Title: Unsupervised Linear Unmixing
1- Unsupervised Linear Unmixing
- for Hyperspectral Data Exploitation
- Mingkai Hsueh
- Remote Sensing Signal and Image Processing
Laboratory - Department of Computer Science and Electrical
Engineering - University of Maryland Baltimore County
- 1000 Hilltop Circle, Baltimore, MD 21250
2Outline
- Introduction to Hyperspectral Image Processing
and its Applications - Endmember Extraction
- Pixel Purity Index Algorithm (PPI)
- Block of Skewers (BOS) based PPI
- Anomaly Detection
- Anomaly Detection Algorithms and its real-time
implementation - Speed-up of Adaptive Causal Anomaly Detection
- Conclusions
3Hyperspectral Image
Mixed pixel (soil mineral)
Water
Mixed pixel (trees soil)
4Applications of Hyperspectral Image Processing
- Applications
- Man-made objects canvas, camouflage,
military vehicles in defense applications - Toxic waste, oil spills in environmental
monitoring - Landmines
- Trafficking in law enforcement
- Chemical/biological agent detection
- Special species in agriculture, ecology
5Types of Signatures
- Endmembers
- Pure signatures for a spectral class used for
spectral unmixing - Anomalies
- Signals/signatures spectrally distinct from
- their surroundings, i.e., abnormality.
- rare minerals in geology
- abnormal activities in military applications.
6- Part I
- Endmember Extraction
7Endmember Extraction
- An endmember pixel is defined as a pixel with
idealized, pure spectral signature for a class.
8Pixel Purity Index (PPI)
- The idea of PPI was first proposed by Boardman
and has been one of most popular endmember
extraction algorithms (EEAs) due to its publicity
and availability in ENVI software. - For the PPI to work effectively, a large number
of dot products between skewers (random vectors)
and data sample vectors are required.
9PPI Algorithm
NPPI(e2)0
NPPI(e2)1
e2
Maximum Projection
skewer2
Maximum Projection
skewer3
skewer1
Minimum Projection
e3
NPPI(e3)0
NPPI(e3)1
NPPI(e3)3
NPPI(e3)2
e1
Minimum Projection
NPPI(e1)0
NPPI(e1)2
NPPI(e1)1
Minimum Projection
10Block of Skewer An Example
- Given K1 K2 are skewers, K3 K6 are linear
combinations of K1 K2 and r is a pixel vector
from hyperspectral image cube.
K3 K1 K2
K4 K1 K2
K5 K1 K2
K6 K1 K2
- In stead of generating more skewers for
projection, we perform linear combination between
the projection results of the generated skewers.
11C-BOS
Dskewer a1Iskewer1 a2Iskewer2 a3Iskewer3
- Ideally, a1, a2 and a3 can be any real numbers.
However, given limited hardware resource,
fixed-point implementation are usually preferred. - Here we constrain the coefficients to 1 or -1 to
form 8 combinations as a cube shown on the left.
(1, -1, 1)
(-1, -1, 1)
(-1, 1, 1)
(1, 1, 1)
z
(0, 0, 0)
x
y
(1, -1, -1)
(-1, -1, -1)
(-1, 1, -1)
(1, 1, -1)
12P-BOS
(0, 1, 0)
(1, 0, 0)
(0, 0, -1)
(0, 0, 1)
(-1, 0, 0)
(0, -1, 0)
13Skewer Redundancy
- In the previous example, there exist redundancy
among skewers.
K3 K1 K2
K6 K1 K2
K4 K1 K2
K5 K1 K2
- Same thing happens to the C-BOS.
D1 I1 I2 I3
D5 I1 I2 I3
D2 I1 I2 I3
D6 I1 I2 I3
D3 I1 I2 I3
D7 I1 I2 I3
D4 I1 I2 I3
D8 I1 I2 I3
14S-BOS
- Decompose cube into 6 squares
(1, -1, 1)
(-1, -1, 1)
(1, -1, 1)
(1, 1, 1)
(1, -1, 1)
(-1, -1, 1)
Right
Back
Top
(-1, 1, 1)
(1, 1, 1)
(1, 1, -1)
(1, -1, -1)
(1, -1, -1)
(-1, -1, -1)
(-1, 1, 1)
(1, 1, 1)
(1, -1, -1)
(-1, -1, -1)
(-1, 1, 1)
(-1, -1, 1)
Front
Bottom
Left
(-1, 1, -1)
(1, 1, -1)
(-1, 1, -1)
(1, 1, -1)
(-1, 1, -1)
(-1, -1, -1)
15T-BOS
- A tetrahedron shape can be considered as half of
a pyramid. - A cube can be shifted so that coordinates of 8
vertices are holding values 0 or 1.
z
(1, 0, 1)
(0, 0, 1)
(0, 1, 1)
(1, 1, 1)
(1, 0, 0)
(0, 0, 0)
x
(0, 1, 0)
(1, 1, 0)
y
16HYDICE Data
- HYDICE (Hyperspectral Digital Imagery Collection
Experiment) - 15 panels of five types with three different
materials. - They are arranged into a matrix in such a way
that each row represents 3 panels of the same
type with three different sizes, 3m?3m, 2m?2m,
1m?1m. Each column represents 5 panels of
different types with the same size.
Anomaly
Original image
Target masked image
17Experiments with Real Image (Contd)
- Experimental results of HYDICE real image
(a) C-BOS
(b) S-BOS
(c) P-BOS
(d) T-BOS
18BOS based PPIHardware module
- A large amount of independent dot products make
it particularly suitable for FPGA implementation
due to the readily parallel design architecture.
Dot product module
MINMAX
MINMAX
Dskewer Generator
. . .
. . .
MINMAX
19Dot-Product Module
2nd pixel vector
1st band
2nd band
3rd band
4th band
1st pixel vector
1st band
2nd band
3rd band
4th band
Iskewer 1
Dskewer Generator
PE unit
PE
PE
PE
Iskewer 2
PE unit
PE
PE
PE
Iskewer 3
PE unit
PE
PE
PE
20S-BOS Dskewer Generators
P1
P1
P2
P2
P3
P3
P1 P2 P3
P1 P2 P3
P1 P2 P3
P1 P2 P3
21FPGA Implementation
- Four different Dskewer generators are implemented
in XESS XSB-300E board which carries a Spartan II
E (XC2S300E) FPGA.
22Computational Complexity
- The computational complexity is calculated based
on the number of multiplications and additions
performed with different BOS design. - K is the total number of skewers, L is the number
of spectral bands and N is the total number of
pixel vectors.
23- Part II
- Anomaly Detection
24RX Algorithm
- RX algorithm basically performs the Mahalanobis
distance that is specified by - (ri-?)T (K)-1 (ri -?)
- The required mean vector µ hinder the possibility
of implementing the algorithm in real-time
fashion.
25Causal RX Filter (CRXF)
- By replacing the covariance matrix by correlation
matrix, we can achieve the real-time processing. - The functional form of CRXF
- riT (Ri)-1 ri
- The major drawback is that if a detected anomaly
remains on the image to be processed, it may
decrease the detectability of the following
anomalies.
26Adaptive Causal Anomaly Detector (ACAD)
- ACAD has the same functional form as does CRXF,
except the sample correlation matrix R is formed
by all the arrived pixel vectors except the
detected anomalous target pixel vectors that have
been removed. - riT (Ri)-1 ri
- An anomalous target map is generated at the same
time as the detection process takes place.
27HYDICE Data
- HYDICE (Hyperspectral Digital Imagery Collection
Experiment) - 15 panels of five types with three different
materials. - They are arranged into a matrix in such a way
that each row represents 3 panels of the same
type with three different sizes, 3m?3m, 2m?2m,
1m?1m. Each column represents 5 panels of
different types with the same size.
Anomaly
Original image
Target masked image
28CRXF Results
row 8
row 16
row 24
row 32
row 40
row 48
row 56
row 64
29ACAD Results
row 8
row 16
row 24
row 32
row 40
row 48
row 56
row 64
30ACAD Target Map
row 8
row 16
row 24
row 32
row 64
row 40
row 48
row 56
31ACAD Hardware Design
Ri Ri-1 ri riT
Auto Correlator
(Ri)-1 (Qi Riupper )-1 ( Riupper )-1 QiT
QR Matrix Inverse
Abundance Calculation
dACAD (ri) riT (RiT)-1 ri
Anomalous Target Discriminator
tK t
32Matrix Inversion Lemma
(ABCD)-1 A-1 A-1B(C-1DA-1B)-1 DA-1
By Woodburys identity, set B a column vector, C
a scalar of unity, and D a row vector
?
(ArrT)-1 A-1 (A-1rrT A-1) / (1rTA-1r)
- Let A be the current correlation matrix and r be
the incoming pixel vector.
33Matrix Inversion Lemma (Contd)
- With Matrix Inversion Lemma (MIL), we only need
to compute - Using MIL the matrix inversion is reduced to
matrix multiplications. - Simulation is provided to evaluate the
performance of MIL.
34ACAD Hardware Design
Ri Ri-1 ri riT
Auto Correlator
(Ri)-1 (Qi Riupper )-1 ( Riupper )-1 QiT
QR Matrix Inverse
Abundance Calculation
dACAD (ri) riT (RiT)-1 ri
Anomalous Target Discriminator
tK t
Matrix Inversion Lemma
35Speed-up of MIL
- We use two versions of the MATLAB program to
perform the ACAD on the same image cube. One uses
the MATLAB inv() function and another one uses
the MIL.
- As we can see, the speed-up is about 2 times
faster for the 64x64 HYDICE image than the one
without MIL.
36Conclusions
- The Matrix Inversion Lemma has been successfully
applied to reduce the matrix inversion performed
by Adaptive Causal Anomaly Detection (ACAD) into
matrix multiplications. - Since the Causal RX Filter (CRXF) and Real-time
CEM (Constrained Energy Minimization) previously
proposed in Wang 2003 also involve inverse
matrix computation, the same MIL-based approach
can be also applied to reduce the computational
load.
37Conclusions (Contd)
- New block design of BOS including Square based
and Tetrahedron based BOS have been introduced to
improve the drawback of the Pyramid-based and
Cube-based BOS design. - The FPGA design and implementation of the four
BOS design has also been evaluated and analyzed.
38Future Work
- An effective Dimensionality Reduction (DR) or
Band Selection (BS) may need to reduce the number
of bands to an acceptable range so that we can
further reduce the computation cost in both
applications. - Heterogeneous platform may be also considered to
reduce the design time and possibly achieve
better performance.
39Projects Conducted in RSSIPL
- Joint Service Agent Water Monitor
- Mission
- Develop GUI image analysis software for detecting
Biological Threat Agent on Handheld Assays - Ported developed algorithms onto embedded system,
Stargate Gateway (SPB400, Linux single board
computer) with external hand held scanner device.
- Sponsor
- US Army Edgewood Chemical and Biological Center
(ECBC) - ANP Technologies, Inc.
40Software for Detecting Agents
41Projects Conducted in RSSIPL (Contd)
- Multi-band Multi-threat warning sensor
- Mission
- Developed detection algorithms for missile and
grenade images captured from real-time
Multispectral imaging system. - Developed MATLAB based GUI for image analysis.
- Sponsor
- Surface Optics Corporation (SOC)
42Projects Conducted in RSSIPL (Contd)
43Projects Conducted in RSSIPL (Contd)
- Multi-band Multi-threat warning sensor
- Mission
- Developed detection algorithms for missile and
grenade images captured from real-time
Multispectral imaging system. - Developed MATLAB based GUI for image analysis.
- Sponsor
- Surface Optics Corporation (SOC)
44Publication
- Book Chapter
- J. Wang, M. Hsueh and C.-I Chang, FPGA Design
for Second-order Statistics Based Target
Detection Algorithm for Hyperspectral Imagery
Applications, High Performance Computing in
Remote Sensing, Chapman Hall/CR, Oct 2007. - J. Wang, M. Hsueh and C.-I Chang, FPGA
Implementation for Real-time Orthogonal Subspace
Projection for Hyperspectral Imagery
Applications, High Performance Computing in
Remote Sensing, Chapman Hall/CR, Oct 2007.
45Publication (contd)
- Journal
- C.-I Chang and M. Hsueh, Characterization of
Anomaly Detection in Hyperspectral Imagery,
Sensor Review, Volume 26, Issue 2, pp. 137-146,
2006. - M. Hsueh and C.-I Chang, Field Programmable Gate
Arrays for Pixel Purity Index Using Blocks of
Skewers for Endmember Extraction in Hyperspectral
Imagery, International Journal of High
Performance Computing Applications, Dec 2007. (to
appear) - C.-I Chang, M. Hsueh, F. Chaudhry, W. Liu, C.-C.
Wu, G. Solyar, A pyramid-based block of skewers
for pixel purity index for endmember Extraction
in hyperspectral imagery, International Journal
of High Speed Electronics and Systems. (to
appear) - M. Hsueh and C.-I Chang, Adaptive Causal Anomaly
Detection on Reconfigurable Computing, IEEE
Transaction on Industrial Electronics. (To be
submitted)
46Publication (contd)
- Conference
- M. Hsueh and C.-I Chang, FPGA implementation of
Adaptive Causal Anomaly Detection, 2006 CIE
Annual Convention, Newark, NJ, Sep 16, 2006. - C.-I Chang, M. Hsueh, F. Chaudhry, W. Liu, C.
C. Wu, A. Plaza and G. Solyar, A Pyramid-based
Block of Skewers for Pixel Purity Index for
Endmember Extraction in Hyperspectral Imagery,
2006 International Symposium on Spectral Sensing
Research, Bar Harbor, ME, May 29 to Jun 2, 2006. - D. Valencia, A. Plaza, M. A. Vega-Rodriguez, R.
M. Perez and M. Hsueh, FPGA Design and
Implementation of a Fast Pixel Purity Index
Algorithm for Endmember Extraction in
Hyperspectral Imagery, SPIE Optics East, Boston,
MA, Oct 23-26 2005. - L. Wu, J. Wang, B. Ramakrishna, M. Hsueh, J. Liu,
Q. Wu, C. Wu, M. Cao, C. Chang, J. L. Jensen, J.
O. Jensen, H. Knapp, R. Daniel, R. Yin, An
embedded system developed for hand held assay
used in water monitoring, SPIE Optics East,
Boston, MA, Oct 23-26, 2005.
47Publication (contd)
- Conference
- M. Hsueh and C.-I Chang, Adaptive Causal Anomaly
Detection for Hyperspectral Imagery, IEEE
International Geoscience and Remote Sensing
Symposium, Alaska, Sep 19-26, 2004. - M. Hseuh, A. Plaza, J. Wang, S. Wang, W. Liu,
C.-I Chang, J. L. Jensen and J. O. Jensen,
Morphological algorithms for processing tickets
by hand held assay, OpticsEast, Chemical and
Biological Standoff Detection II (OE120), Vol.
5584, Philadelphia, PA, Oct 25-28, 2004. - C.-I Chang, H. Ren, M. Hsueh, F. DAmico and J.O.
Jensen, A Revisit to Target-Constrained
Interference-Minimized Filter, 48th Annual
Meeting, SPIE International Symposium on Optical
science and Technology, Imaging Spectrometry IX (
AM110), San Diego, CA, Aug 3-8, 2003. - S. T. Sheu, M. Hsueh, An Intelligent Cell
Checking Policy for Promoting Data Transfer
Performance in Wireless ATM Networks, IEEE ATM
Workshop '99, Kochi City, Kochi, Japan, May
24-27, 1999.
48Thank you!!