Startseite The game model with multi-task for image denoising and edge extraction
Artikel
Lizenziert
Nicht lizenziert Erfordert eine Authentifizierung

The game model with multi-task for image denoising and edge extraction

  • Wenyang Wei ORCID logo , Xiangchu Feng EMAIL logo und Bingzhe Wei
Veröffentlicht/Copyright: 1. Juni 2023

Abstract

Image denoising and edge extraction are two main tasks in image processing. In this paper, a game model is proposed to solve the image denoising and edge extraction, which combines an adaptive improved total variation (AdITV) model for image denoising and a global sparse gradient (GSG) model for edge extraction. The AdITV model is a forward-and-backward diffusion model. In fact, forward diffusion is applied to the homogeneous region to denoise, and backward diffusion is applied to the edge region to enhance the edge. A unified explicit discrete scheme is established in this paper to solve the AdITV model, which is compatible to forward diffusion and backward diffusion. The stability of the scheme is proved. On the other hand, GSG is a functional model based on sparse representation, which is robust to extract edges under the influence of noise. AdITV and GSG are chosen as two components of the game model. The alternate iteration method is used to solve the game problem. The convergence of the algorithm is proved and numerical experiments show the effectiveness of the model.

MSC 2020: 94A08; 65M12; 35A15

Award Identifier / Grant number: 61772389

Funding statement: The authors would like to thank the National Natural Science Foundation of China (Grant 61772389) for supporting this research work.

A Proof of Theorem 3.1

Proof of Theorem 3.1.

When n = 0 , then

u i , j 1 = α 1 u i , j 0 + α 2 u i + 1 , j 0 + α 3 u i - 1 , j 0 + α 4 u i , j + 1 0 + α 5 u i , j - 1 0 + α 6 f i , j
= α 1 u i , j 0 + α 2 u i + 1 , j 0 + α 3 u i - 1 , j 0 + α 4 u i , j + 1 0 + α 5 u i , j - 1 0 + α 6 u i , j 0 .

Let min 0 = inf { u i , j 0 } and max 0 = sup { u i , j 0 } . Then

min 0 = i = 1 6 α i min 0
α 1 u i , j 0 + α 2 u i + 1 , j 0 + α 3 u i - 1 , j 0 + α 4 u i , j + 1 0 + α 5 u i , j - 1 0 + α 6 u i , j 0
i = 1 6 α i max 0 = max 0 .

Thus min 0 u i , j 1 max 0 , i.e.

min 0 min 1 max 1 max 0 .

This is the same as n = k , so

min 0 min k max k max 0 .

Thus this scheme satisfies the maximum-minimum principle.

On the other hand, if

α 1 + α 6 < 0 , u i , j 0 = min 0 , u i + 1 , j 0 = u i - 1 , j 0 = u i , j + 1 0 = u i , j - 1 0 = max 0 ,

then

( T u ) i , j = i = 2 i 1 , 6 5 α i max 0 + ( α 1 + α 6 ) min 0
= ( 1 - α 1 - α 6 ) max 0 + ( α 1 + α 6 ) min 0
= max 0 + ( α 1 + α 6 ) ( min 0 - max 0 ) > max 0 .

It is inconsistent with stability. The maximum-minimum principle is not satisfied. ∎

B Proofs of Theorems 3.2 and 3.3

Proof of Theorem 3.2. The denoiser D ~ is bounded.

We have

D ~ ( u n , β n ) - u n 2 N = u n + Δ t n [ A u n + β n ( f - u n ) ] - u n 2 N
= Δ t n ( A u n + β n ( f - u n ) ) 2 N .

By the proof of Theorem 3.1, u n satisfies the maximum-minimum principle. Therefore, u n is bounded, A is a bounded nonlinear diffusion operator, and γ n is a scaling factor so that β n is bounded. Therefore, there exists a constant M n such that A u n + β n ( f - u n ) M n . Thus,

Δ t n ( A u n + β n ( f - u n ) ) 2 N Z ρ n .

This concludes the proof. ∎

Proof of Theorem 3.3. The GSG model has bounded gradient.

We define

p * = arg min p GSG ( p , u ) .

Then

α p * 1 = α Ω | p * ( x ) | 𝑑 x
GSG ( p * , u )
GSG ( 0 , u )
= 1 | Ω | Ω × Ω ω x y s ( u ( x ) - u ( y ) ) 2 𝑑 y 𝑑 x = Δ M ~ < .

From the equivalence property theory of the norm, we have p * 2 M . Therefore,

p * = arg min p GSG ( p , u ) = arg min p 2 M GSG ( p , u ) ,

and thus p 2 M .

In Section 3.3, the GSG model, we have defined F ( p ) and G ( p ) . Next, we will prove that both F ( p ) and G ( p ) are gradient bounded. According to the Gateaux derivative,

F ( p ) = 2 | Ω | Ω ω x y s ( u ( x ) - u ( y ) + p ( x ) ( y - x ) ) ( y - x ) T 𝑑 y and G ( p ) = p | p ν | ,

where υ is a small constant in order to prevent

| p | = p 1 2 + p 2 2

approaching zero.

Then

F ( p ) 2 = Ω 2 | Ω | Ω ω x y s ( u ( x ) - u ( y ) + p ( x ) ( y - x ) ) ( y - x ) T 𝑑 y 2 𝑑 x .

Since Ω is a bounded closed set and p 2 M , there exists L 21 < such that F ( p ) 2 L 21 . Similarly,

G ( p ) 2 = Ω p | p ν | 2 𝑑 x .

Since Ω is a bounded closed set and

p | p υ | 1 ,

there exists L 22 < such that G ( p ) 2 L 22 .

Thus,

GSG ( p , u ) 2 F ( p ) 2 + G ( p ) 2 L 21 + L 22 .

Then

GSG ( p , u ) 2 L 21 + L 22 = Δ L 2 .

C Proof of Theorem 3.4

Proof of Theorem 3.4.

Let

D ( θ k , θ j ) = 1 N ( u k - u j 2 + p k - p j 2 ) .

Then

Δ k + 1 = ( u k + 1 - u k 2 N + p k + 1 - p k 2 N ) = D ( θ k + 1 , θ k ) .

Further, ρ n + 1 varies according to two different cases of ρ n + 1 :

  1. Case 1: If Δ n + 1 > η Δ n , then ρ n + 1 = r ρ n .

  2. Case 2: If Δ n + 1 η Δ n , then Δ n + 1 η Δ n , where Δ n + 1 η Δ n .

At iteration k, if case 1 holds, by Lemma 3.5, then

D ( θ k + 1 , θ k ) C ρ k .

On the other hand, if case 2 holds, then

D ( θ k + 1 , θ k ) C ρ k .

As k , one of the following situations will happen:

  1. Case 1 occurs infinitely many times but case 2 occurs finitely many times.

  2. Case 1 occurs finitely many times but case 2 occurs infinitely many times.

  3. Both case 1 and case 2 occur infinitely many times.

When (i) happens, there must exist a K 1 such that for k K 1 only case 1 happens. Therefore,

D ( θ k + 1 , θ k ) C ρ K 1 - 1 γ k - K 1 .

When (ii) happens, there must exist a K 2 such that for k K 2 only case 2 happens. Thus,

D ( θ k + 1 , θ k ) η k - K 2 D ( θ K 2 , θ K 2 - 1 ) η k - K 2 C ρ K 2 - 1 .

(iii) is a union of (i) and (ii). Therefore, as long as we can see that under (i) and (ii) the sequence { θ k } k = 1 converges, the sequence will also converge under (iii). By Lemma C.1, for any k, we have D ( θ k + 1 , θ k ) C ′′ δ k , where k is constant and 0 < δ < 1 . Therefore, D ( θ k + 1 , θ k ) 0 as k .

In order to verify that { θ k } k = 1 is a Cauchy sequence, we need to prove D ( θ m , θ k ) 0 , where m > k and k :

D ( θ m , θ k ) n = k + 1 m C ′′ δ n l = 1 m - k C ′′ δ l + k = C ′′ δ k 1 - δ m - k + 1 1 - δ .

Thus, D ( θ m , θ k ) 0 as k . Then { θ k } k = 1 is a Cauchy sequence. Therefore, there exists θ * = ( u * , p * ) such that D ( θ k , θ * ) 0 .

Consequently, we have

u k - u * 2 0 , p k - p * 2 0    as  k .

Lemma C.1.

The sequence { θ k } k = 1 always satisfies { θ k } k = 1 for constant C ′′ and 0 < δ < 1 .

Proof.

At iteration k, it holds that

D ( θ k + 1 , θ k ) max ( C ρ K 1 - 1 γ k - K 1 , η k - K 2 C ρ K 2 - 1 ) max ( C 1 ( 1 γ ) k , C 2 η k ) ,
C 1 = C γ K 1 ρ K 1 - 1 ,
C 2 = C η - K 2 ρ K 2 - 1 .

Let

C ′′ = max ( C 1 , C 2 ) and δ = max ( 1 γ , η ) .

Then

D ( θ k + 1 , θ k ) C ′′ δ k .

References

[1] A. J. Abrantes and J. S. Marques, A class of constrained clustering algorithms for object boundary extraction, IEEE Trans. Image Process. 5 (1996), no. 11, 1507–1521. 10.1109/83.541421Suche in Google Scholar PubMed

[2] K. Bredies, K. Kunisch and T. Pock, Total generalized variation, SIAM J. Imaging Sci. 3 (2010), no. 3, 492–526. 10.1137/090769521Suche in Google Scholar

[3] J. Canny, A computational approach to edge detection, IEEE Trans. Pattern Anal. Mach. Intell. 8 (1986), no. 6, 679–698. 10.1109/TPAMI.1986.4767851Suche in Google Scholar

[4] Y. Cha and S. Kim, Edge-forming methods for image zooming, J. Math. Imaging Vision 25 (2006), no. 3, 353–364. 10.1007/s10851-006-7250-2Suche in Google Scholar

[5] S. H. Chan, X. Wang and O. A. Elgendy, Plug-and-play ADMM for image restoration: Fixed-point convergence and applications, IEEE Trans. Comput. Imaging 3 (2017), no. 1, 84–98. 10.1109/TCI.2016.2629286Suche in Google Scholar

[6] T. Chan, S. Esedoglu, F. Park and A. Yip, Total variation image restoration: Overview and recent developments, Handbook of Mathematical Models in Computer Vision, Springer, Boston (2006), 17–31. 10.1007/0-387-28831-7_2Suche in Google Scholar

[7] S. M. Chao and D. M. Tsai, An improved anisotropic diffusion model for detail and edge-preserving smoothing, Pattern Recognit. Lett. 31 (2010), no. 13, 2012–2023. 10.1016/j.patrec.2010.06.004Suche in Google Scholar

[8] Y. Chen and K. J. R. Liu, A game theoretical approach for image denoising, 2010 IEEE International Conference on Image Processing, IEEE Press, Piscataway (2010), 1125–1128. 10.1109/ICIP.2010.5649473Suche in Google Scholar

[9] Y. Chen, B. Wang, W. S. Lin, Y. Wu and K. J. Ray Liu, Cooperative peer-to-peer streaming: An evolutionary game-theoretic approach, IEEE Trans. Circuits Syst. Video Technol. 20 (2010), no. 10, 1346–1357. 10.1109/TCSVT.2010.2077490Suche in Google Scholar

[10] P. L. Combettes and V. R. Wajs, Signal recovery by proximal forward-backward splitting, Multiscale Model. Simul. 4 (2005), no. 4, 1168–1200. 10.1137/050626090Suche in Google Scholar

[11] K. Dabov, A. Foi, V. Katkovnik and K. Egiazarian, Image denoising by sparse 3-D transform-domain collaborative filtering, IEEE Trans. Image Process. 16 (2007), no. 8, 2080–2095. 10.1109/TIP.2007.901238Suche in Google Scholar PubMed

[12] S. Gang, Y. Chen, X. Liu and E. wu, Adaptive multi-task learning for fine-grained categorization, 2015 IEEE International Conference on Image Processing (ICIP), IEEE Press, Piscataway (2015), 96–1000. Suche in Google Scholar

[13] G. Gilboa, N. A. Sochen and Y. Y. Zeevi, Forward-and-backward diffusion processes for adaptive image enhancement and denoising, IEEE Trans. Image Process. 11 (2002), no. 7, 689–703. 10.1109/TIP.2002.800883Suche in Google Scholar PubMed

[14] C. Guillemot and O. Le Meur, Image inpainting: Overview and recent advances, IEEE Signal Process. Mag. 31 (2013), no. 1, 127–144. 10.1109/MSP.2013.2273004Suche in Google Scholar

[15] M. Kallel, R. Aboulaich, A. Habbal and M. Moakher, A Nash-game approach to joint image restoration and segmentation, Appl. Math. Model. 38 (2014), no. 11–12, 3038–3053. 10.1016/j.apm.2013.11.034Suche in Google Scholar

[16] S. Kim, PDE-based image restoration: A hybrid model and color image denoising, IEEE Trans. Image Process. 5 (2006), no. 5, 1163–1170. 10.1109/TIP.2005.864184Suche in Google Scholar

[17] S. Kim and H. Lim, A non-convex diffusion model for simultaneous image denoising and edge enhancement, Electron. J. Differential Equations 15 (2007), 175–192. Suche in Google Scholar

[18] A. Marquina and S. Osher, Explicit algorithms for a new time dependent model based on level set motion for nonlinear deblurring and noise removal, SIAM J. Sci. Comput. 22 (2000), no. 2, 387–405. 10.1137/S1064827599351751Suche in Google Scholar

[19] F. Natterer and F. Wübbeling, Mathematical Methods in Image Reconstruction, Society for Industrial and Applied Mathematics, Philadelphia, 2001. 10.1137/1.9780898718324Suche in Google Scholar

[20] P. Perona and J. Malik, Scale-space and edge detection using anisotropic diffusion, IEEE Trans. Pattern Anal. Mach. Intell. 12 (1990), no. 7, 629–639. 10.1109/34.56205Suche in Google Scholar

[21] D. L. Pham, C. Xu and J. L. Prince, Current methods in medical image segmentation, Ann. Rev. Biomed. Eng. 2 (2000), no. 1, 315–337. 10.1146/annurev.bioeng.2.1.315Suche in Google Scholar PubMed

[22] I. Pollak, A. S. Willsky and H. Krim, Image segmentation and edge enhancement with stabilized inverse diffusion equations, IEEE Trans. Image Process. 9 (2000), no. 2, 256–266. 10.1109/83.821738Suche in Google Scholar PubMed

[23] J. M. S. Prewitt, Object enhancement and extraction, Picture Processing and Psychopictorics, Academic Press, New York (1970), 75–149. Suche in Google Scholar

[24] H. Raguet, J. Fadili and G. Peyré, A generalized forward-backward splitting, SIAM J. Imaging Sci. 6 (2013), no. 3, 1199–1226. 10.1137/120872802Suche in Google Scholar

[25] L. Roberts, Machine Perception of Three-Dimensional Solids, Garland Publishing, New York, 1963. Suche in Google Scholar

[26] L. Rudin, S. Osher and E. Fatemi, Nonlinear total variation based noise removal algorithm, Phys. D 50 (1992), 259–268. 10.1016/0167-2789(92)90242-FSuche in Google Scholar

[27] V. B. Surya Prasath, J. M. Urbano and D. Vorotnikov, Analysis of adaptive forward-backward diffusion flows with applications in image processing, Inverse Problems 31 (2015), no. 10, Article ID 105008. 10.1088/0266-5611/31/10/105008Suche in Google Scholar

[28] J. Weickert, Anisotropic Diffusion in Image Processing, B. G. Teubner, Stuttgart, 1998. Suche in Google Scholar

[29] M. Welk, G. Gilboa and J. Weickert, Theoretical foundations for discrete forward-and-backward diffusion filtering, Scale Space and Variational Methods in Computer Vision, Lecture Notes in Comput. Sci. 5567, Springer, Berlin (2009), 527–538. 10.1007/978-3-642-02256-2_44Suche in Google Scholar

[30] M. Welk, J. Weickert and G. Gilboa, A discrete theory and efficient algorithms for forward-and-backward diffusion filtering, J. Math. Imaging Vision 60 (2018), no. 9, 1399–1426. 10.1007/s10851-018-0847-4Suche in Google Scholar

[31] K. Zhang, W. Zuo, Y. Chen, D. Meng and L. Zhang, Beyond a Gaussian denoiser: residual learning of deep CNN for image denoising, IEEE Trans. Image Process. 26 (2017), no. 7, 3142–3155. 10.1109/TIP.2017.2662206Suche in Google Scholar PubMed

[32] R. Zhang, X. Feng and L. Yang, Global sparse gradient guided variational Retinex model for image enhancement, Singal Proc. Image Comm. 58 (2017), 270–281. 10.1016/j.image.2017.08.008Suche in Google Scholar

[33] Z. Zhang, B. Chen, D. Xia, E. Y. Sidky and X. Pan, Directional-tv algorithm for image reconstruction from limited-angular-range data, preprint (2021), https://arxiv.org/abs/2103.01192. 10.1016/j.media.2021.102030Suche in Google Scholar PubMed PubMed Central

Received: 2022-01-26
Accepted: 2023-03-16
Published Online: 2023-06-01
Published in Print: 2024-06-01

© 2023 Walter de Gruyter GmbH, Berlin/Boston

Heruntergeladen am 25.9.2025 von https://www.degruyterbrill.com/document/doi/10.1515/jiip-2022-0051/html
Button zum nach oben scrollen