21
The iterative convolution-thresholding method (ICTM) for image segmentation Dong Wang (University of Utah) Xiao-Ping Wang (HKUST) 1/ 21

The iterative convolution-thresholding method (ICTM) for

  • Upload
    others

  • View
    13

  • Download
    0

Embed Size (px)

Citation preview

Page 1: The iterative convolution-thresholding method (ICTM) for

The iterative convolution-thresholding method (ICTM) for imagesegmentation

Dong Wang (University of Utah)Xiao-Ping Wang (HKUST)

1/ 21

Page 2: The iterative convolution-thresholding method (ICTM) for

Introduction

I Image: f : Ī©ā†’ [0, 1]d

I Ī© : domain of image (discrete pixels)I d : number of channels (e.g., gray image: d = 1, color image: d = 3.)

I Image segmentation: the process of partitioning a digital image into multiple segmentsm

find the optimal partition in the sense of minimizing a objective functional

2/ 21

Page 3: The iterative convolution-thresholding method (ICTM) for

Objective functionals

Intuitively, the optimal partition should obey:I In each segment, the feature should be ā€œalmost constantā€ or has no ā€œbigā€ jumps. The

partition should be consistent with the image itself.I The boundary of the partition should be ā€œrelatively smoothā€ (try to ignore some noise from

in the image).

Mathematically, in the objective function, we should haveI A quantity to measure the consistency of the image in each segment (Fidelity term)I A quantity to measure the smoothness of the boundary of each segment (Regularization

term)

Generally, for the n-segment (Ī©1,Ī©2, Ā· Ā· Ā· ,Ī©n) case, we write the general objective functionalinto

E =nāˆ‘

i=1

āˆ«Ī©i

Fi(f ,Ī˜1, . . . ,Ī˜n) dx +nāˆ‘

i=1

Ī»i|āˆ‚Ī©i|

I Fi: choice of Fi depends on the features of the image or the types of imageI Ī˜i: possible parameters or functions needed to describe Fi

I Ī»i: constant parametersI |āˆ‚Ī©i|: the perimeter of the segment Ī©i

3/ 21

Page 4: The iterative convolution-thresholding method (ICTM) for

Example

In each segment, require the feature of the image is close to a constant

ā‡“Fi(f ,Ci) = |Ci āˆ’ f |2 (Ci: average of f in the segment Ī©i)

ā‡“Objective functional

E(Ī©1, . . . ,Ī©n,C1, . . . ,Cn) =āˆ‘n

i=1āˆ«Ī©i|Ci āˆ’ f |2 dx + Ī»i

āˆ‘ni=1 |āˆ‚Ī©i| (Chanā€“Vese Model)

[Chan and Vese, IEEE Trans. Image Process., 2001, Vese and Chan, Int. J. Comput. Vis., 2002]

4/ 21

Page 5: The iterative convolution-thresholding method (ICTM) for

Representing the partition and expressing the objective functionalExisting numerical method:I Prime dual, split Bregmann, framelets, K-means clustering, Ā· Ā· Ā·I Phase-field based methodI Level set method

Level set methodThe discrete image is interpreted as a function defined on a continuous domain.

ā‡“The boundary of the segment is represented as the levelset of an auxiliary function Ļ•.

ā‡“Every term in the objective function can be expressed using Ļ• and the Heaviside function of Ļ•.

ā‡“Variation w.r.t Ļ• gives a partial differential equation (PDE)

ā‡“Solving the PDE to evolve the initial guess to the final result to get the segmentation

Benefits: Very easy to adapt to arbitrary modelsDisadvantages:I Solving complicated PDEsI Reinitialization (or another technique) is needed for the auxiliary function Ļ•I Small artificial time step for the stability reason (converges slow)I Sensitive to numbers of segments

5/ 21

Page 6: The iterative convolution-thresholding method (ICTM) for

Using characteristic functions (2-segment case)I The first segment Ī©1 is denoted by its characteristic function u(x), i.e.,

u(x) :=

1 if x āˆˆ Ī©1,

0 otherwise.

I the characteristic function of the second segment Ī©c1 is 1āˆ’ u(x).

I the interface between two segments is now implicitly represented by u(x).

I The first term in the objective functionāˆ«Ī©1

F1 dx +āˆ«Ī©2

F2 dx =āˆ«Ī© uF1 + (1āˆ’ u)F2 dx

I The perimeter term [Miranda et al., Annales de la faculte des sciences de ToulouseMathematiques, 2007]

|āˆ‚Ī©1| ā‰ˆāˆšĻ€

Ļ„

āˆ«Ī©

uGĻ„ āˆ— (1āˆ’ u) dx

6/ 21

Page 7: The iterative convolution-thresholding method (ICTM) for

Approximation of the objective functional

E ā‰ˆ EĻ„ (u,Ī˜): = Ef (u,Ī˜) + EĻ„r (u,Ī˜)

I Ef (u,Ī˜) =āˆ«Ī© uF1(f ,Ī˜) + (1āˆ’ u)F2(f ,Ī˜) dx

I EĻ„r (u,Ī˜) = Ī»āˆšĻ€Ļ„

āˆ«Ī© uGĻ„ āˆ— (1āˆ’ u) dx

Target: Find uĻ„,? such that

(uĻ„,?,Ī˜Ļ„,?) = arg minuāˆˆB,Ī˜āˆˆS

EĻ„ (u,Ī˜)

where B : = u āˆˆ BV(Ī©,R) | u = 0, 1, S is the admissible set of Ī˜, and BV(Ī©,R)denotes the bounded-variation functional space.

7/ 21

Page 8: The iterative convolution-thresholding method (ICTM) for

Derivation of the method

Starting from an initial guess: u0, we find the minimizers iteratively in the following order:

Ī˜0, u1,Ī˜1, . . . , uk,Ī˜k, . . . .

Assuming that uk is calculated, we fix uk and find the minimizer of EĻ„ (uk,Ī˜) to obtain Ī˜k:

part 1 : Ī˜k = arg minĪ˜āˆˆS

EĻ„ (uk,Ī˜)

and fix Ī˜k to obtain uk+1:

part 2 : uk+1 = arg minuāˆˆBEĻ„ (u,Ī˜k).

8/ 21

Page 9: The iterative convolution-thresholding method (ICTM) for

part1

Because EĻ„r is independent of Ī˜, one only needs to find the global minimizers of Ef withrespect to Ī˜ to obtain Ī˜k:

Ī˜k = arg minĪ˜āˆˆS

āˆ«Ī©

ukF1(f ,Ī˜) + (1āˆ’ uk)F2(f ,Ī˜) dx

Since most of these models use strictly convex fidelity terms, each element Ī˜i,j(i = 1, 2, j āˆˆ [m]) in Ī˜k can be obtained via solving the following system of equations:

āˆ‚Ef

āˆ‚Ī˜1,1= 0, . . . ,

āˆ‚Ef

āˆ‚Ī˜1,m= 0,

āˆ‚Ef

āˆ‚Ī˜2,1= 0, . . . ,

āˆ‚Ef

āˆ‚Ī˜2,m= 0.

Above system can be approximately solved using the Gaussā€“Seidel strategy.I This step gives an optimal choice of Ī˜ for the fixed uk!!!

9/ 21

Page 10: The iterative convolution-thresholding method (ICTM) for

part2I EĻ„ (u,Ī˜k) : concave and quadratic.I The set B : = u āˆˆ BV(Ī©,R) | u = 0, 1 contains the boundary points of the

following convex set K:

K =u āˆˆ BV(Ī©,R) | u āˆˆ [0, 1]

(K is the convex hull of B).I The minimizer of a concave functional on a convex set can only be attained at the

boundary points of the convex set.I Relaxation:

uk+1 = arg minuāˆˆKEĻ„ (u,Ī˜k)ā‡” uk+1 = arg min

uāˆˆBEĻ„ (u,Ī˜k)

I Linearization:

uk+1 = arg minuāˆˆKLĻ„ (f ,Ī˜k, uk, u)

where LĻ„ (f ,Ī˜k, uk, u) is the linearization of EĻ„ (u,Ī˜k) at uk (to a constant),

LĻ„ (f ,Ī˜k, uk, u) : =

āˆ«Ī©

uĻ† dx

and

Ļ† = F1(f ,Ī˜k)āˆ’ F2(f ,Ī˜k) + Ī»

āˆšĻ€

Ļ„GĻ„ āˆ— (1āˆ’ 2uk).

10/ 21

Page 11: The iterative convolution-thresholding method (ICTM) for

Contā€™d

I Ļ† is explicitly computed using Ī˜k and uk

I Because u(x) āˆˆ [0, 1], the minimization after linearization can be carried out in apointwise manner by checking whether Ļ†(x) > 0 or not. That is, the minimum can beattained at

uk+1(x) =

1 if Ļ†(x) ā‰¤ 0,0 otherwise.

(1)

I Linearizationā‡’ Accelerating the convergence

11/ 21

Page 12: The iterative convolution-thresholding method (ICTM) for

The iterative convolution-thresholding method (ICTM)

Iterate the following three steps until convergence (no pixel switches from one segment to theother between two iterations)I For the fixed uk , find

Ī˜k = arg minĪ˜āˆˆS

āˆ«Ī©

ukF1(f ,Ī˜) + (1āˆ’ uk)F2(f ,Ī˜) dx.

I Use Ī˜k from Step 1 and evaluate

Ļ†k(x) = F1(f ,Ī˜k)āˆ’ F2(f ,Ī˜k) + Ī»

āˆšĻ€

Ļ„GĻ„ āˆ— (1āˆ’ 2uk).

I Set

uk+1(x) =

1 if Ļ†k(x) ā‰¤ 0,0 otherwise.

Theorem (Stability1)Let (uk,Ī˜k) be the k-th iteration derived in the ICTM. We have

EĻ„ (uk+1,Ī˜k+1) ā‰¤ EĻ„ (uk,Ī˜k)

for any Ļ„ .

1Wang and Wang, 201912/ 21

Page 13: The iterative convolution-thresholding method (ICTM) for

Chanā€“Vese2 model

Ī˜k = (Ck1,C

k2) Fi = |Ci āˆ’ f |2

I For the fixed uk , compute

Ck1 =

āˆ«Ī© ukf dxāˆ«Ī© uk dx

, Ck2 =

āˆ«Ī©(1āˆ’ uk)f dxāˆ«

Ī© 1āˆ’ uk dx,

I Use Ck1 and Ck

2 from Step 1 and evaluate

Ļ†k(x) = F1(f ,Ck1)āˆ’ F2(f ,Ck

2) + Ī»

āˆšĻ€

Ļ„GĻ„ āˆ— (1āˆ’ 2uk).

I Set

uk+1(x) =

1 if Ļ†k(x) ā‰¤ 0,0 otherwise.

2Chan and Vese, IEEE Trans. Image Process., 2001, Vese and Chan, Int. J. Comput. Vis., 200213/ 21

Page 14: The iterative convolution-thresholding method (ICTM) for

Number of iterations: 15. Parameters: (Ļ„, Ī») = (0.02, 0.05).

14/ 21

Page 15: The iterative convolution-thresholding method (ICTM) for

Locally Statistical Active Contour (LSAC) 3 model

Ī˜i = (Ī½i, b(x),Ci) Fi =āˆ«Ī© IĻ(xāˆ’ y)

(log(Ī½i) + |f (x)āˆ’ b(y)Ci|2/2Ī½2

i

)dy

I For the fixed uk , compute

Ck1 =

āˆ«Ī©(IĻ āˆ— bkāˆ’1)fuk dxāˆ«Ī©(IĻ āˆ— bkāˆ’12)uk dx

,

Ck2 =

āˆ«Ī©(IĻ āˆ— bkāˆ’1)f(1 āˆ’ uk) dxāˆ«Ī©(IĻ āˆ— bkāˆ’12)(1 āˆ’ uk) dx

,

Ī½k1 =

āˆšāˆšāˆšāˆšāˆ«Ī©

āˆ«Ī© IĻ(x āˆ’ y)uk(x)(f(x) āˆ’ bkāˆ’1(y)Ck

1)2 dydxāˆ«Ī©

āˆ«Ī© IĻ(x āˆ’ y)uk(y) dydx

,

Ī½k2 =

āˆšāˆšāˆšāˆšāˆ«Ī©

āˆ«Ī© IĻ(x āˆ’ y)(1 āˆ’ uk(x))(f(x) āˆ’ bkāˆ’1(y)Ck

2)2 dydxāˆ«Ī©

āˆ«Ī© IĻ(x āˆ’ y)(1 āˆ’ uk(y)) dydx

,

bk(x) =[Ck

1/(Ī½k1)2]IĻ āˆ— (fuk) + [Ck

2/(Ī½k2)2]IĻ āˆ— (f(1 āˆ’ uk))

[(Ck1/Ī½

k1)2]IĻ āˆ— uk + [(Ck

2/Ī½k2)2]IĻ āˆ— (1 āˆ’ uk)

.

I Use (Ī½ki , b

k(x),Cki ) to evaluate

Ļ†k(x) = F1 āˆ’ F2 + Ī»

āˆšĻ€

Ļ„GĻ„ āˆ— (1āˆ’ 2uk).

I Set

uk+1(x) =

1 if Ļ†k(x) ā‰¤ 0,0 otherwise.

3Zhang et al., IEEE Trans. Cybernetics, 201615/ 21

Page 16: The iterative convolution-thresholding method (ICTM) for

# of iterations of the ICTM 8 7 7 7 7# of iterations of the level-set method [Zhang et al., 2016] 7 13 35 186 239

First row: Initial contour of the same image with different intensity inhomogeneity. Secondrow: The segmented region. Table: Comparison of the number of iterations for each case fromleft to right between the ICTM and the level-set method used in [Zhang et al. 2016]. In all fiveexperiments, we set Ļ = 15, Ī» = 0.1, and Ļ„ = 0.01. 4

I JS index between two regions S1 and S2: JS(S1, S2) = |S1 āˆ© S2|/|S1 āˆŖ S2|, whichdescribes the ratio between the intersection areas of S1 and S2. In the five experiments, wehave JS(S1, S2) = 1, 1, 0.9997, 0.9985, and 0.9985.

4The results for the level-set method are obtained using the software code fromhttps://www4.comp.polyu.edu.hk/Ėœcslzhang/LSACM/LSACM.htm

16/ 21

Page 17: The iterative convolution-thresholding method (ICTM) for

# of iterations of the ICTM 5 30 28 35 18# of iterations of the level-set method [Zhang et al., 2016] 57 219 670 290 230

17/ 21

Page 18: The iterative convolution-thresholding method (ICTM) for

Local Intensity Fitting (LIF)5 model

Ī˜i = Ci(x) Fi(f ,Ī˜1,Ī˜2) = Āµiāˆ«Ī© GĻƒ(xāˆ’ y)|Ci(x)āˆ’ f (y)|2 dx (fixed Āµi)

I For the fixed uk , compute

Ck1(x) =

GĻƒ āˆ— (ukf )GĻƒ āˆ— uk + Īµ

, Ck2(x) =

GĻƒ āˆ— ((1āˆ’ uk)f )GĻƒ āˆ— (1āˆ’ uk) + Īµ

,

(small Īµ for the regularization)I Use Ck

1(x) and Ck2(x) from Step 1 and evaluate

Ļ†k(x) = F1(f ,Ck1(x))āˆ’ F2(f ,Ck

2(x)) + Ī»

āˆšĻ€

Ļ„GĻ„ āˆ— (1āˆ’ 2uk).

I Set

uk+1(x) =

1 if Ļ†k(x) ā‰¤ 0,0 otherwise.

5Li et al., IEEE Trans. Image Process., 200818/ 21

Page 19: The iterative convolution-thresholding method (ICTM) for

# of iterations of the ICTM 15 25 43 28 47# of iterations of the level-set method [Li et al., 2008] - 256 131 117 209

Initial contour and segmented region using the ICTM in the LIF model 6.

6The results for the level-set method are obtained using the software code fromhttp://www.imagecomputing.org/Ėœcmli/code/.

19/ 21

Page 20: The iterative convolution-thresholding method (ICTM) for

The ICTM for n-segment caseUsing n characteristic functions:

ui(x) = Ļ‡Ī©i (x) :=

1 if x āˆˆ Ī©i,

0 otherwise,i āˆˆ [n].

Perimeter:

|āˆ‚Ī©i| ā‰ˆāˆšĻ€

Ļ„

nāˆ‘j=1,j 6=i

āˆ«Ī©

uiGĻ„ āˆ— uj dx.

I For the fixed uk , find

Ī˜k = arg minĪ˜āˆˆS

nāˆ‘i=1

āˆ«Ī©

uiFi(f ,Ī˜)dx.

I For i āˆˆ [n], evaluate

Ļ†ki = Fi(f ,Ī˜k) + 2Ī»

nāˆ‘j=1,j 6=i

āˆšĻ€

Ļ„GĻ„ āˆ— uk

j .

I For i āˆˆ [n], set

uk+1i (x) =

1 if i = minarg min`āˆˆ[n] Ļ†

k`,

0 otherwise.

20/ 21

Page 21: The iterative convolution-thresholding method (ICTM) for

Conclusions

I We proposed a novel iterative convolution-thresholding method (ICTM) that is applicableto a range of models for image segmentation.

I Numerical experiments show that the method is simple, efficient, unconditionally stable,and insensitive to the number of segments.

I The ICTM converges in significant fewer iterations than the level-set method for all theexamples we tested.

Questions?

Email: [email protected] (Dong Wang), [email protected] (Xiao-Ping Wang)

References:I D. Wang and X.-P. Wang, The iterative convolution-thresholding method (ICTM) for

image segmentation, submitted, 2020.I D. Wang, H. Li, X. Wei, and X.-P. Wang, An efficient iterative thresholding method for

image segmentation, J. Comput. Phys., vol. 350, pp. 657ā€“667, 2017.

21/ 21