1 if a structure is detected at time k;

0 otherwise

�(19)

we can form the modulo-T resampled distributionyT ðmÞ as

yT ðmÞ ¼XN

k¼1; ðk mod T¼mÞ

yðkÞ; (20)

where yT ðmÞ is defined for m ¼ 1; 2; . . . ; T :The modulo resampled distribution is then

divided into B symbols (bins, b ¼ 1; 2; . . . ;B) each

with probability of occurrence

pT ðbÞ ¼

Pðbþ1Þ=BT

m¼b=BTyT ðmÞP

m yT ðmÞ(21)

the entropy of this empirical estimate of thedistribution is given as

HðTÞ ¼ �X

b

pT ðbÞ log pT ðbÞ (22)

and the value of T that minimises HðTÞ isextracted

T ¼ arg minT

j HðTÞ j : (23)

This period extraction process relies on the factthat, when resampled modulo-T, the distributionof detected events will form a pattern and hence itscomputed entropy will be reduced relative to otherresamplings. Specifically, that, when resampledmodulo-T, the set of events will demonstrate acluster centred about t: Other more complexperiodic processes such as staggered pulse trainswill also form patterns when resampled, however,their treatment is not considered here.Uniformly distributed false alarms will remain

uniformly distributed under different resamplingsand so their presence will not affect the values ofentropy used to compare different resamplings.Moreover, for a given sequence of events, the biasintroduced by these false alarms in estimatingentropy (Eq. (22)) does not change with differentresamplings and therefore does not influence theoutcome of the period extraction process. Thechoice of re-sampling interval is discussed furtherin Section 6.1.Resampling modulo fractional values of T (i.e.

mn

T ; m; n 2 Z) also gives rise to structured dis-tributions. The chance occurrence of false alarmsand missed events may lead to the formation of adistribution with a lower computed entropy thanthe modulo-T distribution and cause the algorithmto extract a fraction of the true period.The binning operation partitions the resampled

distribution into a fixed number of bins (symbols).This operation:

amalgamates adjacent events, making the de-tector robust to jitter;
Page 8: Event detection and period extraction using multi-scale symmetry and entropy

ARTICLE IN PRESS

R. Jackson et al. / Signal Processing 85 (2005) 591–605598

reduces computational costs by fixing thenumber of operations needed to calculateentropy and the range of T values that need tobe tested;

Fig. 5. Original periodic signal.

Fig. 6. Signal resampled modulo-T.

allows entropies for different values of T to becompared directly. Some other formulations forcomputing entropy depend on the length of theinterval ½0; TÞ and would require normalisationbefore comparisons could be made.

The period extraction operation relies on detectingevent clusters when resampled modulo-T. If thecluster occurs near a bin boundary the events maybe split between two bins reducing the likelihoodthat T will be correctly selected as the period. Thiscan be avoided by either testing each candidate T

value twice, shifting the bin positions by half theirwidth between computations, or by choosingsuccessive values of T sufficiently close that thecluster of events is contained within a single bin,for at least one resampling. The choice of thissampling interval is discussed below.

Fig. 7. Signal resampled modulo-ðT þ dÞ:

6.1. Sampling regime and resolution

A range of values of T must be tested to identifythe period. The computational cost, accuracy andcorrectness of the algorithm depend on the lengthof time for which the generating process isobserved, the number of bins used and the sizeof step with which T is sampled. It is possible todetermine a maximum step size, above which thealgorithm is unlikely to correctly determine theperiod, T.

Consider a sequence of n periodic eventsoccurring exactly every T samples with the firstevent occurring after t samples (0ptoT) (Fig. 5).The signal is observed for a length of time, l �

nT þ t:When resampled modulo-T ¼ T all the events

occur at the same point, t (Fig. 6). Whenresampled modulo-T ¼ T þ dT the events areevenly distributed across the interval t� ndT ; t½

(Fig. 7). Each bin covers TBsamples, where B is the

number of bins.To extract the period, T, the modulo resampling

should cause all events to fall within the same bin.To determine the interval covered by a bin, assume

that the distribution is initially resampled usingT ¼ T : If the next resampling, using candidateperiod T ¼ T þ dT ; causes the events to bedistributed across a single bin, it will be impossibleto extract the correct signal period. We therefore,choose a step size dT that will cause the events tobe distributed over an interval (ndT ) which issmaller than a bin (TþdT

B):

ndTpT þ dT

B; (24)

dTpT

nB � 1(25)

assuming nBb1 and l � nT we derive

dTpT

2

lB: (26)

Using Eq. (26) guarantees that all the detectedsignals are distributed over an interval less thanthe width of a single bin for at least two moduloresampled distributions.

Page 9: Event detection and period extraction using multi-scale symmetry and entropy

ARTICLE IN PRESS

Fig. 8. Pseudo-code description of SPINDLE algorithm.

0.14

0.16

0.18

R. Jackson et al. / Signal Processing 85 (2005) 591–605 599

Eq. (26) also defines the resolution of theextraction algorithm. Resolution is inversely pro-portional to step size; increasing the number ofbins or the length of time the signal is observedincreases the accuracy with which T can becomputed, whilst the period of low-frequency(large T) signals can only be coarsely calculated.

6.2. Computational complexity

The computational complexity of SPINDLE

can be derived directly from Eqs. (20)–(23). Thepseudo-code description given in Fig. 8 assumesthat the algorithm used B bins, that n events havebeen detected and yðiÞ is the time of the ith event.A range of possible values for the period betweenT1 and T2 are examined using a fixed step of dT

between each tested value. The total computa-tional cost is O n

dT; BdT

� �:

0 100 200 300 400 500 600 700 800 900 10000

0.02

0.04

0.06

0.08

0.1

0.12

Time

Am

plitu

de

0.6

0.65

0.7

0.75

0.8

0.85

0.9

0.95

1

Pde

tect

(a)

7. Event detection performance

Fig. 9(b) shows the performance of the CMAT-based detector when identifying structures of thetype shown in Fig. 9(a), at low signal-to-noiseratios. At a 5 dB signal-to-noise ratio the algo-rithm yielded a probability of event detection,Pdetect of 0.95 with a probability of a false alarmthat was below 0.001.

The detector was tested for symmetries over arange of event durations set by using k ¼ 3; andfixing a ¼ 1:8; b ¼ 0:7 and g ¼ 7; resulting in r ¼

8; 9; 11; 14; 20; 30: A similar pattern is given of a ¼

2; b ¼ 0:5 and g ¼ 7; for example. The choicebetween such variations is not shown here but hasshown not to be critical. The significance operatorused a test window of width 1, with excluded andbackground regions of width 30 and 150 samples,respectively (see Fig. 3).

0 0.001 0.002 0.003 0.004 0.005 0.006 0.007 0.008 0.009 0.010.5

0.55

Pfalse alarm(b)

Fig. 9. Performance of CMAT-based detector (a) original

signal (b) Receiver operating characteristic curves for signal-to-

noise ratio of 0 dB (dotted line), 5 dB (dashed), 10 dB

(dash–dot) and 20 dB (solid line).

8. Period extraction algorithm performance

We have compared the performance of SPIN-

DLE, for a range of false alarm and jitterconditions, with that of the modified versionof Fogel and Gavish’s algorithm (F&G) given in

Page 10: Event detection and period extraction using multi-scale symmetry and entropy

ARTICLE IN PRESS

R. Jackson et al. / Signal Processing 85 (2005) 591–605600

Eq. (5), the Z2m statistic given in Eq. (8), a

histogramming algorithm (CDIF [10,11]), andthe technique described by Moore and Krishna-murthy [12], using a Kalman Filter with a 6-eventFDP interval (D ¼ 6Þ). The evaluation was per-formed using simulations, with synthetic dataconsisting of lists of false alarms and eventdetection times. This was done to obtain con-trolled levels of perturbation for jitter, phase shiftand false events and to allow a systematic andquantitative evaluation. In each case 250 MonteCarlo simulations were performed for each set ofconditions.

8.1. Sensitivity to false alarms

Fig. 10 shows the performance of the fivealgorithms in the presence of false alarms. Thegraphs show the results of simulations using asignal with number of events, n ¼ 10; period T

randomly selected from the interval ½750; 4750;jitter, j ¼ 0:01 (i.e. 1% of T); and phase, trandomly initialised. Both algorithms tested arange of possible values of T from 500 to 5000with a step size, dT ; of 10, (i.e.T ¼ ½500; 510; 520; . . . ; 4990; 5000). The SPIN-

DLE algorithm used 30 bins ðB ¼ 30Þ: The numberof false alarms, nFA; was varied from 0 to 100 andthe probability of detection of events, Pdetect; wasset at 0.6, 0.8 and 1.0.

Fig. 10 demonstrates that the SPINDLE algo-rithm is only outperformed by the computation-ally intensive Z2

m statistic for moderate (20 ormore) levels of false alarms. In the presence of 10false alarms, with 8 of the 10 periodic eventsdetected, the correct value for T was extracted witha probability of around 0.8. Under these condi-tions the probability that the F&G algorithm givesthe correct result dropped to 0.15.

The performance of the Z2m statistic exceeds that

of SPINDLE when a large number of harmonicsare tested (m ¼ 20); this approach is computation-ally more expensive. For each value of T tested,computing Z2

m; requires the evaluation of 2mN

trigonometric functions, where N is the number ofevents detected. The SPINDLE algorithm requiresonly B evaluations of a log function. In Fig. 10 thiscorresponds to approximately 400 trigonometric

computations for the Z2m statistic compared to 30

logarithmic computations for SPINDLE perperiod estimation.

8.2. Sensitivity to jitter

Fig. 11 shows the performance of Z2m; SPIN-

DLE, CDIF and the modified F&G algorithm asjitter was increased from 0% to 50% of T ðj ¼ 0 to0.5). The performance of the Kalman filter was nottested here as it performed very poorly in theprevious test. The parameters used for this testwere: number of false alarms, nFA ¼ 2; number ofevents, n ¼ 10; and T in the range ½750; 4750:It is clear from Fig. 11 that the CDIF algorithm

performed worst as jitter increased. Overall, theZ2

m algorithm modestly outperformed the SPIN-

DLE algorithm for most tested event detectionprobabilities. However, for small jitter, less than5%, SPINDLE outperforms the Z2

m algorithm.The performance of the SPINDLE algorithmdegraded almost linearly as jitter increased from5% to 50% of T. Very low values of jitter caused aslight degradation in performance as it becamehard to distinguish between T and its fractionalharmonics T

2 ;T3 ; . . . : A jitter of 2% of T appeared

as a jitter of 4% of T2; 6% of T

3; ::: causing the

fractional values to be correctly rejected.Fig. 11 also shows that the performance of the

modified version of F&G’s algorithm (refer to Eq.(5)) also decreased linearly with jitter (Fig. 11(c))albeit at a lower rate. Although Fig. 11 demon-strates that for some higher levels of jitter the F&Galgorithm outperforms SPINDLE it should benoted that these results deal with a situation wherethe number of false alarms is very low.

8.3. Sensitivity to phase

The binning process in SPINDLE introduces asensitivity to the phase, t; of the signal. Certainvalues of t will cause the detected structures to beclustered around the boundary between twosymbol bins when the events are resampledmodulo-T ¼ T : In addition, jitter will cause theobserved detection times of the events to be splitbetween two bins. As a result T may then not becorrectly identified as T. Under the conditions we

Page 11: Event detection and period extraction using multi-scale symmetry and entropy

ARTICLE IN PRESS

0 10 20 30 40 50 60 70 80 90 1000

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

number of false alarms

prob

abili

ty th

at v

alue

is w

ithin

1%

of T

0 10 20 30 40 50 60 70 80 90 1000

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

number of false alarms

prob

abili

ty th

at v

alue

is w

ithin

1%

of T

0 10 20 30 40 50 60 70 80 90 1000

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

number of false alarms

prob

abili

ty th

at v

alue

is w

ithin

1%

of T

0 10 20 30 40 50 60 70 80 90 1000

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

number of false alarms

prob

abili

ty th

at v

alue

is w

ithin

1%

of T

0 10 20 30 40 50 60 70 80 90 1000

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

number of false alarms

prob

abili

ty th

at v

alue

is w

ithin

1%

of T

(a) (b)

(c) (d)

(e)

Fig. 10. Probability that the extracted period is equal to T�1% for (a) Z2m; (b) SPINDLE, (c) histogram difference (CDIF), (d)

modified Fogel and Gavish and (e) Kalman Filtering (FDP). Probability of event detection, Pdetect of 1.0 (solid lines), 0.8 (dashed line),

0.6 (dash–dot).

R. Jackson et al. / Signal Processing 85 (2005) 591–605 601

Page 12: Event detection and period extraction using multi-scale symmetry and entropy

ARTICLE IN PRESS

0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 0.45 0.50

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

jitter (as a fraction of T)

prob

abili

ty th

at v

alue

is w

ithin

1%

of T

0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 0.45 0.50

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

jitter (as a fraction of T)

prob

abili

ty th

at v

alue

is w

ithin

1%

of T

0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 0.45 0.50

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

jitter (as a fraction of T)

prob

abili

ty th

at v

alue

is w

ithin

1%

of T

0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 0.45 0.50

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

jitter (as a fraction of T)

prob

abili

ty th

at v

alue

is w

ithin

1%

of T

(a) (b)

(c) (d)

Fig. 11. Probability that T�1% is returned as jitter is increased from 0% to 50% of T: (a) Z2m; (b) SPINDLE, (c) histogram difference

(CDIF) and (d) modified Fogel and Gavish. Probability of event detection, Pdetect of 1.0 (solid lines), 0.8 (dashed line), 0.6 (dash–dot).

R. Jackson et al. / Signal Processing 85 (2005) 591–605602

have considered the chance of a cluster falling on abin boundary is low: with T ¼ 3000 and B ¼ 30the probability of a cluster being on a binboundary is of the order of 0:01: However, shouldthe number of bins be increased the risk of failingto extract T will increase. Therefore, care must betaken to ensure the range of possible values issampled within the bound stated in Eq. (26).

Fig. 12 shows the performance of SPINDLE ast was varied from 0% of T to 100% of T. TheSPINDLE algorithm was evaluated using 10 bins(B ¼ 10); number of events, n ¼ 10; number offalse alarms, nFA ¼ 10; period T randomly selectedfrom the interval ½750; 4750; jitter, j ¼ 0:01 (i.e.1% of T).

Fig. 12(a) shows the probability that thevalue of T computed was correct to within 10samples. This is the best accuracy possible asdistributions were computed at every tenthvalue for T (i.e. 500, 510, 520, etc). If the phasecauses the detected structures to cluster onone of bin boundaries when T ¼ T the correctvalue of T is not returned. However, resamplingusing T ¼ T � 10 will generate a distribution,similar to T ¼ T ; but is less likely to fall on aboundary. Therefore, even if the T value closest toT is not selected a similar value will be extracted;hence the insensitivity to phase shown inFig. 12(b), where the probability of extracting T �

30 is plotted.

Page 13: Event detection and period extraction using multi-scale symmetry and entropy

ARTICLE IN PRESS

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.90

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

phase (as a fraction of T)

prob

abili

ty o

f get

ting

T−+

10

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.90

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

phase (as a fraction of T)

prob

abili

ty o

f get

ting

T−+

30

(a)

(b)

Fig. 12. Performance of SPINDLE as phase is varied: (a)

probability that T� 10 is returned, (b) probability that T� 30 is

returned. Probability of event detection, Pdetect of 1.0 (solid

lines), 0.8 (dashed line), 0.6 (dash–dot).

5 10 15 20 25 30 35 40 45 50 550

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

number of bins

prob

abili

ty th

at v

alue

is w

ithin

1%

of T

Fig. 13. Performance of SPINDLE as the number of bins is

increased from 5 to 55. Probability of event detection, Pdetect of

1.0 (solid lines), 0.8 (dashed line), 0.6 (dash–dot).

R. Jackson et al. / Signal Processing 85 (2005) 591–605 603

8.4. Sensitivity to number of bins

Fig. 13 shows the effect of varying the numberof bins used in SPINDLE. Synthetic data with:number of events, n ¼ 10; number of false alarms,nFA ¼ 20; period T randomly selected from theinterval ½750; 4750; jitter, j ¼ 0:01 (i.e. 1% of T);and phase, t randomly initialised, was used.

Accuracy of period detection increases as thenumber of bins is increased. This increase inperformance is accompanied by an increase incomputational cost and sensitivity to initial offsetand jitter. Increasing the number of bins showed

diminishing returns, with near peak performancebeing reached using 20–30 bins.

9. Overall period extraction performance

The performance of the CMAT-based detector,Fig. 9, can be combined with the simulatedperformance of the SPINDLE algorithm to givean indication of overall performance as shown inFig. 14. The number of false alarms generatedwhile observing the signal can be computed as

nFA ¼ ðnT þ tÞPFA: (27)

Fig. 14 shows the probability that the period willbe correctly determined for a signal composed ofdiscrete structures of the kind shown in Fig. 9,which has been observed for ten cycles ðn ¼ 10Þ:We assume a period, T of 2000 samples and jitter,j ¼ 0:01 (i.e. 1% of T). For a signal with a 5 dBSNR, the correct period is extracted in 90% ofcases when the threshold of the CMAT-baseddetector is set between 8 and 12.

10. Conclusions

The CMAT algorithm permits events whichexhibit symmetrical structures to be detected

Page 14: Event detection and period extraction using multi-scale symmetry and entropy

ARTICLE IN PRESS

0 5 10 15 20 25 30 35 40 45 500

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

Threshold

prob

abili

ty th

at v

alue

is w

ithin

1%

of T

Fig. 14. Performance of CMAT-based detector and SPINDLE.

Probability that the extracted period is equal to T�1% as the

detector threshold is raised. Signal-to-noise ratios of 0 dB

(dotted line), 5 dB (dashed), 10 dB (dash–dot) and 20 dB (solid

line).

R. Jackson et al. / Signal Processing 85 (2005) 591–605604

against a background of white noise without priorknowledge of their shape beyond crude assump-tions about their duration and symmetry. It is alsoa computationally efficient and a reliable methodof detecting events that copes with variation inevent characteristics.

The entropy-based algorithm described herepermits the rapid extraction of a period from aset of detected events. The algorithm has a lowcomputational cost of order, O n

dT; BdT

� �; and is

more reliable in the presence of large numbers offalse alarms or missed events than most previouslyreported algorithms and as good as all thosetested, to a first approximation. This has beendemonstrated using synthetic data with a simula-tion of artifacts. The addition of jitter and falsealarms provides a systematic evaluation for sourcedata that is progressively more a-periodic. Inaddition, we have used the performance of theCMAT operator on natural data to estimate theimpact of detector errors on period extraction.

The work described in this paper does notaddress the detection of events defined by signalswith a complex structure. We would, however,expect the performance of the CMAT-baseddetector to degrade gracefully since the definitionof symmetry used in formulating the detector

allows appropriate responses to be made forcomposite events with a modest degree of sym-metry. We are currently investigating extensions tothe detector which will test for the presence ofcomplex combinations of symmetric structuresand could, therefore, effectively and efficientlyidentify composite signals.

Disclaimer

The views expressed are those of the authorsand do not necessarily represent those of the MODor Her Majesty’s Government.

Acknowledgements

(C) British Crown copyright 2003. Publishedwith the permission of the Controller of HerMajesty’s Stationery Office. This work was origin-ally carried out as part of Technology Group 3,now energy guidance and control domain, of theMOD Corporate Research Programme.

References

[1] J. Blom, B.M. ter Haar Romney, A. Bel, J.J. Koenderink,

Spatial derivatives and the propagation of noise in

Gaussian scale-space, J. Vis. Commun. Image Represent.

4 (1) (March 1993) 1–13.

[2] S.D. Casey, B.M. Sadler, Modifications of the Euclidean

algorithm for isolating periodicities from a sparse set of

noisy measurements, IEEE Trans. Sig. Process. 44 (9)

(September 1996) 2260–2272.

[3] V.L. Clarkson, S.D. Howard, I.M.Y. Mareels, Estimating

the period of a pulse train from a set of sparse noisy

measurements, Proceedings of the International Sympo-

sium on Signal Processing and its Applications (ISSPA),

August 1996, pp. 885–888.

[4] S.D. Elton, D.A. Gray, The application of circular

statistics to specific radar pulse train detection, Proceed-

ings of the seventh European Signal Processing Con-

ference—EUSIPCO 94, vol. 1, September 1994, 284–287.

[5] S.D. Elton, B.J. Slocumb, A state space approach to joint

AOA and period estimation for a class of periodic

discrete event processes, Proceedings of IEEE TENCON

- Digital Signal Processing Applications, November 1996,

pp. 686–691.

[6] E. Fogel, M. Gavish, Parameter estimation of quasi-

periodic sequences, Proceedings of the International

Page 15: Event detection and period extraction using multi-scale symmetry and entropy

ARTICLE IN PRESS

R. Jackson et al. / Signal Processing 85 (2005) 591–605 605

Conference on Acoustics, Speech and Signal Process.

(ICASSP), vol. 4, April 1988, pp. 2348–2351.

[7] H. Krim, D. Tucker, S. Mallat, D. Donoho, On denoising

and best signal representation, IEEE Trans. Inform.

Theory 45 (7) (November 1999) 2225–2238.

[8] T. Lindeberg, Scale-space for discrete signals, IEEE Trans.

Pattern Anal. Mach. Intell. 12 (3) (March 1990) 234–254.

[9] T. Lindeberg, Scale-space Theory in Computer Vision,

Kluwer Academic Publishers, Dordrecht, 1994, reprinted

1997.

[10] H.K. Mardia, New techniques for the deinterleaving of

repetitive sequences, IEE Proc. F 136 (4) (August 1989)

149–154.

[11] D.J. Milojevic, B.M. Popovic, Improved algorithm for

deinterleaving of radar pulses, IEE Proc. F 139 (1)

(February 1992) 98–104.

[12] J.B. Moore, V. Krishnamurthy, Deinterleaving pulse trains

using discrete-time stochastic dynamic-linear models,

IEEE Trans. Signal Process. 42 (11) (November 1994)

3092–3103.

[13] S.M. Pizer, C.A. Burbeck, J.M. Coggins, D.S. Fritsch, B.S.

Morse, Object shape before boundary shape: scale-space

medial axes, J. Math. Imaging Vis. 4 (1994) 303–313.

[14] M. Schwartz, Information, Transmission and Noise,

McGraw-Hill, New York, 1970.

[15] D.H. Staelin, Fast folding algorithm for detection of

periodic pulse trains, Proc. IEEE 75 (April 1969) 724–725.

[16] V.A. Topkar, A.K. Sood, Statistical analysis of scale-

space, Signal Process. 26 (3) (March 1992) 307–334.

[17] R.G. Wiley, Electronic Intelligence: The Analysis of Radar

Signals, Artech House, Norwood, 1982.

[18] M. Xu, D. Pycock, A scale-space medialness transform

based on boundary concordance voting, J. Math. Imaging

Vis. 11 (3) (December 1999) 277–299.