Upload
others
View
13
Download
0
Embed Size (px)
Citation preview
The iterative convolution-thresholding method (ICTM) for imagesegmentation
Dong Wang (University of Utah)Xiao-Ping Wang (HKUST)
1/ 21
Introduction
I Image: f : Ī©ā [0, 1]d
I Ī© : domain of image (discrete pixels)I d : number of channels (e.g., gray image: d = 1, color image: d = 3.)
I Image segmentation: the process of partitioning a digital image into multiple segmentsm
find the optimal partition in the sense of minimizing a objective functional
2/ 21
Objective functionals
Intuitively, the optimal partition should obey:I In each segment, the feature should be āalmost constantā or has no ābigā jumps. The
partition should be consistent with the image itself.I The boundary of the partition should be ārelatively smoothā (try to ignore some noise from
in the image).
Mathematically, in the objective function, we should haveI A quantity to measure the consistency of the image in each segment (Fidelity term)I A quantity to measure the smoothness of the boundary of each segment (Regularization
term)
Generally, for the n-segment (Ī©1,Ī©2, Ā· Ā· Ā· ,Ī©n) case, we write the general objective functionalinto
E =nā
i=1
ā«Ī©i
Fi(f ,Ī1, . . . ,Īn) dx +nā
i=1
Ī»i|āĪ©i|
I Fi: choice of Fi depends on the features of the image or the types of imageI Īi: possible parameters or functions needed to describe Fi
I Ī»i: constant parametersI |āĪ©i|: the perimeter of the segment Ī©i
3/ 21
Example
In each segment, require the feature of the image is close to a constant
āFi(f ,Ci) = |Ci ā f |2 (Ci: average of f in the segment Ī©i)
āObjective functional
E(Ī©1, . . . ,Ī©n,C1, . . . ,Cn) =ān
i=1ā«Ī©i|Ci ā f |2 dx + Ī»i
āni=1 |āĪ©i| (ChanāVese Model)
[Chan and Vese, IEEE Trans. Image Process., 2001, Vese and Chan, Int. J. Comput. Vis., 2002]
4/ 21
Representing the partition and expressing the objective functionalExisting numerical method:I Prime dual, split Bregmann, framelets, K-means clustering, Ā· Ā· Ā·I Phase-field based methodI Level set method
Level set methodThe discrete image is interpreted as a function defined on a continuous domain.
āThe boundary of the segment is represented as the levelset of an auxiliary function Ļ.
āEvery term in the objective function can be expressed using Ļ and the Heaviside function of Ļ.
āVariation w.r.t Ļ gives a partial differential equation (PDE)
āSolving the PDE to evolve the initial guess to the final result to get the segmentation
Benefits: Very easy to adapt to arbitrary modelsDisadvantages:I Solving complicated PDEsI Reinitialization (or another technique) is needed for the auxiliary function ĻI Small artificial time step for the stability reason (converges slow)I Sensitive to numbers of segments
5/ 21
Using characteristic functions (2-segment case)I The first segment Ī©1 is denoted by its characteristic function u(x), i.e.,
u(x) :=
1 if x ā Ī©1,
0 otherwise.
I the characteristic function of the second segment Ī©c1 is 1ā u(x).
I the interface between two segments is now implicitly represented by u(x).
I The first term in the objective functionā«Ī©1
F1 dx +ā«Ī©2
F2 dx =ā«Ī© uF1 + (1ā u)F2 dx
I The perimeter term [Miranda et al., Annales de la faculte des sciences de ToulouseMathematiques, 2007]
|āĪ©1| āāĻ
Ļ
ā«Ī©
uGĻ ā (1ā u) dx
6/ 21
Approximation of the objective functional
E ā EĻ (u,Ī): = Ef (u,Ī) + EĻr (u,Ī)
I Ef (u,Ī) =ā«Ī© uF1(f ,Ī) + (1ā u)F2(f ,Ī) dx
I EĻr (u,Ī) = Ī»āĻĻ
ā«Ī© uGĻ ā (1ā u) dx
Target: Find uĻ,? such that
(uĻ,?,ĪĻ,?) = arg minuāB,ĪāS
EĻ (u,Ī)
where B : = u ā BV(Ī©,R) | u = 0, 1, S is the admissible set of Ī, and BV(Ī©,R)denotes the bounded-variation functional space.
7/ 21
Derivation of the method
Starting from an initial guess: u0, we find the minimizers iteratively in the following order:
Ī0, u1,Ī1, . . . , uk,Īk, . . . .
Assuming that uk is calculated, we fix uk and find the minimizer of EĻ (uk,Ī) to obtain Īk:
part 1 : Īk = arg minĪāS
EĻ (uk,Ī)
and fix Īk to obtain uk+1:
part 2 : uk+1 = arg minuāBEĻ (u,Īk).
8/ 21
part1
Because EĻr is independent of Ī, one only needs to find the global minimizers of Ef withrespect to Ī to obtain Īk:
Īk = arg minĪāS
ā«Ī©
ukF1(f ,Ī) + (1ā uk)F2(f ,Ī) dx
Since most of these models use strictly convex fidelity terms, each element Īi,j(i = 1, 2, j ā [m]) in Īk can be obtained via solving the following system of equations:
āEf
āĪ1,1= 0, . . . ,
āEf
āĪ1,m= 0,
āEf
āĪ2,1= 0, . . . ,
āEf
āĪ2,m= 0.
Above system can be approximately solved using the GaussāSeidel strategy.I This step gives an optimal choice of Ī for the fixed uk!!!
9/ 21
part2I EĻ (u,Īk) : concave and quadratic.I The set B : = u ā BV(Ī©,R) | u = 0, 1 contains the boundary points of the
following convex set K:
K =u ā BV(Ī©,R) | u ā [0, 1]
(K is the convex hull of B).I The minimizer of a concave functional on a convex set can only be attained at the
boundary points of the convex set.I Relaxation:
uk+1 = arg minuāKEĻ (u,Īk)ā uk+1 = arg min
uāBEĻ (u,Īk)
I Linearization:
uk+1 = arg minuāKLĻ (f ,Īk, uk, u)
where LĻ (f ,Īk, uk, u) is the linearization of EĻ (u,Īk) at uk (to a constant),
LĻ (f ,Īk, uk, u) : =
ā«Ī©
uĻ dx
and
Ļ = F1(f ,Īk)ā F2(f ,Īk) + Ī»
āĻ
ĻGĻ ā (1ā 2uk).
10/ 21
Contād
I Ļ is explicitly computed using Īk and uk
I Because u(x) ā [0, 1], the minimization after linearization can be carried out in apointwise manner by checking whether Ļ(x) > 0 or not. That is, the minimum can beattained at
uk+1(x) =
1 if Ļ(x) ā¤ 0,0 otherwise.
(1)
I Linearizationā Accelerating the convergence
11/ 21
The iterative convolution-thresholding method (ICTM)
Iterate the following three steps until convergence (no pixel switches from one segment to theother between two iterations)I For the fixed uk , find
Īk = arg minĪāS
ā«Ī©
ukF1(f ,Ī) + (1ā uk)F2(f ,Ī) dx.
I Use Īk from Step 1 and evaluate
Ļk(x) = F1(f ,Īk)ā F2(f ,Īk) + Ī»
āĻ
ĻGĻ ā (1ā 2uk).
I Set
uk+1(x) =
1 if Ļk(x) ā¤ 0,0 otherwise.
Theorem (Stability1)Let (uk,Īk) be the k-th iteration derived in the ICTM. We have
EĻ (uk+1,Īk+1) ā¤ EĻ (uk,Īk)
for any Ļ .
1Wang and Wang, 201912/ 21
ChanāVese2 model
Īk = (Ck1,C
k2) Fi = |Ci ā f |2
I For the fixed uk , compute
Ck1 =
ā«Ī© ukf dxā«Ī© uk dx
, Ck2 =
ā«Ī©(1ā uk)f dxā«
Ī© 1ā uk dx,
I Use Ck1 and Ck
2 from Step 1 and evaluate
Ļk(x) = F1(f ,Ck1)ā F2(f ,Ck
2) + Ī»
āĻ
ĻGĻ ā (1ā 2uk).
I Set
uk+1(x) =
1 if Ļk(x) ā¤ 0,0 otherwise.
2Chan and Vese, IEEE Trans. Image Process., 2001, Vese and Chan, Int. J. Comput. Vis., 200213/ 21
Number of iterations: 15. Parameters: (Ļ, Ī») = (0.02, 0.05).
14/ 21
Locally Statistical Active Contour (LSAC) 3 model
Īi = (Ī½i, b(x),Ci) Fi =ā«Ī© IĻ(xā y)
(log(Ī½i) + |f (x)ā b(y)Ci|2/2Ī½2
i
)dy
I For the fixed uk , compute
Ck1 =
ā«Ī©(IĻ ā bkā1)fuk dxā«Ī©(IĻ ā bkā12)uk dx
,
Ck2 =
ā«Ī©(IĻ ā bkā1)f(1 ā uk) dxā«Ī©(IĻ ā bkā12)(1 ā uk) dx
,
Ī½k1 =
āāāāā«Ī©
ā«Ī© IĻ(x ā y)uk(x)(f(x) ā bkā1(y)Ck
1)2 dydxā«Ī©
ā«Ī© IĻ(x ā y)uk(y) dydx
,
Ī½k2 =
āāāāā«Ī©
ā«Ī© IĻ(x ā y)(1 ā uk(x))(f(x) ā bkā1(y)Ck
2)2 dydxā«Ī©
ā«Ī© IĻ(x ā y)(1 ā uk(y)) dydx
,
bk(x) =[Ck
1/(Ī½k1)2]IĻ ā (fuk) + [Ck
2/(Ī½k2)2]IĻ ā (f(1 ā uk))
[(Ck1/Ī½
k1)2]IĻ ā uk + [(Ck
2/Ī½k2)2]IĻ ā (1 ā uk)
.
I Use (Ī½ki , b
k(x),Cki ) to evaluate
Ļk(x) = F1 ā F2 + Ī»
āĻ
ĻGĻ ā (1ā 2uk).
I Set
uk+1(x) =
1 if Ļk(x) ā¤ 0,0 otherwise.
3Zhang et al., IEEE Trans. Cybernetics, 201615/ 21
# of iterations of the ICTM 8 7 7 7 7# of iterations of the level-set method [Zhang et al., 2016] 7 13 35 186 239
First row: Initial contour of the same image with different intensity inhomogeneity. Secondrow: The segmented region. Table: Comparison of the number of iterations for each case fromleft to right between the ICTM and the level-set method used in [Zhang et al. 2016]. In all fiveexperiments, we set Ļ = 15, Ī» = 0.1, and Ļ = 0.01. 4
I JS index between two regions S1 and S2: JS(S1, S2) = |S1 ā© S2|/|S1 āŖ S2|, whichdescribes the ratio between the intersection areas of S1 and S2. In the five experiments, wehave JS(S1, S2) = 1, 1, 0.9997, 0.9985, and 0.9985.
4The results for the level-set method are obtained using the software code fromhttps://www4.comp.polyu.edu.hk/Ėcslzhang/LSACM/LSACM.htm
16/ 21
# of iterations of the ICTM 5 30 28 35 18# of iterations of the level-set method [Zhang et al., 2016] 57 219 670 290 230
17/ 21
Local Intensity Fitting (LIF)5 model
Īi = Ci(x) Fi(f ,Ī1,Ī2) = Āµiā«Ī© GĻ(xā y)|Ci(x)ā f (y)|2 dx (fixed Āµi)
I For the fixed uk , compute
Ck1(x) =
GĻ ā (ukf )GĻ ā uk + Īµ
, Ck2(x) =
GĻ ā ((1ā uk)f )GĻ ā (1ā uk) + Īµ
,
(small Īµ for the regularization)I Use Ck
1(x) and Ck2(x) from Step 1 and evaluate
Ļk(x) = F1(f ,Ck1(x))ā F2(f ,Ck
2(x)) + Ī»
āĻ
ĻGĻ ā (1ā 2uk).
I Set
uk+1(x) =
1 if Ļk(x) ā¤ 0,0 otherwise.
5Li et al., IEEE Trans. Image Process., 200818/ 21
# of iterations of the ICTM 15 25 43 28 47# of iterations of the level-set method [Li et al., 2008] - 256 131 117 209
Initial contour and segmented region using the ICTM in the LIF model 6.
6The results for the level-set method are obtained using the software code fromhttp://www.imagecomputing.org/Ėcmli/code/.
19/ 21
The ICTM for n-segment caseUsing n characteristic functions:
ui(x) = ĻĪ©i (x) :=
1 if x ā Ī©i,
0 otherwise,i ā [n].
Perimeter:
|āĪ©i| āāĻ
Ļ
nāj=1,j 6=i
ā«Ī©
uiGĻ ā uj dx.
I For the fixed uk , find
Īk = arg minĪāS
nāi=1
ā«Ī©
uiFi(f ,Ī)dx.
I For i ā [n], evaluate
Ļki = Fi(f ,Īk) + 2Ī»
nāj=1,j 6=i
āĻ
ĻGĻ ā uk
j .
I For i ā [n], set
uk+1i (x) =
1 if i = minarg min`ā[n] Ļ
k`,
0 otherwise.
20/ 21
Conclusions
I We proposed a novel iterative convolution-thresholding method (ICTM) that is applicableto a range of models for image segmentation.
I Numerical experiments show that the method is simple, efficient, unconditionally stable,and insensitive to the number of segments.
I The ICTM converges in significant fewer iterations than the level-set method for all theexamples we tested.
Questions?
Email: [email protected] (Dong Wang), [email protected] (Xiao-Ping Wang)
References:I D. Wang and X.-P. Wang, The iterative convolution-thresholding method (ICTM) for
image segmentation, submitted, 2020.I D. Wang, H. Li, X. Wei, and X.-P. Wang, An efficient iterative thresholding method for
image segmentation, J. Comput. Phys., vol. 350, pp. 657ā667, 2017.
21/ 21