12.4 OSP Implemented with Partial Knowledge

In Sections 12.2 and 12.3, OSP assumes the complete knowledge of target signatures, img. In many practical applications, obtaining such full knowledge is generally very difficult if not impossible, specifically, when the image background is not known. In this section, we investigate an issue of how to implement OSP when there is no full knowledge available, particularly, for the case that we are only interested in specific targets, but not image background or other natural signatures.

In his dissertation (Harsanyi, 1993), Harsanyi relaxed the requirement of complete knowledge for OSP by developing an approach called CEM to circumvent this dilemma. The idea is to constrain the desired target signature, d with a specific gain while minimizing interfering effects caused by unknown signal sources. Since the undesired target signatures in U used by OSP are assumed to be unknown, the undesired target signatures in U are suppressed by minimizing their energies instead of being annihilated by a specific operator such as img used in OSP. Despite the fact that the relationship between OSP and CEM was reported in Chang 2003a, 2003b) and Du et al. (2003), this section takes an alternative approach to show that with the same assumptions made for OSP, CEM actually performs exactly as does the least squares OSP, img.

12.4.1 CEM

Despite that CEM has been discussed in Section 2.2.3 it is a good idea for our subsequent treatment to recap its approach again as follows.

Let a remotely sensed image be a collection of image pixel vectors, denoted by img where img for img is an L-dimensional pixel vector, N is the total number of pixels in the image, and L is the total number of spectral channels. The goal is to design a finite impulse response (FIR) linear filter with L filter coefficients img, denoted by an L-dimensional weighting vector img that minimizes the filter output energy subject to the constraint img.

More specifically, let yi denote the output of the designed FIR filter resulting from the input ri. Then yi can be expressed by

(12.48) equation

and the average energy of the filter output is given by

(12.49) equation

where img is the autocorrelation sample matrix of the image. CEM is developed to solve the following linearly constrained optimization problem:

(12.50) equation

The optimal solution to (12.50) can be derived in Harsanyi (1993) and Chang (2002) by

(12.51) equation

With the optimal weighting vector wCEM specified by (12.51) a CEM filter, δCEM(r) was derived in Harsanyi (1993) and given by

(12.52) equation

Four special cases are of interest and described as follows.

12.4.1.1 d Is Orthogonal to U (i.e., img) and R = I (i.e., Spectral Correlation is Whitened)

In this case, the noise in the image data to be processed is whitened and assumed to be zero-mean and de-correlated. So, the sample spectral correlation matrix R is reduced to the identity matrix I and img. As a result, CEM becomes a normalized spectral matched filter, that is, R = I. On the other hand, if the desired target signature d is further assumed to be orthogonal to U, that is, img, then img. This implies that CEM is identical to OSP subject to a normalization constant img. Thus, both OSP and CEM can be considered as the same detector and reduced to a commonly used matched filter with the designated matched signature specified by d.

12.4.1.2 An Alternative Approach to Implementing CEM

Comparing δCEM(r) in (12.52) to δOSPD(r) in (12.9), δOSP(r) in (12.17) and img in (12.22), we will discover that there is a very close relationship between img and img. Since the knowledge of the undesired target signature matrix U assumed to be known in img in δOSPD(r), δOSP(r), and img is not available in δCEM(r), δCEM(r) must estimate img directly from the image data. One way of doing so is to approximate the “img” in the sense of minimum LSE by the inverse of the sample spectral information, img that can be obtained directly from the image data. More specifically, δCEM(r) makes use of the a posteriori information, img to approximate the a priori information img to accomplish what δOSPD(r), δOSP(r) and img do. The only difference is the scaling constant κ. Since both δOSPD(r) and δOSP(r) are used only for abundance detection, κ is set to 1. To the contrary, img is an abundance estimator and the scaling constant img is included to account for estimation error (Settle, 1996; Chang et al., 1998; Chang, 2003a). In this case, if we replace img in (12.22) with R1, img becomes δCEM(r). This suggests that δCEM(r) can be considered as img with the partial knowledge specified by the desired target signature d and the sample spectral information provided by img used to replace the unknown signature matrix img.

As noted above, the a posteriori information img used in δCEM(r) is intended to approximate the a priori information img used in δOSP(r). However, the img excludes the information provided by the desired target signature d, which is included in img. This observation suggests that a more accurate data sample correlation matrix used by δCEM(r) should be the one that removes all the pixel vectors specified by d from R. We let img be such a matrix that excludes all target pixel vectors specified by d and be defined by

(12.53) equation

where the superscript “i” runs through all target pixel vectors whose signatures are specified by d and img indicates their respective abundance fractions contained in pixel vector img. Equation (12.53) allows us to rewrite img in (12.49) as

(12.54) equation

Because of the constraint img, img. In addition, the second term in the right-hand side of (12.54), img, is independent of w. Solving (12.50) is equivalent to solving the following optimization problem:

(12.55) equation

with the optimal solution given by

(12.56) equation

where the w can be obtained by wCEM in (12.51) by simply replacing img with img. Therefore, technically speaking, (12.56) should be a more appropriate form for CEM, which is also demonstrated in Chang (2003a, pp. 63–67). Nevertheless, the CEM solution outlined by (12.50), (12.50)(12.52) is still desirable in two aspects. One is that if the number of target pixel vectors specified by the desired signature d is small, the impact of without removing these pixel vectors will be little and not be significant. Another is that in many practical applications, finding all pixel vectors that are specified by the desired signature d may not be realistic, particularly, if the d is a mixed pixel vector.

12.4.1.3 CEM Implemented in Conjunction with img

More interestingly, when the U is actually known, CEM should be able to take advantage of this knowledge to annihilate the undesired signatures via img instead of suppressing these signatures. In this case, the resulting r in (12.48) becomes img and the desired target signature d is also projected to img. Consequently, the constraint img and the object function img in (12.50) must be replaced with img and img, respectively, which results in

(12.57) equation

where img the cross-term img vanishes if n is zero-mean. As a consequence, (12.50) is reduced to

(12.58) equation

In order to see the relationship between OSP and CEM, we use (12.5) to obtain the filter output SNR as follows:

(12.59) equation

So, solving (12.58) is equivalent to finding the solution to the following constrained optimization problem:

(12.60) equation

Now, we use the Largrangian multiplier method by differentiating the following Largrangian:

(12.61) equation

with respective to w and setting it to 0, and obtain

(12.62) equation

and

(12.63) equation

with

(12.64) equation

derived by the constraint img. Substituting (12.64) for λ into (12.63) yields

(12.65) equation

CEM specified by (12.65) is called CEM implemented in conjunction with img and denoted by img.

12.4.1.4 CEM Implemented in Conjunction with img in White Noise

If we further assume that the noise in (12.60) is white and given by img, (12.60) is reduced to finding a weighting vector w with the minimum vector length subject to the constraint img, namely,

(12.66) equation

and (12.65) becomes

(12.67) equation

Let the filter specified by (12.67) be denoted by img in which case, CEM assumes that noise is white and the knowledge of the U is provided a priori. Implementing in conjunction with the undesired signature projector img, img becomes the LS estimator img given by (12.22) as well as the Gaussian maximum likelihood estimator img given by (12.46), respectively. This implies that if the noise is zero mean and white, and the undesired target signatures are annihilated by img, then img performs as if it is an abundance fraction estimator.

12.4.2 TCIMF

CEM is originally designed to detect a single target signature. If there are multiple targets to be detected, the detection must be carried out one target at a time. In order to extend CEM to a multiple-target detection technique, a TCIMF was recently developed by Ren and Chang (2001) that can be viewed as a generalization of OSP and CEM.

Let img denote the desired target signature matrix and img be the undesired target signature matrix where nD and nU are the number of the desired target signatures and the number of the undesired target signatures, respectively. Now, we can develop an FIR filter that passes the desired target signatures in D using an img unity constraint vector img while annihilating the undesired target signatures in U using an img zero constraint vector img. In doing so, the constraint in (12.50) is replaced by

(12.68) equation

and the optimization problem in (12.50) becomes the following linearly constrained optimization problem:

(12.69) equation

The filter solving (12.69) is called target-constrained interference-minimized filter (TCIMF) (Ren and Chang, 2001) and given by

(12.70) equation

with the optimal weighting vector, wTCIMF given by

(12.71) equation

A discussion on the relationship between OSP and CEM via TCIMF can be found in Chang 2002, 2003a). In what follows, we describe more details about this relationship by considering three special cases of δTCIMF(r).

12.4.2.1 img with img and img with img

In this case, δTCIMF(r) performs like img. However, there is a difference in the sense of algorithm implementation. The former performs extraction of the desired signature mp and annihilation of the undesired signatures img simultaneously, whereas the latter performs the undesired signature annihilation using img followed by CEM, δCEM(r) in sequence. Therefore, despite the fact that both filters may produce the same results, they should be considered as separate filters. In particular, δTCIMF(r) can be carried out in real time as noted in Chang (2003a) and Chang et al. (2001).

12.4.2.2 img with img and img with img and img

In this case, δTCIMF(r) performs like δOSP(r), but in the mean time, it also suppresses all signatures other than desired and undesired target signatures, an operation that OSP does not do. Let the resulting weighting vector be denoted by img and its corresponding TCIMF be denoted by img. As derived in Chang (2002) and Chang (2003a), the img can be shown to be equivalent to img or δOSP(r) as follows:

(12.72) equation

where img, and

(12.73) equation

It should be noted that the extra constant κ in (12.73) is a result of interference/noise suppression from TCIMF that OSP does not have.

12.4.2.3 D = d and img (i.e., Only the Desired Signature d is Available)

In this case, TCIMF is further reduced to CEM given by

(12.74) equation

So, on one end, OSP and CEM can be considered as special cases of TCIMF by virtue of (12.71). On the other end, OSP can be also interpreted as a noise-whitened version of TCIMF with interference/noise suppression in (12.72). In addition, CEM can be also considered as an undesired target signature-suppressed version of TCIMF in (12.74). Nevertheless, there is a subtle and substantiate distinction between TCIMF and other filters such as OSP and CEM. TCIMF can be implemented to detect and classify multiple targets, annihilate undesired targets, and suppress unknown signal sources in one-shot operation in real time (Chang et al. 2001), whereas δCEM(r) and img must be carried out for detection of a single target at a time.

12.4.3 Examples

In this subsection, we conduct a comparative analysis between OSP and CEM with the undesired signatures annihilated by OSP.

Example 12.3

(Comparative Study Between (d,U)-Model and OSP-Model)

This example assumed that the complete knowledge of target signatures was available. We study how the undesired signatures in U affect the performance of img. The same 401 simulated pixels used in Example 12.1 were also used in this example with added SNR 30:1 white Gaussian noise so that the results of δOSP(r) and img derived in Example 12.1 can be used for comparison. Two scenarios were studied. One was the U made up of dry grass and red soil. Figure 12.7 shows the detection results of δCEM(r) and img with dry grass and red soil annihilated by img. Table 12.3 tabulates their respective LSEs.

As we can see from Table 12.3, img with the dry grass and red soil annihilated performed slightly better than δCEM(r) that only suppressed the dry grass and red soil. However, if we further considered another scenario which included the sagebrush in the U as another undesired signature even if it was absent in the 401 simulated pixel vectors to repeat the same experiment.

Figure 12.8 shows the detection results of δCEM(r) and img with dry grass, red soil, and sagebrush annihilated.

As we can see clearly from Figure 12.8, img with the annihilation of U performed poorly compared to its counterpart δCEM(r). This was because the signature of the sagebrush was so close to that of creosote leaves as shown in Chang (2000) and Chang (2003a) that the annihilation of sagebrush also eliminated most part of the signature of the creosote leaves, which resulted in significant deterioration of signal detectability of img. This example demonstrated a significant difference between annihilation of undesired signatures and suppression of undesired signatures.

Example 12.4

(Partial Knowledge)

The same 401 simulated pixel vectors used in Example 12.1 were once again used for the following experiments except that the blackbrush and sagebrush were added to pixel vector numbers 98–102 and pixel numbers 298–302, respectively, at abundance fractions 10% while reducing the abundance of red soil and dry grass by multiplying their abundance fractions by 90%. In this case, there were three target signatures of interest, blackbrush, creosote leaves, and sagebrush with two background signatures, red soil, and dry grass. In this example, the complete knowledge of targets of interest, blackbrush, creosote leaves, and sagebrush was also assumed to be available and the background signatures, soil and dry grass were unknown and considered to be interferers as interference. We also let d be the desired target signature and U consists of the other two known target signatures. Like Example 12.3, CEM was implemented in conjunction with/without img, img and δCEM(r), respectively. Figure 12.9 shows the detection results of δOSP(r), img, δCEM(r), and img where figures labeled by (a), (b), and (c) are detection results of blackbrush, creosote leaves and sagebrush, respectively, with the U formed by the other two signatures that serve as undesired signatures.

As shown in Chang (2000, 2003a), the three target signatures, blackbrush, creosote leaves, and sagebrush, were very similar. As a consequence, annihilating any two of these three signatures would certainly have tremendous impacts on the detection performance of the third signature. The results of Figures 12.9 confirmed what we expected. That is, detecting one signature also detected the other two signatures. Additionally, it also significantly deteriorated the ability of img in estimating abundance fractions as shown in Figure 12.9 where the estimated abundance fractions of each of the three signatures were far more being accurate as tabulated in Table 12.4.

Surprisingly, the detection of creosote leaves was quite different from that of blackbrush and sagebrush, as δOSP(r) and img were implemented. The detection of creosote leaves also detected significant amounts of blackbrush and sagebrush signatures by suppressing the background signatures even if it was not supposed to do so. The detection of blackbrush and sagebrush showed very similar results and also detected visible amounts of the three signatures except that different amounts of abundance fractions of the background signatures, drygrass, and redsoil were detected. Similar phenomena were also observed from the detection results of δCEM(r) and img where detection of one signature also picked up the other signatures. Because the spectra of these three signatures were very similar, img used in img also annihilated part of the desired signature before the detection of the desired signature. Consequently, img performed poorly compared to δCEM(r).

Since the soil and dry grass were used as interference, TCIMF was implemented in two scenarios. One was with d = a single desired target signature and U = [drygrass redsoil], and the other was with D = [blackbrush, creosote leaves, sagebrush] and U = [drygrass redsoil]. Figure 12.10 shows their detection results of δTCIMF(r) where Figure 12.10(a)–(c) was detection results of blackbrush, creosote leaves, and sagebrush, respectively, and Figure 12.10(d) was the simultaneous detection result of the three signatures blackbrush, creosote leaves and sagebrush with D = [blackbrush (B), creosote leaves (C), sagebrush (S)].

As indicated previously, when TCIMF was implemented with a single target signature designated as the desired signature D = d, it would perform as it were img. This was verified by comparing the results of img in Figure 12.9 to δTCIMF(r) in Figure 12.10(a)–(c). Interestingly, it was not true as shown in Figure 12.10(d) when δTCIMF(r) was implemented with D = [blackbrush, creosote leaves, sagebrush] and U = [dry grass, red soil] where it performed significantly better than img.

Figure 12.7 Detection results of δCEM(r) and img with dry grass and red soil annihilated by img.

img

Table 12.3 Comparison of detected abundance fractions between δCEM(r) and img with dry grass and red soil annihilated by img

img

Figure 12.8 Detection results of δCEM(r) and img with drygrass, redsoil, and sagebrush annihilated by img.

img

Figure 12.9 Detection results of δOSP(r), img, δCEM(r), and img with dry grass, red soil, and sagebrush annihilated by img.

img

Table 12.4 Comparison of detected abundance fractions by δOSP(r), img, δCEM(r), and img with img-annihilation.

img

Figure 12.10 Detection results of δTCIMF(r) with D = [blackbrush (B), creosote leaves (C), sagebrush (S)].

img
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.23.101.60