wavelet approach to pattern recognitionwavelet approach to pattern recognition

482

Upload: brukhh

Post on 21-Oct-2015

52 views

Category:

Documents


4 download

DESCRIPTION

Wavelet Approach to Pattern Recognition

TRANSCRIPT

Page 1: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition
Page 2: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

WAVELET THEORY APPROACHTO

PATTERN RECOGNITION 2nd Edition

Page 3: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

SERIES IN MACHINE PERCEPTION AND ARTIFICIAL INTELLIGENCE*

Editors: H. Bunke (Univ. Bern, Switzerland)P. S. P. Wang (Northeastern Univ., USA)

Vol. 58: Computational Web Intelligence: Intelligent Technology forWeb Applications(Eds. Y. Zhang, A. Kandel, T. Y. Lin and Y. Yao)

Vol. 59: Fuzzy Neural Network Theory and Application(P. Liu and H. Li)

Vol. 60: Robust Range Image Registration Using Genetic Algorithmsand the Surface Interpenetration Measure(L. Silva, O. R. P. Bellon and K. L. Boyer)

Vol. 61: Decomposition Methodology for Knowledge Discovery and Data Mining:Theory and Applications(O. Maimon and L. Rokach)

Vol. 62: Graph-Theoretic Techniques for Web Content Mining(A. Schenker, H. Bunke, M. Last and A. Kandel)

Vol. 63: Computational Intelligence in Software Quality Assurance(S. Dick and A. Kandel)

Vol. 64: The Dissimilarity Representation for Pattern Recognition: Foundationsand Applications(Elóbieta P“kalska and Robert P. W. Duin)

Vol. 65: Fighting Terror in Cyberspace(Eds. M. Last and A. Kandel)

Vol. 66: Formal Models, Languages and Applications(Eds. K. G. Subramanian, K. Rangarajan and M. Mukund)

Vol. 67: Image Pattern Recognition: Synthesis and Analysis in Biometrics(Eds. S. N. Yanushkevich, P. S. P. Wang, M. L. Gavrilova andS. N. Srihari )

Vol. 68: Bridging the Gap Between Graph Edit Distance and Kernel Machines(M. Neuhaus and H. Bunke)

Vol. 69: Data Mining with Decision Trees: Theory and Applications(L. Rokach and O. Maimon)

Vol. 70: Personalization Techniques and Recommender Systems(Eds. G. Uchyigit and M. Ma)

Vol. 71: Recognition of Whiteboard Notes: Online, Offline and Combination(Eds. H. Bunke and M. Liwicki)

Vol. 72: Kernels for Structured Data(T Gärtner)

Vol. 73: Progress in Computer Vision and Image Analysis(Eds. H. Bunke, J. J. Villanueva, G. Sánchez and X. Otazu)

*For the complete list of titles in this series, please write to the Publisher.

Steven - Wavelet Theory and Its.pmd 3/18/2009, 1:04 PM2

Page 4: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

Series in Machine Perception and Artificial Intelligence - Vol. 74

WAVELET THEORYAPPROACH TO

PATTERN RECOGNITION2nd Edition

Yuan Yan TangChongqing University, China

andHong Kong Baptist University, Hong Kong

World ScientificNEW JERSEY • LONDON • SINGAPORE • BEIJING • SHANGHAI • HONG KONG • TAIPEI • CHENNAI

Page 5: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

British Library Cataloguing-in-Publication DataA catalogue record for this book is available from the British Library.

For photocopying of material in this volume, please pay a copying fee through the CopyrightClearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, USA. In this case permission tophotocopy is not required from the publisher.

ISBN-13 978-981-4273-95-4ISBN-10 981-4273-95-3

All rights reserved. This book, or parts thereof, may not be reproduced in any form or by any means,electronic or mechanical, including photocopying, recording or any information storage and retrievalsystem now known or to be invented, without written permission from the Publisher.

Copyright © 2009 by World Scientific Publishing Co. Pte. Ltd.

Published by

World Scientific Publishing Co. Pte. Ltd.

5 Toh Tuck Link, Singapore 596224

USA office: 27 Warren Street, Suite 401-402, Hackensack, NJ 07601

UK office: 57 Shelton Street, Covent Garden, London WC2H 9HE

Printed in Singapore.

WAVELET THEORY APPROACH TO PATTERN RECOGNITION(2nd Edition)Series in Machine Perception and Artificial Intelligence — Vol. 74

Steven - Wavelet Theory and Its.pmd 3/18/2009, 1:04 PM1

Page 6: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

I dedicate this book to my parents, wife,

daughter, brother and sisters

v

Page 7: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

This page intentionally left blankThis page intentionally left blank

Page 8: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Preface

This book is an update of the book “Wavelet Theory and its Application toPattern Recognition” which was published in 2000. Three new chapters areadded to this new book. The objective is to attack a challenging researchtopic that is related to both areas of wavelet theory and pattern recognition.

Wavelet analysis and its applications have become one of the fastestgrowing research areas in recent years. This is in part attributed to thepioneering work by the researchers as well as practitioners in the fields ofmathematics and signal processing. Wavelet theory has been employed inmany fields and applications, such as signal and image processing, com-munication systems, biomedical imaging, radar, air acoustics, theoreticalmathematics, control system, and endless other areas. However, the re-search on applying the wavelets to pattern recognition is still too weak;only a few publications deal with this topic at the present. This bookfocuses on this challenging research topic.

The most fascinating area of signal/image processing with practical ap-plications is pattern recognition. Making computers see and recognize ob-jects like humans has captured the attention of many scientists in differ-ent disciplines. Indeed, machine recognition of different patterns such asprinted and handwritten characters, fingerprints, biomedical images, etc.has been intensively and extensively researched by scientists in differentcountries around the world. The area of pattern recognition, after over fivedecades of continued development, is now definitely playing a very majorrole in advanced automation in the 21st century. Although a lot of achieve-ments have been made in the area of pattern recognition, many problems

vii

Page 9: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

viii Preface

still have to be solved. The goal of this book is to, through mathematicallysound derivations and experiments, develop some new application-orientedtechniques in wavelet theory, and thereafter, apply these new techniques tosolve some particular problems in the area of pattern recognition.

This book is organized into two groups, namely, Chapters 1 - 4 extendwavelet theory, while Chapter 5 through Chapter 12 deal with the appli-cation of the wavelet theory to pattern recognition, which is the core ofthis book. Considering the major readers of this book are scientists andengineers, thus, in some chapters/sections, we give up the exactness inmathematics temporarily.

Initially, in Chapter 1, a brief description of wavelet theory is introduced,and a comparison between the wavelet and Fourier transforms is discussedalong with several pictorial examples. This chapter reviews establishedapplications of the wavelet theory to pattern recognition. The review isnot detailed, since this book concentrates on the novel research resultsdeveloped by the author. However, the references are cited if additionaldetails are desired.

Throughout Chapters 2 and 3, both the wavelet transform and waveletbases are of critical concerns, which formulate the basic wavelet theory. InChapter 2, the general theory of the continuous wavelet transform is ad-dressed, and its major properties are investigated including the characteri-zation of Lipschitz regularity of signals by the wavelet transform. Chapter2 also primarily examines an important property by relating the processingto matched filtering concepts. Chapter 3 considers multiresolution anal-ysis (MRA) and wavelet bases, where the basic concepts of the both arepresented as well as the construction of them. As an important algorithmfor implementing the discrete wavelet transform, Mallat algorithm is intro-duced.

After studying these basic concepts of the wavelet theory, some typicalwavelet bases including the orthonormal and nonorthonormal bases areprovided in Chapter 4. They benefit the application of the wavelet theoryto the engineering, such as pattern recognition, image processing, etc.

By formulating the above wavelet theory and the general applicationswith wavelet theory, the second group of this book (Chapters 5 - 12) demon-strates more detailed applications, which become the core chapters. All ofthese applications were made by our research group.

Chapter 5 develops a method to identify different structures of the edgesand design an algorithm to detect the step-structure edges. This technique

Page 10: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Preface ix

can be employed to contour extraction in document processing as well as2-D object recognition.

Chapter 6 aims at studying the characterization of Dirac-structure edgeswith wavelet transform, and selecting the suitable wavelet functions todetect the Dirac edges. A mapping technique is applied in this chapterto construct such a wavelet function. In this way, a low-pass function ismapped onto a wavelet function by a derivation operation. In this chapter,the quadratic spline wavelet is utilized to characterize the Dirac-structureedges and an algorithm to extract the Dirac-structure edges by wavelettransform is also developed.

Chapter 7 introduces a new wavelet function called Tang-Yang wavelet,which is constructed by our research group. The characteristics of the Tang-Yang wavelet with curves are discussed. They are grey-level invariant, slopeinvariant and width invariant. The application of new wavelet function tocurve analysis is presented.

In Chapter 8, skeletonization of Ribbon-like shapes based on the Tang-Yang wavelet function is presented. Characterization of the Ribbon-likeshape with wavelet transform using the Tang-Yang wavelet is investigated.Some useful algorithms are also provided.

Chapter 9 presents an approach to feature extraction. In this way,the wavelet decomposition is used to produce wavelet sub-patterns, andthereafter, the fractal divider dimensions are utilized to find the numericalfeatures from these sub-patterns.

Chapter 10 applies 2-D multiresolution analysis (MRA) and Mallat al-gorithm to form document analysis. The HL and LH sub-images are utilizedto find the reference lines in a form document, furthermore, the useful in-formation can be extracted in accordance with these reference lines. Thisapplication is verified by several concrete examples of bank checks.

Chapter 11 uses B-spline wavelet for Chinese computing, which consistsof three operations, namely, (1) compression of Chinese characters, (2)enlargement of type size with arbitrary scales, and (3) generation of typestyles of Chinese fonts.

Finally, Chapter 12 deals with the classification of patterns with wavelettheory, where the orthogonal wavelet series are used for the probabilitydensity estimation in the classifier design.

The main components of this book are the achievements in our researchgroup with visiting research scholars. The professors from various uni-versities and the graduate students at Hong Kong Baptist University have

Page 11: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

x Preface

made contributions to this book. Actually, they are co-authors of this book:Professors Jiming Liu and P. C. Yuen at Hong Kong Baptist University,Professor Seong-Whan Lee at Korea University of Korea, Professor LihuaYan at Zhongshan (Sun Yat-Sen) University of China, Professor Ching Y.Suen at Concordia University of Canada, Professor Xinge You at HuazhongUniversity of Science and Technology of China, Professor Z. K. Chen atChongqing University of China, Professors Hong Ma and Bing-Fa Li atSichuan University of China, Professor Feng Yang at the South MedicalUniversity of China.

To review the established applications of the wavelet theory to patternrecognition, in Chapter 1, some materials including figures from the pub-lished papers are quoted. I would like to thank the following authors torelease the copyrights to this book: S. H. Yoon, J. H. Kim, W. E. Alexan-der, S. M. Park and K. H. Sohn [Yoon et al., 1998], F. Murtagh and J.-L.Starck [Murtagh and Starck, 1998], K. H. Liang, F. Chang, T. M. Tan andW. L. Hwang [Liang et al., 1999].

A specific international journal called “International Journal on Wavelets,Multiresolution, and Information Processing (IJWMIP)” was founded bymyself in 2003. In Chapter 1, the following papers from IJWMIP arequoted. I would like to record my appreciation to the authors for theircontributions to this book: J. Daugman [Daugman, 2003], L. H. Yang,T. D. Bui and C. Y. Suen [Yang et al., 2003b], A. Z. Kouzani and S.H. Ong [Kouzani and Ong, 2003], S. Kumar, D. K. Kumar, A. Sharmaand N. McLachlan [Kumar et al., 2003], S. Kumar and D. K. Kumar [Ku-mar and Kumar, 2005], A. Sharnia, D. K. Kumar and S. Kumar [Shar-nia et al., 2004], R. S. Kunte and R. D. S. Samuel [Kunte and Samuel,2007], K. Muneeswaran, L. Ganesan, S. Arumugam and P. Harinarayan[Muneeswaran et al., 2005], R. Ksantini, D. Ziou, F. Dubeau and P. Hari-narayan [Ksantini et al., 2006], S. E. El-Khamy, M. M. Hadhoud, M. I.Dessouky, B. M. Salam and F. E. A. El-Samie [El-Khamy et al., 2006].

I would like to express my deep gratitude to the students, Y. W. Man,Limin Cui, Yan Tang, D. H. Xi and L. Feng.

I would like to also thank the many people at Hong Kong Baptist Uni-versity, especially the Department of Computer Science for their strongsupport.

Many research projects involved in this book were supported by theresearch grants received from Research Grant Council (RGC) of Hong Kongand Faculty Research Grant (FRG) of Hong Kong Baptist University. This

Page 12: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Preface xi

work was also supported by the National Natural Science Foundation ofChina.

Page 13: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

This page intentionally left blankThis page intentionally left blank

Page 14: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Contents

Preface vii

Chapter 1 Introduction 11.1 Wavelet: A Novel Mathematical Tool for Pattern Recognition . 11.2 Brief Review of Pattern Recognition with Wavelet Theory . . . 18

1.2.1 Iris Pattern Recognition . . . . . . . . . . . . . . . . . . 211.2.2 Face Recognition Using Wavelet Transform . . . . . . . 221.2.3 Hand Gestures Classification . . . . . . . . . . . . . . . 281.2.4 Classification and Clustering . . . . . . . . . . . . . . . 311.2.5 Document Analysis with Wavelets . . . . . . . . . . . . 371.2.6 Analysis and Detection of Singularities with Wavelets . 431.2.7 Wavelet Descriptors for Shapes of the Objects . . . . . 461.2.8 Invariant Representation of Patterns . . . . . . . . . . . 491.2.9 Handwritten and Printed Character Recognition . . . . 561.2.10 Texture Analysis and Classification . . . . . . . . . . . . 611.2.11 Image Indexing and Retrieval . . . . . . . . . . . . . . . 671.2.12 Wavelet-Based Image Fusion . . . . . . . . . . . . . . . 701.2.13 Others . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72

Chapter 2 Continuous Wavelet Transforms 752.1 General Theory of Continuous Wavelet Transforms . . . . . . . 752.2 The Continuous Wavelet Transform as a Filter . . . . . . . . . 912.3 Characterization of Lipschitz Regularity of Signal by Wavelet . 942.4 Some Examples of Basic Wavelets . . . . . . . . . . . . . . . . 98

xiii

Page 15: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

xiv Contents

Chapter 3 Multiresolution Analysis and Wavelet Bases 1053.1 Multiresolution Analysis . . . . . . . . . . . . . . . . . . . . . . 105

3.1.1 Basic Concept of Multiresolution Analysis (MRA) . . . 1053.1.2 The Solution of Two-Scale Equation . . . . . . . . . . . 109

3.2 The Construction of MRAs . . . . . . . . . . . . . . . . . . . . 1203.2.1 The Biorthonormal MRA . . . . . . . . . . . . . . . . . 1273.2.2 Examples of Constructing MRA . . . . . . . . . . . . . 133

3.3 The Construction of Biorthonormal Wavelet Bases . . . . . . . 1433.4 S. Mallat Algorithms . . . . . . . . . . . . . . . . . . . . . . . . 148

Chapter 4 Some Typical Wavelet Bases 1534.1 Orthonormal Wavelet Bases . . . . . . . . . . . . . . . . . . . . 156

4.1.1 Haar Wavelet . . . . . . . . . . . . . . . . . . . . . . . . 1564.1.2 Littlewood-Paley (LP) Wavelet . . . . . . . . . . . . . . 1584.1.3 Meyer Wavelet . . . . . . . . . . . . . . . . . . . . . . . 1604.1.4 Battle-Lemare-spline Wavelet . . . . . . . . . . . . . . . 1624.1.5 Daubechies’ Compactly Supported Orthonormal

Wavelets . . . . . . . . . . . . . . . . . . . . . . . . . . 1664.1.6 Coiflet . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178

4.2 Nonorthonormal Wavelet Bases . . . . . . . . . . . . . . . . . . 1814.2.1 Cardinal Spline Wavelet . . . . . . . . . . . . . . . . . . 1814.2.2 Compactly Supported Spline Wavelet . . . . . . . . . . 196

Chapter 5 Step-Edge Detection by Wavelet Transform 2015.1 Edge Detection with Local Maximal Modulus of Wavelet

Transform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2025.2 Calculation of Wsf(x) and Wsf(x, y) . . . . . . . . . . . . . . . 211

5.2.1 Calculation of Wsf(x) . . . . . . . . . . . . . . . . . . . 2135.2.2 Calculation of Wsf(x, y) . . . . . . . . . . . . . . . . . . 215

5.3 Wavelet Transform for Contour Extraction and BackgroundRemoval . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2205.3.1 Basic Edge Structures . . . . . . . . . . . . . . . . . . . 2255.3.2 Analysis of the Basic Edge Structures with Wavelet

Transform . . . . . . . . . . . . . . . . . . . . . . . . . . 2285.3.3 Scale-Independent Algorithm . . . . . . . . . . . . . . . 2395.3.4 Experiments . . . . . . . . . . . . . . . . . . . . . . . . 242

Page 16: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Contents xv

Chapter 6 Characterization of Dirac-Edges withQuadratic Spline Wavelet Transform 251

6.1 Selection of Wavelet Functions by Derivation . . . . . . . . . . 2526.1.1 Scale Wavelet Transform . . . . . . . . . . . . . . . . . 2536.1.2 Construction of Wavelet Function by Derivation of the

Low-Pass Function . . . . . . . . . . . . . . . . . . . . . 2556.2 Characterization of Dirac-Structure Edges by Wavelet

Transform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2586.2.1 Slope Invariant . . . . . . . . . . . . . . . . . . . . . . . 2636.2.2 Grey-Level Invariant . . . . . . . . . . . . . . . . . . . . 2656.2.3 Width Light-Dependent . . . . . . . . . . . . . . . . . . 267

6.3 Experiments . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272

Chapter 7 Construction of New Wavelet Function andApplication to Curve Analysis 279

7.1 Construction of New Wavelet Function — Tang-YangWavelet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 282

7.2 Characterization of Curves through New Wavelet Transform . . 2857.3 Comparison with Other Wavelets . . . . . . . . . . . . . . . . . 295

7.3.1 Comparison with Gaussian Wavelets . . . . . . . . . . . 2967.3.2 Comparison with Quadratic Spline Wavelets . . . . . . 300

7.4 Algorithm and Experiments . . . . . . . . . . . . . . . . . . . . 3017.4.1 Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . 3017.4.2 Experiments . . . . . . . . . . . . . . . . . . . . . . . . 305

Chapter 8 Skeletonization of Ribbon-like Shapes withNew Wavelet Function 311

8.1 Tang-Yang Wavelet Function . . . . . . . . . . . . . . . . . . . 3158.2 Characterization of the Boundary of a Shape by Wavelet

Transform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3178.3 Wavelet Skeletons and Its Implementation . . . . . . . . . . . . 322

8.3.1 Wavelet Transform in the Discrete Domain . . . . . . . 3228.3.2 Generation of Wavelet Skeleton in the Discrete

Domain . . . . . . . . . . . . . . . . . . . . . . . . . . . 3258.3.3 Modification of Primary Wavelet Skeleton . . . . . . . . 327

8.4 Algorithm and Experiment . . . . . . . . . . . . . . . . . . . . 3318.4.1 Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . 3318.4.2 Experiments . . . . . . . . . . . . . . . . . . . . . . . . 332

Page 17: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

xvi Contents

Chapter 9 Feature Extraction by Wavelet Sub-Patternsand Divider Dimensions 343

9.1 Dimensionality Reduction of Two-Dimensional Patterns withRing-Projection . . . . . . . . . . . . . . . . . . . . . . . . . . . 346

9.2 Wavelet Orthonormal Decomposition to Produce Sub-Patterns 3519.3 Wavelet-Fractal Scheme . . . . . . . . . . . . . . . . . . . . . . 358

9.3.1 Basic Concepts of Fractal Dimension . . . . . . . . . . . 3599.3.2 The Divider Dimension of One-Dimensional Patterns . . 365

9.4 Experiments . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3679.4.1 Experimental Procedure . . . . . . . . . . . . . . . . . . 3679.4.2 Experimental Results . . . . . . . . . . . . . . . . . . . 368

Chapter 10 Document Analysis by Reference LineDetection with 2-D Wavelet Transform 381

10.1 Two-Dimensional MRA and Mallat Algorithm . . . . . . . . . 38310.2 Detection of Reference Line from Sub-Images by the MRA . . 38710.3 Experiments . . . . . . . . . . . . . . . . . . . . . . . . . . . . 390

Chapter 11 Chinese Character Processing with B-SplineWavelet Transform 399

11.1 Compression of Chinese Character . . . . . . . . . . . . . . . . 40411.1.1 Algorithm 1 (Global Approach) . . . . . . . . . . . . . . 40411.1.2 Algorithm 2 (Local Approach) . . . . . . . . . . . . . . 40611.1.3 Experiments . . . . . . . . . . . . . . . . . . . . . . . . 407

11.2 Enlargement of Type Size with Arbitrary Scale Based on WaveletTransform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40811.2.1 Algorithms . . . . . . . . . . . . . . . . . . . . . . . . . 40911.2.2 Experiments . . . . . . . . . . . . . . . . . . . . . . . . 414

11.3 Generation of Chinese Type Style Based on WaveletTransform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41511.3.1 Modification . . . . . . . . . . . . . . . . . . . . . . . . 41611.3.2 Composition . . . . . . . . . . . . . . . . . . . . . . . . 424

Chapter 12 Classifier Design Based on OrthogonalWavelet Series 429

12.1 Fundamentals . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42912.2 Minimum Average Lose Classifier Design . . . . . . . . . . . . 43312.3 Minimum Error-Probability Classifier Design . . . . . . . . . . 435

Page 18: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Contents xvii

12.4 Probability Density Estimation Based on Orthogonal WaveletSeries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43712.4.1 Kernel Estimation of a Density Function . . . . . . . . 43712.4.2 Orthogonal Series Probability Density Estimators . . . 43912.4.3 Orthogonal Wavelet Series Density Estimators . . . . . 441

List of Symbols 449

Bibliography 451

Index 461

Page 19: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

This page intentionally left blankThis page intentionally left blank

Page 20: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Chapter 1

Introduction

1.1 Wavelet: A Novel Mathematical Tool for PatternRecognition

Wavelet analysis is a relatively recent development of applied mathemat-ics in 1980s. Independent from its developments in harmonic analysis,A. Grossmann, J. Morlet and their coworkers studied the wavelet trans-form in its continuous form and initially applied it to analyze geolog-ical data [Grossmann and Morlet, 1984; Grossmann and Morlet, 1985;Grossmann et al., 1985; Morlet et al., 1982a; Morlet et al., 1982b]. However,at that time, the roughness of wavelets made the mathematicians suspectthe existence of a “good” wavelet basis until two great events took place in1988, namely:

• Daubechies, a female mathematician, constructed a class of waveletbases, which are smooth, compactly supported and orthonormal.They are referred to as Daubechies bases, and successfully appliedto many fields today.• French signal analysis expert, S. Mallat, with mathematician, Y.

Meyer, proposed a general method to construct wavelet bases. Itis termed multiresolution analysis (MRA) and is intrinsically con-sistent with sub-band coding in signal analysis.

The above achievements play important roles in mathematics as wellas engineering. They established the theoretical frame for wavelet anal-ysis in mathematics. On the other hand, they improved the traditionaltheory of frequency analysis in engineering. As a result, a novel method

1

Page 21: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

2 Introduction

−4 −3 −2 −1 0 1 2 3 4−1

−0.8

−0.6

−0.4

−0.2

0

0.2

0.4

0.6

0.8

1

−4 −3 −2 −1 0 1 2 3 4−1

−0.8

−0.6

−0.4

−0.2

0

0.2

0.4

0.6

0.8

1

(a) (b)

Fig. 1.1 Simple examples of wave and wavelet. (a) A wave is produced by a non-dampedsimple harmonic vibration; (b) A wavelet is formed by a damped oscillation.

for time-frequency analysis has been formed. In this way, signals can belocally characterized in both the time domain and frequency domain simul-taneously and self-adaptively. According to this property, wavelet analysiscan be efficiently applied to analyze and process the non-stationary signals.The engineers and scientists have paid ample attention to wavelet theory,and carried out the research of wavelets on very wide areas, in recent years.As a matter of fact, significant success of wavelet analysis has achieved on avariety of disciplines, such as, signal processing, image compressing and en-hancement, pattern recognition, communication systems, control systems,biomedical imaging, air acoustic, radar, theoretical mathematics, and end-less other signal processing fields. Moreover, the potentiality of wavelets inboth the research and development would be immeasurable.

What is a wavelet? The simplest answer is a “short” wave (wave + let⇒ wavelet). The suffix “let” initially means “a small kind of” in a generalEnglish dictionary [Procter, 1993]. However, in the mathematical term“wavelet”, the meaning of the suffix “let” comes “short”, which indicatesthat the duration of the function is very limited. In other words, it issaid that wavelets are localized. Look at the following simple examples inFig. 1.1, to obtain a brief idea: what is a wave, and what is a wavelet.

We consider two typical mechanical movements:

• non-damped simple harmonic vibration, and• damped oscillation.

Page 22: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Wavelet: A Novel Mathematical Tool for Pattern Recognition 3

A wave can be produced by a non-damped simple harmonic vibration,which is illustrated in Fig. 1.1(a). It forms a sinusoidal wave with non-attenuated amplitude. By contrast, a wavelet can be formed by a dampedoscillation, as shown in Fig. 1.1(b), its amplitudes quickly decay to zero inboth the positive and negative directions. In other words, the wavelet is aspecial signal, in which, two conditions have to be satisfied.

First, the wavelet must be oscillatory (wave).Second, its amplitudes are nonzero only during a short in-terval (short).

The required oscillatory condition leads to sinusoids as the building blocks.The quick decay condition is a tapering or windowing operation. These twoconditions must be simultaneously satisfied for the function to be a wavelet[Young, 1993]. According to these conditions, we can justify whether afunction is a wavelet.

Consider the functions in Fig. 1.2. As applying these two conditions,it is clear that the functions in Fig. 1.2(a) and (b) are wavelets, while theones in Fig. 1.2(c) and (d) are not. The functions in Fig. 1.2(a) and (b)are oscillatory and have amplitudes which quickly decay to zero with time.Thus, they are wavelets. The functions in Fig. 1.2(c) and (d) do not satisfyboth wave and short simultaneously. Fig. 1.2(c) decays quickly to zero butdoes not oscillate, while Fig. 1.2(d) is wave but not short. Therefore, theyare not wavelets.

The next question is what we can do with this simple wave? It is well-known that any complex movement, which is described by f(x), can berepresented by the summation of several simple harmonic vibrations withdifferent frequencies:

f(x) =a0

2+

∞∑k=1

(ak cos kx+ bk sin kx), (1.1)

where, cos kx and sinkx denote the simple harmonic vibrations.J. Fourier first discovered this important fact in 1807, when he was

studying the equation of heat conduction. This is why the above series ex-pansion is called Fourier expansion. It infers that any complex wave f(x)can be formed by the linear combination of the basic elements, which areproduced by the dilations and translations of sinx. sinx is the simplestbasic wave and is viewed as a basic “atom”. Therefore, through the in-vestigation of rules, which indicate how a complex function f(x) can be

Page 23: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

4 Introduction

(a) (b)

(c) (d)

Fig. 1.2 Simple examples of wave and wavelet. (a) and (b) are wavelets, since they areoscillatory and in limited duration; (c) and (d) are not wavelets, because the function

in (c) decays quickly to zero but does not oscillate, the function in (d) is wave but notshort.

composed of such small atoms, we can understand function f(x) itself well.It has been mathematically proved that the sum of the finite number ofterms, which are the fore ones in Fourier series, is the best approximationof f(x) under the consideration of energy. That is:

∫ 2π

0

|f(x)− [a0

2+

N∑k=1

(ak cos kx+ bk sin kx)]|2dx

= minc0,c1,d1,···,cN ,dN

∫ 2π

0

|f(x)− [c02

+N∑k=1

(ck cos kx+ dk sin kx)]|2dx→ 0

(N →∞).

(1.2)

Page 24: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Wavelet: A Novel Mathematical Tool for Pattern Recognition 5

For these reasons, Fourier analysis has been a traditional and efficienttool in many fields of science and engineering, in past two hundred years. Itwill also play an indispensable role in the future. However, the developmentof science and engineering has no limits. Fourier analysis is not a solutionthat will be good for all time and in all situations. Meanwhile, Fourieranalysis has its own deficiency. In fact, it has two major problems, namely,

• Fourier analysis can not characterize the signals locally in timedomain.• Fourier expansion can approximate the stationary signals well, but

can not do so for the non-stationary ones.

These drawbacks can be found in the following concrete examples. Considertwo signals shown in Fig. 1.3.

According to the above analysis, it can be known that a complicatedfunction f(x) can be represented by a series of Fourier coefficients, saya0, a1, b1, a− 2, b2, · · ·, i.e.

f(x) =⇒ a0, a1, b1, · · · , ai, bi, · · · , aj , bj, · · ·.

Where, j > i, and the Fourier coefficients aj and bj correspond to the com-ponents with higher frequency in signal f(x). By contrast, the coefficientsai and bi correspond to the components with lower frequency in signal f(x).For the given signals f1(x) and f2(x), we have

f1(x) =⇒ a10, a

11, b

11, · · · , a1

i , b1i , · · · , a1

j , b1j , · · ·

(1.3)

f2(x) =⇒ a20, a

21, b

21, · · · , a2

i , b2i , · · · , a2

j , b2j , · · ·

It is easy to understand, from Figs. 1.3(c) and (d), that the values ofthe first several terms, which correspond to lower frequencies, in the Fouriercoefficients are greater than those of the other terms, which are located inthe tail of the series and have higher frequencies. The backer the coefficientsare located, the closer to zero the values are. Thus, the energy of a signal isdistributed on the front terms (lower frequencies) in the Fourier coefficients.

Consider the number of cycles in Figs. 1.3(c) and (d), it can be foundthat the number of cycles in Fig. 1.3(d) is greater than that in Figs. 1.3(c),which indicates that signal f2(x) has more nonzero components in the fre-quency domain than that f1(x) has. This situation is also described in

Page 25: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

6 Introduction

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1

−0.2

0

0.2

0.4

0.6

0.8

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1

−0.2

0

0.2

0.4

0.6

0.8

(a) (b)

0 20 40 60 80 100 120−0.4

−0.2

0

0.2

0.4

0.6

0.8

1

0 20 40 60 80 100 120−0.2

−0.15

−0.1

−0.05

0

0.05

0.1

0.15

(c) (d)

Fig. 1.3 The first row: the left side is the original signal f1(x), and the right sidedisplays another original signal f2(x). The second row: the left side indicates the Fouriercoefficients corresponding to f1(x), and the right side shows the Fourier coefficientscorresponding to f2(x).

Eq. 1.3, where the number of nonzero terms in the Fourier expansion for sig-nal f2(x) is more than that in the expansion for signal f1(x). This propertyarrests the time-frequency analysis using the Fourier theory. For instance,signal f2(x) possesses a transient component with very short interval. How-ever, its corresponding Fourier expansion contains many terms which pro-duce a long-duration vibration as illustrated in Fig. 1.3(d). Thus, a short-duration transient in the time domain corresponds to a long-duration vi-bration in the frequency domain. The characteristic of localization of thenarrow transient signal in the time domain will disappear in the frequencydomain. Therefore, it is impossible to locate and characterize the transient

Page 26: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Wavelet: A Novel Mathematical Tool for Pattern Recognition 7

(a) (b)

Fig. 1.4 The contours of objects, drawing lines and texts are transient components.

components in both the time and frequency domains using the Fouriercoefficients. This makes the Fourier transforms less than optimal represen-tations for analyzing signals, images and patterns containing transient orlocalized components. As a matter of fact, in pattern recognition, manyimportant features are highly localized in spatial positions. The aboveweakness of the Fourier transform obstructs its application to pattern recog-nition.

Look at the following three examples, which deal with the field of patternrecognition, and are shown in Figs. 1.4 and 1.5. First, we consider an imageof an aircraft with several drawing lines and character strings, which aredisplayed in Fig. 1.4(a). The contour of the aircraft is a localized imagecomponent, meanwhile, the drawing lines and character strings are also thetransient image components. To recognize the aircraft from other objects,the contour of it is a useful feature, which is required to extract from theimage. On the other hand, the drawing lines and character strings arethe obstacles for the recognition, which have to be removed. For thesetwo different image components, the Fourier analysis can not treat themefficiently.

The second example is illustrated in Fig. 1.4(b), which is a Englishletter “A” with noise. In pattern recognition, the boundary of the charactershould be extracted as a good feature, while, the noise has to be deleted.To do so, the transient component, boundary of letter “A”, needs to be

Page 27: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

8 Introduction

Fig. 1.5 The reference lines of bank check are transient components.

localized and processed. The deficiency of the Fourier analysis will obstructthis task.

The last example as shown in Fig. 1.5 deals with document analysis,which is an active branch in pattern recognition,. Bank check is very im-portant and widely used in our daily life. In order to automatically processit, detecting reference lines plays a key role. However, these lines belongto the narrow transient components of the image. It is difficult to processthem using Fourier analysis.

We, now, turn to discuss the approximation of signals f1(x) and f2(x)using basic wave function sinx.

Fig. 1.6 consists of two columns. The left column describes the originalnon-transient signal f1(x) as shown in the top, and its approximations using

Page 28: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Wavelet: A Novel Mathematical Tool for Pattern Recognition 9

the partial sums of the Fourier expansions with N = 4, 8, 15, 30, from thetop to the bottom, respectively. The right column presents the transientsignal f2(x) and its approximations using the partial sums of the first Ncoefficients of Fourier expansions, N = 4, 8, 15, 30, from the top to thebottom, respectively.

The errors between the original signals and the partial sums of theFourier expansions are illustrated in Fig. 1.7. The left column presentsthe original non-transient signal f1(x), and the errors. f1(x) is located onthe top, the errors with different number of terms of Fourier expansionsare described from the next-to-the-top to the bottom, which correspondto n = 4, 8, 15 and 30 respectively. The right column presents the originalsignal f2(x) and the errors with n = 4, 8, 15, 30, from the top to the bottom,respectively.

From the left columns in Figs. 1.6 and 1.7, it is clear that, for thenon-transient signal f1(x), the fore 17 terms of the Fourier expansion canapproximate the original signal very well. This corresponds to n = 8 inEq. (1.3). It means that the series of a0, a1, b1, · · · , a8, b8 contain the mostof information in f1(x). Therefore, the representation of the non-transientsignal f1(x) by the basic function sinx is extremely well-founded.

Unfortunately, the situation is not so good for the transient signal f2(x).It can be found, in the right columns in Figs. 1.6 and 1.7, that in the case ofn = 8, the approximation error is still large. Although, the error is relativelysmall when n = 30, it is still visible. The reason for this occurrence is thatfor any transient or localized signals, like f2(x), the smooth basic wave sinxcan not fit them perfectly.

To contest the above deficiencies, we should find other basic functionψ(x) to replace the basic function sinx. This new basic function shouldsatisfy the following conditions:

• Similar to sinx, any complicated signal f(x) can be constructed bythe linear combination of ψ(jx− k) (j, k ∈ Z), which are producedby the dilations and translations of the basic function ψ(x).• The expansion coefficients of a signal using the basic function ψ(x)

can reflect the locations of the transient or localized image compo-nents in the time domain.• This new basic function ψ(x) and its family can “fit” transient

signal f(x) much better than Fourier basic wave sinx. In otherwords, they can minimize the error between the approximation of

Page 29: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

10 Introduction

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1

−0.2

0

0.2

0.4

0.6

0.8

(a) 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1

−0.2

0

0.2

0.4

0.6

0.8

(b)

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1

−0.2

0

0.2

0.4

0.6

0.8

(c) 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1

−0.2

0

0.2

0.4

0.6

0.8

(d)

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1

−0.2

0

0.2

0.4

0.6

0.8

(e) 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1

−0.2

0

0.2

0.4

0.6

0.8

(f)

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1

−0.2

0

0.2

0.4

0.6

0.8

(g) 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1

−0.2

0

0.2

0.4

0.6

0.8

(h)

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1

−0.2

0

0.2

0.4

0.6

0.8

(i) 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1

−0.2

0

0.2

0.4

0.6

0.8

(j)

Fig. 1.6 The left column: original signal f1(x) and its partial sums of the Fourierexpansion with N=4, 8, 15, 30 respectively. The right column: original signal f2(x) andits partial sums of the Fourier series of f2(x) with N=4, 8, 15, 30 respectively.

Page 30: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Wavelet: A Novel Mathematical Tool for Pattern Recognition 11

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1

−0.2

0

0.2

0.4

0.6

0.8

(a) 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1

−0.2

0

0.2

0.4

0.6

0.8

(b)

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1−1

−0.8

−0.6

−0.4

−0.2

0

0.2

0.4

0.6

0.8

1

(c) 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1−1

−0.8

−0.6

−0.4

−0.2

0

0.2

0.4

0.6

0.8

1

(d)

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1−1

−0.8

−0.6

−0.4

−0.2

0

0.2

0.4

0.6

0.8

1

(e) 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1−1

−0.8

−0.6

−0.4

−0.2

0

0.2

0.4

0.6

0.8

1

(f)

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1−1

−0.8

−0.6

−0.4

−0.2

0

0.2

0.4

0.6

0.8

1

(g) 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1−1

−0.8

−0.6

−0.4

−0.2

0

0.2

0.4

0.6

0.8

1

(h)

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1−1

−0.8

−0.6

−0.4

−0.2

0

0.2

0.4

0.6

0.8

1

(i) 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1−1

−0.8

−0.6

−0.4

−0.2

0

0.2

0.4

0.6

0.8

1

(j)

Fig. 1.7 The left column: original signal f1(x) and the errors with N=4, 8, 15, 30respectively. The second column: original signal f2(x) and the errors with N=4, 8, 15,30 respectively.

Page 31: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

12 Introduction

0 0.5 1 1.5 2 2.5 3

−1

−0.8

−0.6

−0.4

−0.2

0

0.2

0.4

0.6

0.8

1

Fig. 1.8 Haar Wavelet.

the signal f(x) and f(x) itself.

In fact, we already found such a basic function ψ(x) as early as 1910. It isthe well-known square wave function – Haar function. This basic functionψ(x) can be written in form of

ψ(x) =

1 x ∈ [0, 12 )

−1 x ∈ [ 12 , 1)

The graphic illustration of Haar function is presented in Fig. 1.8.It has been mathematically proved that ψ(2jx− k)|j, k ∈ Z can con-

stitute an orthogonal basis of the finite energy signal space L2(R). Theycan also establish an orthonormal basis of L2(R) through a normalization:

ψj,k(x) := 2j/2ψ(2jx− k), (j, k ∈ Z). (1.4)

Thus, any finite energy signal f(x) can be represented by

f(x) =∑j∈Z

∑k∈Z

cj,kψj,k(x), (1.5)

Page 32: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Wavelet: A Novel Mathematical Tool for Pattern Recognition 13

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1

−0.2

0

0.2

0.4

0.6

0.8

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1

−0.2

0

0.2

0.4

0.6

0.8

(a) (b)

5 10 15 20 25 30−0.5

−0.4

−0.3

−0.2

−0.1

0

0.1

0.2

0.3

0.4

0.5

5 10 15 20 25 30−0.5

−0.4

−0.3

−0.2

−0.1

0

0.1

0.2

0.3

0.4

0.5

(c) (d)

Fig. 1.9 The first row: the left side is the original signal f1(x), and the right side displaysanother original signal f2(x). The second row: the left side indicates the Haar coefficientscorresponding to f1(x), and the right side shows the Haar coefficients corresponding tof2(x).

where cj,k :=∫

Rf(x)ψj,k(x)dx. Consequently, the first condition holds for

Haar wavelet.Now, we will expand signals f1(x) and f2(x) with Haar family. A part

of the coefficients of the Haar wavelet expansion for N = 5, are shown inFig. 1.9.

The original signals f1(x) (without transient components), and f2(x)(with transient components) are illustrated in Figs. 1.9(a) and (b) respec-tively. By applying the Haar transform to these signals, the Haar coef-ficients cN,k|k = 0, · · · , 2N − 1 of signals f1(x) and f2(x) are obtainedand plotted in Figs. 1.9(c) and (d) respectively. The above coefficients can

Page 33: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

14 Introduction

successfully localize the signals. For the non-transient signal f1(x), nearlyall Haar coefficients close to zero, which implies that no high frequencies isincluded in the original signal. By contrast, for the transient signal f2(x),only a few coefficients are affected, and produce a vibration in the frequencydomain. Two peaks of the vibration in Fig. 1.9(d) correspond to just thepositions of the transient components in signal f2(x) shown in Fig. 1.9(b).Meanwhile, each coefficient is just determined by the local action of thesignal. In this way, Haar family can be employed to analyze the localiza-tion of signals in the time domain. Consequently, the second condition alsoholds for the Haar wavelet.

Next, we turn to the verification of third condition, i.e. we will checkthe question: can we apply the Haar wavelet to approximate signals withsmall error?

In Eq. 1.5, we denote

f0(x) =−1∑

j=−∞

∑k∈Z

cj,kψj,k(x).

Similar to the Fourier expansion, by considering the energy, we have∫R

|f(x)− [f0 +N∑j=0

∑k∈Z

cj,kψj,k(x)]|2dx

= mind0,d1,···,dN

∫R

|f(x)− [f0 +N∑j=0

∑k∈Z

dj,kψj,k(x)]|2dx→ 0 (N →∞).

where

f0(x) +N∑j=0

∑k∈Z

cj,kψj,k(x)

is an approximation of f(x).We take signals f1(x) and f2(x) as examples again. The approximations

of these signals using Haar family are presented graphically in Fig. 1.10.The original non-transient f1(x) and transient signals f2(x) are illustratedin Figs. 1.10(a) and (b) respectively. The approximation of f1(x) by thepartial sums of the Haar expansion with N=4 (32 terms) and that withN=5 (64 terms) are shown in Figs. 1.10(c) and (g) respectively. The similardescription of f2(x) by the partial sums of the Haar coefficients with N=4and that with N=5 are displayed in Figs. 1.10(d) and (h) respectively. The

Page 34: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Wavelet: A Novel Mathematical Tool for Pattern Recognition 15

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1

−0.2

0

0.2

0.4

0.6

0.8

(a) 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1

−0.2

0

0.2

0.4

0.6

0.8

(b)

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1

−0.2

0

0.2

0.4

0.6

0.8

(c) 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1

−0.2

0

0.2

0.4

0.6

0.8

(d)

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1−1

−0.8

−0.6

−0.4

−0.2

0

0.2

0.4

0.6

0.8

1

(e) 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1−1

−0.8

−0.6

−0.4

−0.2

0

0.2

0.4

0.6

0.8

1

(f)

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1

−0.2

0

0.2

0.4

0.6

0.8

(g) 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1

−0.2

0

0.2

0.4

0.6

0.8

(h)

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1−1

−0.8

−0.6

−0.4

−0.2

0

0.2

0.4

0.6

0.8

1

(i) 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1−1

−0.8

−0.6

−0.4

−0.2

0

0.2

0.4

0.6

0.8

1

(j)

Fig. 1.10 Haar functions approximate signals: The left column: original non-transientsignal f1(x), the partial sums of the Haar expansion with N=4, 5, and the approximatingerrors. The right column: original transient signal f2(x), the partial sums of the Haarexpansion with N=4, 5, and the approximating errors.

Page 35: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

16 Introduction

errors between the original signal f1(x) and its approximations using theHaar function are presented in Figs. 1.10(e) and (i), which correspond toN=4 and 5 respectively. The errors between the original signal f2(x) andits approximations by the Haar coefficients are described graphically inFigs. 1.10(f) and (j) corresponding to N=4 and 5.

Now, we compare the result using sinx with that using the Haar func-tion, in case of N=4. As shown in Figs. 1.6(d) and 1.10(h), when the Haarfunction is employed to approximate a transient signal, the result seemsbetter than that when we use sinx due to the strong localization of theHaar family. Mathematically, it is said that the Haar function is compactlysupported. Unfortunately, it can be found, from Fig. 1.10(g), that when weapproximate a non-transient signal with Haar wavelet, the result is not sogood as Fourier expansion. In this situation, saw-tooth-wave errors occurdue to the discontinuity of Haar function. In summary, comparing withsinx, Haar wavelet has much better localization and rather worse smooth-ness. That is why Haar wavelet did not attract enough attention for a longtime. Before various wavelet bases were constructed in 1980s, it was only adream to find out a basic wavelet ψ(x), which has both the strong localiza-tion and smoothness. At the end of 1980s, wavelets achieved breakthroughdevelopment in both theory and application.

It has followed a long and tortuous course from Fourier analysis towavelet analysis. In fact, as early as 1946, Gabor [Gabor, 1946] has foundout that Fourier analysis is lacking to localize signals in the time domain. Heapplied Gaussian function as a “window” to improve the Fourier transform.It is referred to as Gabor transform and is applied to analyze the transientsignals. Thereafter, Gabor transform led to the general window Fouriertransform (or short-time Fourier transform) by the replacement of Gaussianfunction with other localized window functions. However, the size of thewindow in the window Fourier transform is fixed, it did not improve Fouriertransformation thoroughly. Therefore, in this book, we will not discuss itin detail.

Today, wavelet analysis has become an international focus in many re-search fields and applications. Scientists and engineers in all over the worldare working on wavelets widely and deeply in mathematics, engineering andmany other disciplines.

The fundamental difference between the signal decompositions by wavelettransform and Fourier transform is depicted in Fig. 1.11. A singer sings a

Page 36: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Wavelet: A Novel Mathematical Tool for Pattern Recognition 17

Time

Fourier components

Frequency Musical notation

Time

Frequency Musical notationWavelet components

Wavelet transform

Fourier transform

Signalf(t)

t

Song

Singer

Fig. 1.11 Fundamental difference between the signal decompositions by wavelet trans-form and Fourier transform: A singer sings a song, which is the signal f(t) of time t. Itcan be decomposed into the musical notes by wavelet transform due to the time-frequencylocalization. However, it would be failed if the Fourier transform will be utilized.

song, which is the signal f(t) of time t. It can be decomposed into the mu-sical notes by wavelet transform due to the property of the time-frequencylocalization of the wavelet transform. The musical notation can be viewedas depicting a 2D time-frequency space. Frequency (pitch) increases fromthe bottom of the scale to the top, while time (measured in beats) advancesto the right. Each note on the sheet music corresponds to one wavelet com-

Page 37: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

18 Introduction

ponent, which appears in the recording of a performance of the song. Ifwe were to analyze a recorded musical performance and write out the cor-responding score, we would have a type of wavelet transform. Similarly, arecording of a musician’s performance of a song can be viewed as an inversewavelet transform, since it reconstructs the signal from a time-frequencyrepresentation. However, it would be failed if we use the Fourier transformto do so.

1.2 Brief Review of Pattern Recognition with WaveletTheory

Wavelet theory is a versatile tool with very rich mathematical content andgreat applications. It has been employed in many fields and applications,such as signal processing, image analysis, communication systems, biomed-ical imaging, radar, air acoustics, theoretical mathematics, control system,and endless other areas. A lot of achievements have been made, for in-stance, many of them have been published [Auslander et al., 1990; Beylkinet al., 1991; Chui, 1992; Daubechies, 1990; Grossmann and Morlet, 1984;IEEE, 1993; Mallat, 1989b; SPIE, 1994; Daugman, 2003; Kumar and Ku-mar, 2005; Shankar et al., 2007; You and Tang, 2007; Li, 2008]. However,the research on applying the wavelets to pattern recognition is still tooweak; not too many research projects deal with this topic at the present.

In this sub-section, a brief survey of pattern recognition with the wavelettheory is presented.

As for the applications of wavelet theory to pattern recognition, we canconsider them to be two hands, namely, (1) system-component-oriented,and (2) application-task-oriented. Fig. 1.12 displays these two sides. Onthe left hand side, four components are enclosed in a recognition system. Onthe right hand side, the application-task-oriented ones can be categorizedinto the following groups:

• Iris pattern recognition[Daugman, 2003],

• Face recognition using wavelet transform[Kouzani and Ong, 2003; Lai et al., 1999; Yang et al., 2003b],

• Hand gestures classification[Kumar and Kumar, 2005; Kumar et al., 2003; Sharnia et al., 2004],

Page 38: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Brief Review of Pattern Recognition with Wavelet Theory 19

Data acquisition

Pre−processing

Feature extraction

Classification

Pattern Recognition with Wavelet Theory

System−Component−Oriented

Face recognition

Classification

Clustering

Character recognition

Character font design

Document analysis

Application−Task−Oriented

Hand gestures recognition

Iris pattern recognition

Image indexing/retrieval

Image fusion

Invariant representation

Shape descriptor

Singularity analysis

Texture processing

Other processing

Fig. 1.12 Pattern recognition with wavelet theory.

• Classification and clustering[Murtagh and Starck, 1998; Shankar et al., 2007; Tang and Ma,

2000],• Document analysis with wavelets

[Liang et al., 1999; Tang et al., 1996a; Tang et al., 1997a; Tang

Page 39: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

20 Introduction

et al., 1995a; Tang et al., 1997c],• Analysis and detection of singularities with wavelets

[Mallat and Hwang, 1992; Young, 1993; Chen et al., 1995; Chenand Yang, 1995; Deng and Lyengar, 1996; Law et al., 1996; Tanget al., 1997c; Thune et al., 1997; Tieng and Boles, 1997a; Tanget al., 1998d; Tang et al., 2000; Tang and You, 2003],• Wavelet descriptors for shapes of the objects

[Chuang and Kuo, 1996; Tang et al., 1998a; Tang et al., 1999; Tiengand Boles, 1997b; Wunsch and Laine, 1995; Yang et al., 2003a;You and Tang, 2007],• Invariant representation of patterns

[Haley and Manjunath, 1999; Shen and Ip, 1999; Tang et al., 1998a;Yang et al., 2003a; Yoon et al., 1998],• Handwritten and printed character recognition

[Kunte and Samuel, 2007; Lee et al., 1996; Tang et al., 1998a;Tang et al., 1999; Tang et al., 1996b; Tang et al., 1998d; Wunschand Laine, 1995; You and Tang, 2007],• Texture analysis and classification

[de Wouwer et al., 1999b; de Wouwer et al., 1999a; Haley andManjunath, 1999; Liang and Tjahjadi, 2006; Muneeswaran et al.,2005],• Image indexing and retrieval

[Jain and Merchant, 2004; Ksantini et al., 2006; Kubo et al.,2003; Moghaddam et al., 2005; Special-Issue-Digital-Library, 1996;Smeulders et al., 2000],• Wavelet-based image fusion

[El-Khamy et al., 2006; Li, 2006; Li, 2008],• Character processing with B-spline wavelet transform

[Yang et al., 1998],• Others

[Chambolle et al., 1998; Chen and Yang, 1995; Combettes and Pes-quet, 2004; Combettes, 1998; Liao and Tang, 2005; You et al., 2006]

It is clear that the two sides are related to each other. Each groupof the right hand side relates to the component(s) on the left hand side.For instance, the tasks in the shape descriptor, character recognition, etc.concern all the components of the pattern recognition system; Singularitydetector and invariant representation are related with the tasks, which are

Page 40: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Brief Review of Pattern Recognition with Wavelet Theory 21

carried out in the component of the feature extraction. In this sub-section,we discuss the applications of wavelet theory to pattern recognition bymeans of the right hand side, i.e. in the application-task-oriented point ofview.

1.2.1 Iris Pattern Recognition

The highest density of biometric degrees-of-freedom which is both stableover time and easily measured, is to be found in the complex texture ofthe iris pattern of the eye [Daugman, 2003]. An example of the human irispattern is presented in Fig. 1.13(a), which is imaged in near infrared lightat a distance of 30 cm. It can be served as unique and reliable identifier.

(a) (b)

Fig. 1.13 (a) Example of a human iris pattern, (b) Isolation of an iris for encoding,and its resulting “IrisCode” [Daugman, 2003].

J. Daugman [Daugman, 2003] applies complex-valued 2D wavelet to irispattern recognition. Let Ψ(x, y) be a 2D mother wavelet, we can generate acomplete self-similar family of parametrized daughter wavelets Ψmuvθ(x, y)by

Ψmuvθ(x, y) = 2−2mΨ(x′, y′),

x′ = 2−2m [x cos(θ) + y sin(θ)]− u,y′ = 2−2m [−x sin(θ) + y cos(θ)] − v,

where, the substituted variables x′, y′ incorporate dilation of the wavelet insize by 2−2m, translations in position (u, v), and rotations through angle θ.

Page 41: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

22 Introduction

In the complex-valued 2D wavelet, it is possible to use the real andimaginary parts of their convolution (∗) with an iris image f(x, y) to extracta description of image structure in terms of local modulus and phase. LetΨmuvθ(x, y) be 2D daughter wavelet we used, the amplitude modulationfunction A(x, y) and phase modulation function θ(x, y) can be presentedrespectively:

A(x, y) =√

(Ψmuvθ(x, y) f(x, y))2 + (Ψmuvθ(x, y) f(x, y))2,

and

θ(x, y) = tan−1 Ψmuvθ(x, y) f(x, y)Ψmuvθ(x, y) f(x, y) .

The following operations are accomplished to localize precisely the innerand outer boundaries of the iris, and thereafter, to detect eyelids if theyintrude, and exclude them:

maxr,x0,y0

∣∣∣∣Gσ(r) ∂

∂r

∮r,x0,y0

f(x, y)2πr

ds

∣∣∣∣ ,where, contour integration parametrized for size and local coordinates r, x0,y0 at a scale of analysis σ set by some blurring function Gσ(r) is performedover the iris pattern f(x, y). The result of this optimization search is thedetermination of the circle parameters r, x0, y0, which best fit the innerand outer boundaries of the iris. Fig. 1.13(b) shows the isolation of an irisfor encoding, and its resulting “IrisCode” [Daugman, 2003].

1.2.2 Face Recognition Using Wavelet Transform

1. Wavelet-based PCA ApproachPrincipal component analysis (PCA) is one of the well-known methods

for representing human face. [Sirovich and Kirby, 1987] first proposed to useKarhunen-Loeve transform to represent human faces. In their method, facesare represented by a linear combination of weighted eigenvector, known aseigenface features. In 1991, [Turk and Pentland, 1991] developed a facerecognition system using PCA (K-L expansion). In 1993, [O’Toole et al.,1993] demonstrated that whereas the low-dimensional representation is op-timal for identifying physical categories of face, such as gender and race,it is not optimal for recognizing a human face. In 1996, [Swets and Weng,

Page 42: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Brief Review of Pattern Recognition with Wavelet Theory 23

1996] combined the theories of K-L projection and multi-dimensional dis-criminant analysis to generate a set of most discriminating features forrecognition.

Fig. 1.14 Images of one person in Yale database.

Very good results are obtained when applying this approach to frontal-view head-&-shoulder images. However, if the face is with different orien-tations, facial expressions or occluded, the accuracy will be degraded dra-matically. [Nastar and Ayache, 1996] investigated the relationship betweenvariations in facial appearance and their deformation spectrum. They foundthat facial expressions and small occlusion affect the intensity manifold lo-cally. Under frequency-based representation, only high frequency spectrumis affected, called high frequency phenomenon. Moreover, changes in pose

Page 43: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

24 Introduction

or scale of a face affect the intensity manifold globally, in which only theirlow frequency spectrum is affected, called low frequency phenomenon. Onlya change in face will affect all frequency components.

The results of [Nastar and Ayache, 1996] shed light on how to solvethe problem in facial appearance variations - use mid-range frequency forrecognition. [Yuen et al., 1998] recently demonstrated that applying PCAmethod on Wavelet Transformed (WT) sub-image with mid-range frequencycomponents gives better recognition accuracy than (1) applying PCA onWT sub-image with low frequency components only, or (2) applying PCAon the original image that contains all frequency components.

In view of these, [Lai et al., 1999] combines Fourier transform andwavelet transform for face recognition. Their method is described as follows.First, a compact support and orthogonal wavelet is applied to decomposethe face image. The low-frequency subband of the decomposed is selected torepresent his mother image. It is an optimal approximate image of motherimage in lower dimension. Second, Fourier Transform (FT) is applied tothe low-frequency subband images and represents them.

In [Lai et al., 1999], Yale and Olivetti databases are selected to evaluatetheir method. One person from each database is shown in Figs. 1.14 and1.15. The Spectroface with different levels of wavelet decomposition of oneface image from Yale database is presented in Fig. 1.16.

It is reported that

• The performance of Spectroface is better than that of Eigenface andTemplate matching, especially for facial expression and occlusion(by glasses) images.• Spectroface approach is invariant to spatial translation. Both Eigen-

face and Template matching methods are sensitive to the spatialtranslation.• The computation complexity of Spectrofaces is dependent on wavelet

packet. Expanding N vectors Xn ∈ Rd : n = 1, 2, .., N intowavelet packet coefficients is in O(Nd log d).

2. Nonlinear Wavelet Approximation MethodFor a 2D orthonormal wavelet basis, let ψ1, ψ2 and ψ3 be three 2D

wavelets, ψ0 := φ be the corresponding scaling function, and

ψk,ej := 2k/2ψe(2kx− j), ∀e ∈ k,

Page 44: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Brief Review of Pattern Recognition with Wavelet Theory 25

Fig. 1.15 Images of one person in Olivetti database.

where

k := 1, 2, 3, k > 0,0, 1, 2, 3, k = 0.

Thus, any f ∈ L2(I) can be written by

f =∑k≥0

∑j

∑e∈k

ck,ej ψk,ej .

Let X = spanψk,ej : e ∈ k, 0 ≤ k < K, j ∈ Z2, then the approximationelement

f =∑

0≤k<K

∑j

∑e∈k

ck,ej ψk,ej

consists of

N = 3(2K−1 · 2K−1 + 2K−2 · 2K−2 + · · ·+ 21 · 21 + 20 · 20) = 22K

Page 45: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

26 Introduction

Fig. 1.16 (a) The original image; (b) The frequency representation of image (a);(c) Spectroface with 1-level wavelet decomposition; (d) Spectroface with 3-levelwavelet decomposition.

terms in the sum. It is the unique best approximation element of f in X ,and the linear approximation is presented by

||f − f ||L2(I) ≤ N−α/2||f ||Wα(L2(I)).

For any sequence ck,ej , let ℵ(ck,ej ) be the number of nonzero items.We can denote

∑N

:=

∑k≥0

∑j

∑e∈k

ck,ej ψk,ej |ℵ(ck,ej ) ≤ N .

For any

f =∑k≥0

∑j

∑e∈k

ck,ej ψk,ej ,

we keep N coefficients with larger amplitudes and eliminating the smallones. Thus, an approximation f can be got, and f ∈ ∑

N . Finally, thenonlinear wavelet approximation can be arrived:

||f − f ||L2(I) ≤ N−α/2||f ||Bασ (Lσ(I)),

where, Bασ (Lσ(I)) is a Besov space, 0 < α < 1 and σ = 2/(1 + α).

Page 46: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Brief Review of Pattern Recognition with Wavelet Theory 27

L. H. Yang et al. propose a method to face recognition using the non-linear wavelet approximation [Yang et al., 2003b]. As mentioned by the au-thors, the linear wavelet approximation cannot reduce the approximationerror by adding more coefficients. The nonlinear wavelet approximationhas an important advantage over the linear one due to its ability to do so.

3. Wavelet Packets Transform for Classification of Facial ImagesA. Z. Kouzani and S. H. Ong [Kouzani and Ong, 2003] utilize wavelet

packets transform for lighting-effects classification in facial images. Thewavelet packets transform is a generalization of the wavelet transform. Inthe wavelet transform, only the low-pass filter is iterated. It is assumed thatlower frequencies contain more important information than higher frequen-cies. This assumption is not true for many images. The main differencebetween the wavelet packets transform and the wavelet transform is that,in the wavelet packets, the basic two-channel filter bank can be iteratedeither over the low-pass branch or the high-pass branch. This provides anarbitrary tree structure with each tree corresponding to a wavelet packetsbasis. It can offer a choice of optimal bases for the representation of specificsignal. The basis can be selected to minimize the number of significantlynonzero coefficients in the transform [Kouzani and Ong, 2003]. Entropyis a suitable function for choice of the best basis. Shannon’s equation forentropy enables searching for the smallest entropy expansion of a signal. Itis presented below:

ε2(v; Hi, Hj) = − ||v+||2||v||2 ln

( ||v+||2||v||2

)− ||v−||

2

||v||2 ln( ||v−||2||v||2

)+ ||v+||2ε2

(v+||v+||2 , Hi

)+ ||v−||2ε2

(v−||v−||2 , Hj

),

where, H is a Hilbert space, v ∈ H , ||v|| = 1 and H = ⊕∑Hi is anorthogonal decomposition of H .

The best basis algorithm [Kouzani and Ong, 2003] minimizes the costfunction for the transform coefficients. It takes a complete decompositionaccording to the wavelet packets transform. In each node, which corre-sponds to a subspace of the image, the cost of the coefficient of the subspaceis calculated and iterated.

Page 47: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

28 Introduction

1.2.3 Hand Gestures Classification

1. Visual Hand Gestures Classification Using Wavelet TransformsInteraction is a common activity of our daily life. Hand actions play a

very important role in the interaction. To improve human machine inter-action and for helping disable people, it is desirable for machines to extractmore information from human hand actions [Kumar et al., 2003]. Someexamples of hand gestures are illustrated in Fig. 1.17. The meanings ofthese gestures are “hold”, “three”, “victory” and “point” from left to right.

Fig. 1.17 Examples of human hand gestures [Kumar et al. 2003].

S. Kumar et al. present a novel technique for classifying human handgestures based on stationary wavelet transform (SWT) [Kumar et al., 2003].It uses view-based approach for representation of hand action, and artificialneural networks (ANN) for classification. This approach applies a cumula-tive image-difference method in the representation of action, which resultsin the construction of motion history image (MHI). Let I(x, y, n) be animage sequence and let

D(x, y, n) = |I(x, y, n)− I(x, y, n− 1)|,

where, I(x, y, n) is the intensity of each pixel at location (x, y) in the nthframe and D(x, y, n) is the difference of consecutive frames representingregions of motion. Binarization of the difference image D(x, y, n) over athreshold τ is B(x, y, n)

B(x, y, n) =

1 if D(x, y, n) > τ,

0 otherwise.

Page 48: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Brief Review of Pattern Recognition with Wavelet Theory 29

The motion history image MHI(HN(x, y)) is

MHI(HN (x, y)) = max

(N−1⋃n=1

B(x, y, n)× n),

where, N represents the duration of the time window used to capture themotion.

hh

f

Artificial

Network(ANN)

Classifierhl

f

Motion History Image (MHI)

f

Video Dataf ll

lh

(SWT)

wavelet transform

NeuralStationary Temporal integration

Fig. 1.18 The schematic diagram of the approach [Kumar et al. 2003].

These MHI’s are decomposed into four sub-images (fll, flh, fhl, fhh)using stationary wavelet transform. The average image (fll) is fed as theglobal image descriptor to the artificial neural networks (ANN) for classifi-cation. The schematic diagram of the approach is illustrated in Fig. 1.18.

2. Hand Gestures Classification by Wavelet Transforms and Mo-ment Based Features

S. Kumar and D. K. Kumar [Kumar and Kumar, 2005] propose a noveltechnique for classifying human hand gestures based on stationary wavelettransform (SWT) and geometric based moments. According to uniquenesstheory of moments for a digital image of size (N,M), the (p + q)th-ordermoments mpq are calculated by

mpq =1

NM

N∑x=1

M∑y=1

f(x, y)xpyq,

where p, q = [0, 1, 2, ..., n].

Page 49: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

30 Introduction

The schematic diagram of the wavelet-moment approach is illustratedin Fig. 1.19.

15−Element Vector

Neural Networkof Hand Actions

Artificial

Classified HandAction Classes

Feature ExtractionNormalized Centralized

Moments

Tempolate Sub ImagesResidues of

Levels 3, 4, 5 Low Pass

(Template Generation)Temporal Integration

Wavelet Transform

of Each Template

Video Data

Fig. 1.19 The schematic diagram of the wavelet-moment approach [Kumar and Kumar,2005].

3. Wavelet Directional Histograms of The Spatio-Temporal Tem-plates of Human Gestures

A. Sharnia et al. [Sharnia et al., 2004] evaluate the efficacy of direc-tional information of wavelet multi-resolution decomposition to enhancehistogram-based classification of human gestures. The gestures are repre-sented by spatio-temporal templates. This template collapses the spatialand temporal components of motion into a static gray scale image suchthat no explicit sequence matching or temporal analysis is required, andit reduces the dimensionality to represent motion. These templates aremodified to be invariant to translation and scale. Two-dimensional, 3-leveldyadic wavelet transforms are applied on the template resulting in one low-pass sub-image and nine highpass directional sub-images. Histograms ofwavelet coefficients at different scales are used for classification purposes.The experiments demonstrate that while the statistical properties of thetemplate provide high level of classification accuracy, the global detail ac-tivity available in highpass decompositions significantly improve the classi-fication accuracy.

Page 50: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Brief Review of Pattern Recognition with Wavelet Theory 31

1.2.4 Classification and Clustering

Classification process can be categorized into two types:

• The classification with supervised learning: In this type of classi-fication, there is a supervisor to teach the recognition system howto classify a known set of patterns, and thereafter, it let the sys-tem go ahead freely to classify other patterns. In this way, a prioriinformation is needed to form the basis of the learning [Bow, 1992].• The classification with non-supervised learning: The classification

process is not depend on a priori information. Clustering is the non-supervised classification, which is the process of generating classeswithout any a priori knowledge about the patterns; neither can theproper training pattern sets be obtained.

As for the supervised classification with wavelet theory, there is one chapterin this book to discuss it. For the non-supervised classification, that is theclustering, this sub-section gives an example [Murtagh and Starck, 1998],where the wavelet theory is applied to clustering.

1. Classifier Design Based on Orthogonal Wavelet SeriesReport [Tang and Ma, 2000] discusses the supervised classification. It

provides an in-depth examination of the classifier design problem. First,it presents an overview of the fundamentals in pattern classifier design. Inso doing, the emphasis is on minimum average-loss classifier design andminimum error-probability classifier design. Next, [Tang and Ma, 2000]specifically describes and discusses the use of orthogonal wavelet series inclassifier design. It addresses the issue of how to derive a probability den-sity estimate based on orthogonal wavelet series. From the multiresolutiontheory in wavelet analysis, it is know that

L2(R) =⋃

mVm.

Let pm(x) denote the orthogonal project of p(x) in space Vm. Thus, it canbe found that

(L2) limm→∞ pm(x) = p(x), pm(x) =

+∞∑n=−∞

amn2m/2φ(2mx− n).

Page 51: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

32 Introduction

The minimum mean square error estimator of pm(x) can be written as

pm(x) =+∞∑

n=−∞[1N

N∑i=1

2m/2φ(2mXi − n)]2m/2φ(2mx− n).

A theorem is proved by [Tang and Ma, 2000], which indicates that whenscaling function φ(x) and unknown density function p(x) satisfy certainspecific properties, orthogonal wavelet series density estimator pm(x) willconverge to p(x).

Let scaling function φ(x) ∈ Sr, and for a certain λ ≥ 1, it satisfies prop-erty Zλ. Let X be a continuous bounded density function random variable,and X1, X2, · · · , XN be N independent identically distributed samples ofX . Thus, if

p(x) ∈ Hα, α > λ+12,m ≈ lgN/(2λ+ 1)lg2,

then

E|pm(x)− p(x)|2 ≤ O(2−2mλ).

From the discussions in [Tang and Ma, 2000], we can note that the or-thogonal wavelet series estimator differs from the kernel estimator and thetraditional orthogonal series density estimator. Its basic idea shares somesimilarities to that of the traditional orthogonal series density estimator.However, it also satisfies several key properties of kernel estimator and ex-hibits some additional features. Generally speaking, the orthogonal waveletseries density estimator represents a new non-parametric way of estimat-ing density functions, which has a great potential for practical applications.For instance, in pattern classifier design, sometimes, the probability densityfunction, p(x), of a certain feature vector may not be available. In sucha case, we can readily replace p(x) with pm(x) using the above-describedorthogonal wavelet series density estimator, and thus, effectively design theclassifiers.

2. Neuro-Wavelet Classifier for Multispectral Remote SensingImages

A neuro-wavelet supervised classifier is proposed in [Shankar et al., 2007]for land cover classification of multispectral remote sensing images. Fea-tures extracted from the original pixels information using wavelet transform(WT) are fed as input to a feed forward multi-layer neural network (MLP).

Page 52: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Brief Review of Pattern Recognition with Wavelet Theory 33

The WT basically provides the spatial and spectral features of a pixel alongwith its neighbors and these features are used for improved classification.For testing the performance of the proposed method, Two IRS-1A satel-lite images and one SPOT satellite image are used. Results are comparedwith those of the original spectral feature based classifiers and found tobe consistently better. Simulation study revealed that Biorthogonal 3.3(Bior3.3) wavelet in combination with MLP performed better compared toall other wavelets. Results are evaluated visually and quantitatively withtwo measurements, β index of homogeneity and Davies-Bouldin (DB) indexfor compactness and separability of classes. [Shankar et al., 2007] suggesteda modified β index in accessing the percentage of accuracy (PAβ) of theclassified images also.

3. Pattern Clustering Based on Noise Modeling in Wavelet SpacePoint pattern clustering has constituted one of major strands in Cluster

analysis. [Murtagh and Starck, 1998] describes an effective approach to ob-ject or feature detection in point patterns via noise modeling. Two advan-tages arrive at in this work, namely: (1)a multiscale approach with wavelettransform is computationally very efficient; (2) a direct treatment of noiseand clutter, which leads to improve cluster detection. In this approach,the noise modeling is based on a Poisson process, and a non-pyramidal (orredundant) wavelet transform is applied.

Given a planar point pattern, a 2-D image is created by the following:

• Producing the tuple (x, y, 1) when a point at (x, y) with value one;• Projecting onto a plane by using a regular discrete grid (image)

and assigning the contribution of points to the image pixels by aninterpolation function, used by a wavelet transform referred to asa trous algorithm with a cubic B-spline.• The a trous algorithm is then employed to the resulting image. The

significant structures are extracted at each wavelet decompositionlevel, according to the noise model for the original image, (x, y, 1).

The detailed description of the non-pyramidal (or redundant) wavelettransform can be found in [Shensa, 1992]. A summary of the “a trous”wavelet transform is presented below:

Step-1 To initialize i to 0, starting with an image ci(k), i.e. c0(k), whichis the input image. The index k ranges over all pixels in the image.

Page 53: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

34 Introduction

Step-2 To increment i, and thereafter, carry out a discrete convolution ofthe image with a filter h to obtain ci−1(k). The distance betweena central pixel and adjacent ones is 2i−1. Note that the filter h isbased on a cubic B-spline (5×5 filter).

Step-3 To obtain the discrete wavelet transform, wi(k) = ci−1(k)− ci(k).Step-4 To return to step 2 if i is less than the number of resolution levels

wanted (let p be the number of resolution levels).

As the result, the set

W = w0, w1, ..., wp, cp

is produced, which represents the wavelet transform of the image, where cpdenotes a residual. Therefore, the following additive decomposition can beapplied to the input image, c0(k):

c0(k) = cp +p∑i=1

wi(k).

Fig. 1.20 shows a point pattern set, which is the simulated Gaussiancluster with 300 and 259 points, and background Poisson noise with 300points. Fig. 1.21 presents the corresponding wavelet transform. Waveletscales 1-6 are shown in sequence, left to right, starting at the upper leftcorner.

Images and sets of point patterns generally contain noise. Thus, thewavelet coefficients are noisy too. In most applications, it is necessary toknow if a wavelet coefficient is produced from signal (i.e. it is significant)or due to the noise. [Murtagh and Starck, 1998] develops a statisticalsignificance test to treat this problem. It defines that

P = Prob(|wj | < τ),

were τ denotes the detection threshold, which is defined for each scale.Given an estimation threshold, ε, if P < ε, the wavelet coefficient valuecannot be due to the noise along, and a significant wavelet coefficient canbe detected.

The multiresolution support can be obtained by detecting the significantcoefficients at each scale level. The multiresolution support is defined as

Page 54: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Brief Review of Pattern Recognition with Wavelet Theory 35

Fig. 1.20 An example of the point pattern [Murtagh and Starck, 1998].

follows [Starck et al., 1995]:

M(j, x, y) =

1 if wj(x, y) is significant,0 if wj(x, y) is not significant.

The algorithm to create the multiresolution support is presented below:

Step-1 To compute the wavelet transform of the image;Step-2 To estimate the noise standard deviation at each scale, and there-

after, deduce the statistically significant coefficients at each scalelevel;

Step-3 To booleanize each scale, which can lead to the multiresolutionsupport;

Step-4 To modify using a priori knowledge if desired.

Page 55: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

36 Introduction

Fig. 1.21 Wavelet transform of the point pattern with scales of 1-6 [Murtagh and Starck,1998].

In order to visualize the multiresolution support, we can create an image Sdefined by

S(x, y) =p∑j=1

2jM(j, x, y). (1.6)

Fig. 1.22 is related to the multiresolution support image of the 5th scaleimage in Fig. 1.21. [Murtagh and Starck, 1998] uses this method to carry

Page 56: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Brief Review of Pattern Recognition with Wavelet Theory 37

Fig. 1.22 The multiresolution support image at the 5th scale level of the wavelet trans-form of the point pattern shown in Fig. 1.20 [Murtagh and Starck, 1998].

out three examples: (1) excellent recovery of Gaussian clusters, (2) diffuserectangular cluster, and (3) diffuse rectangle and fuzzier Gaussian clusters.The results show that the computational complexity is O(1).

1.2.5 Document Analysis with Wavelets

Document processing is one of the most active branches in the area ofpattern recognition. Documents contain knowledge. Precisely, they aremedium for transferring knowledge. In fact, much knowledge is acquiredfrom documents such as technical reports, government files, newspapers,books, journals, magazines, letters, bank cheques, to name a few. Theacquisition of knowledge from such documents by an information systemcan involve an extensive amount of hand-crafting. Such hand-crafting istime-consuming and can severely limit the application of information sys-tems. Actually, it is a bottleneck of information systems. Thus, automatic

Page 57: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

38 Introduction

knowledge acquisition from documents has become an important subject.Since the 1960’s, much research on document processing has been done[Tang et al., 1994]. Recently, the wavelet theory has been employed inthis research [Liang et al., 1999; Tang et al., 1995a; Tang et al., 1996a;Tang et al., 1997a; Tang et al., 1997c].

In this book, we have a chapter to give a detailed presentation of wavelet-based document processing. In this sub-section, another achievement ispresented below:

1. Form-Document Analysis by Reference Line Detection with2-D Wavelet Transform

The major characteristics of forms are analyzed in [Tang et al., 1997a]:

• In general, a form consists of straight lines, which are orientedmostly in horizontal and vertical directions. These lines are referredto as reference lines.• The reference lines are pre-printed to guide the users to complete

the form.• The information that should be entered to computer and processed

is usually the filled data.• In order to indicate the filling position, the reference lines can be

used and the filled information usually appears either above, be-neath, or beside these reference lines. Thus, in form processing,the reference lines have to be detected first, then we can find theuseful information from a form based on them, and thereafter, enterto the computers.

In [Tang et al., 1997a], a novel wavelet-based method is presented. Inthis method, two-dimensional multiresolution analysis (MRA), wavelet de-composition algorithm, and compactly supported orthonormal wavelets areused to transform a document image into several sub-images. Based onthese sub-images, the reference lines of a complex-background documentcan be extracted, and knowledge about the geometric structure of the doc-ument can be acquired. Particularly, this approach appears to be moreefficient in processing form documents with multi-grey level background.

A document image can be transformed into four sub-images by applyingthe Mallat algorithm, namely, (1) LL sub-image, (2) LH sub-image, (3)HL sub-image, and (4) HH sub-image. We are interested in the LH andHL sub-images. The LH sub-image is achieved from a filter which allows

Page 58: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Brief Review of Pattern Recognition with Wavelet Theory 39

lower frequency components to reach across along the horizontal direction,as well as the higher frequencies along the vertical direction. That is an“enhancing” effect on the vertical, and “smoothing” effect on the horizontal.As a result, only horizontal lines remain in the LH sub-image. The situationof the HL sub-image is opposite to that of the LH one. In this way, thehorizontal direction of the filter opens for the higher frequencies, and thevertical direction for lower frequency components. That is an “enhancing”effect on the horizontal, and “smoothing” effect on the vertical. Thus, onlyvertical lines remain in the HL sub-image.

2. Multiresolution Hadamard Representation and Its Applicationto Document Image Analysis

A novel class of wavelet transform referred to as the multiresolutionHadamard representation (MHR) is proposed by [Liang et al., 1999] fordocument image analysis.

The multiresolution Hadamard representation (MHR) is a 2-D dyadicwavelet representation which employs two Hadamard coefficients [1, 1, 1, 1]and [1,−1,−1, 1] as shown in Fig. 1.23. These coefficients are further nor-malized with respect of l1 norm [Mallat, 1989c].

The 2-D dyadic wavelet representation is produced by applying the 1-D filters h(·) and g(·)to the 2-D image in both horizontal and verticaldirections. This representation comprises four channels, namely, low-passedL, horizontal H , vertical V and diagonal D, at each level of transform.These channels can be defined by the following iterative formulas:

Lu,v,j+1 =∫x

∫y

Lu,v,jh(x− 2u)h(y − 2v),

Hu,v,j+1 =∫x

∫y

Lu,v,jh(x− 2u)g(y − 2v),

Vu,v,j+1 =∫x

∫y

Lu,v,jg(x− 2u)h(y − 2v),

Du,v,j+1 =∫x

∫y

Lu,v,jg(x− 2u)g(y − 2v),

where x and u are horizontal coordinates, y and v are vertical ones. Notethat when j = 0, Lu,v,j denotes the original image.

The L(j+1) channel is obtained by the convolution of Lj with the 2-Dfilter h(x)h(y) shown in Fig. 1.24. The H(j+1)(V(j+1)) channel is producedby the convolution of Lj with the 2-D filter h(x)g(y)(h(y)g(x)). Since the

Page 59: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

40 Introduction

1 2 3

1 2 3 4

4

(a)

(b)

Fig. 1.23 The basic functions of the multiresolution Hadamard representation(MHR): (a) The low-pass filter h(·); (b) The high-pass filter g(·) [Liang et al.,1999].

shape of h(x)g(y)(h(y)g(x)) is similar to a horizontal (vertical) bar, this 2-Dfilter serves as a detector for horizontal (vertical) bars on Lj, which can begraphically illustrated in Fig. 1.25. The D(j+1) channel is obtained by theconvolution of Lj with the 2-D filter g(x)g(y). It is displayed graphicallyin Fig. 1.26.

In [Liang et al., 1999], the multiresolution Hadamard representation(MHR) is applied to document image analysis including the following pro-cesses:

• the exaction of half-tone picture,• segmentation of document image into text blocks, and• determination of character scales for each text block.

The transformed values of the vertical strokes of characters are very positivein some of the V channels, while, the horizontal strokes of characters reactstrongly in the H channels. The diagonal strokes of characters, on theother hand, react in both H and V channels. The pictures in newspapersare generally produced by half tones, where the tone of the pictures is

Page 60: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Brief Review of Pattern Recognition with Wavelet Theory 41

Fig. 1.24 The L channels of the 2-D filters h(·)g(·) [Liang et al., 1999].

Fig. 1.25 The H and V channels of the 2-D filters h(·)g(·) [Liang et al., 1999].

produced by small block dots with varying densities. While charactersshow up their strengths in the H and V channels, a half-tone picture reactsas a significant regular pattern in the D channel. This pattern is producedwhen the half-tone pictures are filtered by (g(x)g(y)).

In [Liang et al., 1999], the multiresolution Hadamard representation(MHR) is used to treat a portion of Chinese newspaper as shown in Fig. 1.27.

Page 61: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

42 Introduction

Fig. 1.26 The D channels of the 2-D filters h(·)g(·) [Liang et al., 1999].

Fig. 1.27 A portion of Chinese newspaper [Liang et al., 1999].

It contains Chinese characters of three different sizes. The MHR developedin [Liang et al., 1999] picks up three text blocks with different scales fromthe original image, which are presented in Fig. 1.28. The multiresolutionHadamard representation of Fig. 1.27 is illustrated in Fig. 1.29, where thescale is j = 1.

The detailed description can be referred to [Liang et al., 1999].

Page 62: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Brief Review of Pattern Recognition with Wavelet Theory 43

Fig. 1.28 Three text blocks with different scales [Liang et al., 1999].

1.2.6 Analysis and Detection of Singularities with Wavelets

A significant application of wavelet theory is the analysis of singularities.Many methods based on wavelet theory have been developed to analyze theproperties of the singularities and detect them from various signals/images,and some examples can be found in [Chen et al., 1995; Chen and Yang, 1995;Chuang and Kuo, 1996; Deng and Lyengar, 1996; IEEE, 1993; Law et al.,1996; SPIE, 1994; Tang et al., 1997c; Tang et al., 1998d; Thune et al., 1997;Tieng and Boles, 1997a; Young, 1993]. The edge is one class of singu-larities, which commonly appear in both the one-dimensional signals andtwo-dimensional images. The subject of wavelet transform is a remarkablemathematical tool to analyze the singularities including the edges, and fur-ther, to detect them effectively. A significant study related to this researchtopic has been done by Mallat, Hwang and Zhong, and published in theSpecial Issue on Wavelet Transforms and Multresolution Signal Analysisof the IEEE Trans. on Information Theory [Mallat and Hwang, 1992] andIEEE Trans. on Pattern Analysis and Machine Intelligence [Mallat andZhong, 1992].

Corners the special type of edges, which are very attractive features formany applications in pattern recognition and computer vision. In [Chen

Page 63: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

44 Introduction

Fig. 1.29 The multiresolution Hadamard representation of Fig. 1.27 at scale j = 1[Liang et al., 1999].

et al., 1995], a new gray-level corner detection algorithm based on thewavelet transform is presented. The wavelet transform is used because theevolution across scales of its magnitudes and orientations can be used tocharacterize localized signals like edges including the corners. Most conven-tional corner detectors detect corners based on the edge detection informa-tion. However, these edge detectors perform poorly at corners, adversely af-fecting their overall performance. To overcome this drawback, [Chen et al.,1995] first proposes a new edge detector based on the ratio of the inter-scale wavelet transform modulus. This edge detector can correctly detectedges at the corner positions, making accurate corner detection possible.To reduce the number of points required to be processed, it applies thenon-minima suppression scheme to the edge image and extract the minimaimage. Based on the orientation variance, these non-corner edge points areeliminated. In order to locate the corner points, it proposes a new cornerindicator based on the scale invariant property of the corner orientations.By examining the corner indicator the corner points can be located ac-curately, as shown by experiments with the algorithm. In addition, sincewavelet transform possesses the smoothing effect inherently, this algorithmis insensitive to noise contamination as well.

Page 64: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Brief Review of Pattern Recognition with Wavelet Theory 45

1. Edge Detection with Local Maximal Modulus of WaveletTransform

A significant study related to this research topic is done by Mallat,Hwang and Zhong [Mallat and Hwang, 1992; Mallat and Zhong, 1992].Many important contributions are made in their papers. They have proventhat the maxima of the wavelet transform modulus can detect the locationsof the irregular structures. Further, a numerical procedures to calculatetheir Lipshitz exponents is provided. It also numerically shows that one-and two-dimensional signals can be reconstructed, with a good approxi-mation, from the local maxima of their wavelet transform modulus. Thealgorithm of the edge detection with local maximal modulus of wavelettransform is presented below:

Algorithm 1.1 Given an input digital signal f(k, l)|k = 0, 1, · · · ,K; l =0, 1, · · · , L

Step 1 To calculate the modulo of its wavelet transform

Msf(k, l)|k = 0, 1, · · · ,K; l = 0, 1, · · · , Las well as the codes

CodeAsf(k, l)|k = 0, 1, · · · ,K; l = 0, 1, · · · , Lalong the gradient directions;

Step 2 To take a threshold T > 0, for k = 0, 1, · · · ,K; l = 0, 1, · · · , L, if

(1) |Msf(k, l)| ≥ T ,(2) |Msf(k, l)| reaches its local maximum along the gradient di-

rection represented by CodeAsf(k, l),

then, (k, l) is an edge pixel.

2. Detection of Step-Structure Edges by Scale-Independent Al-gorithm and MASW Wavelet Transform

The local maxima modulus of the wavelet transform can provide enoughinformation for analyzing the singularities, and can detect all singularities.However, it may not identify different structures of singularities [Mallat andHwang, 1992; Mallat and Zhong, 1992].

In [Tang et al., 1998c], an important property is proved that the modu-lus of wavelet transform at each point of the step edge is a non-zero constant

Page 65: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

46 Introduction

which is independent on both the gradient direction and the scale of thewavelet transform. Thus, a novel algorithm called scale-independent algo-rithm is developed.

Algorithm 1.2 Given two-dimensional signal f(x, y)

Step 1: To take different scales s1, ..., sJ , and calculate Wsjf(x, y), (1 ≤j ≤ J) based on

W 1s f(n,m) =

∑k,l

f(n− 1− k,m− 1− l)ψs,1k,l ,

W 2s f(n,m) =

∑k,l

f(n− 1− k,m− 1− l)ψs,2k,l .

Step 2: To select peak-threshold T , such that

|∇Wsj f(x, y)| ≥ T.Step 3: To select proportional threshold R, such that

1R≤ |∇Wsjf(x, y)||∇Wsl

f(x, y)| ≤ R, (1 ≤ j ≤ J).

This method possesses an important property, i.e. the wavelet transformof a step-structure edge is scale-independent. It can improve the methodproposed in [Mallat and Hwang, 1992; Mallat and Zhong, 1992], where themodulus-angle-separated-wavelet (MASW) is used. The precise definitionof the MASW can be found in [Tang et al., 1998c; Tang et al., 1998d]. Afterapplying the scale-independent algorithm to the images, only the contourof the aircraft is extracted, while all other edges including drawing linesand texts are eliminated.

In this book, we have a specific chapter to give a detailed example ofthis application.

1.2.7 Wavelet Descriptors for Shapes of the Objects

Shape of a pattern is one of the most important features in pattern recog-nition. The description of such a shape plays a key role in shape analy-sis. Many research projects [Chuang and Kuo, 1996; Hsieh et al., 1995;Tieng and Boles, 1997b; Wunsch and Laine, 1995] present some shape de-scriptors, which can represent digitized patterns. These descriptors are

Page 66: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Brief Review of Pattern Recognition with Wavelet Theory 47

derived from the wavelet transform of the contours of a pattern and par-ticularly well-suited for the recognition of two-dimensional objects, such ashandprinted characters. Three examples are presented below:

1. Wavelet Descriptor of Planar Curves: Theory and ApplicationsBy using the wavelet transform, [Chuang and Kuo, 1996] develops a hi-

erarchical planar curve descriptor that decomposes a curve into componentsof different scales so that the coarsest scale components carry the global ap-proximation information while the finer scale components contain the localdetailed information. It shows that the wavelet descriptor has many desir-able properties such as multirsolution representation, invariance, unique-ness, stability, and spatial localization. A deformable wavelet descriptoris also proposed by interpreting the wavelet coefficients as random vari-ables. The applications of the wavelet descriptor to character recognitionand model-based contour extraction from low SNR images are examined.Numerical experiments are performed to illustrate the performance of thewavelet descriptor.

2. Wavelet Descriptors for Multiresolution Recognition Of Hand-printed Characters

Paper [Wunsch and Laine, 1995] presents a novel set of shape descriptorsthat represents a digitized pattern in concise way and that is particularlywell-suited for the recognition of handprinted characters. The descriptor setis derived from the wavelet transform of a pattern’s contour. The approachis closely related to feature extraction methods by Fourier Series expansion.The motivation to use an orthonormal wavelet basis rather than the Fourierbasis is that wavelet coefficients provide localized frequency information,and that wavelets allow us to decompose a function into a multiresolutionhierarchy of localized frequency bands. This paper describes a characterrecognition system that relies upon wavelet descriptors to simultaneouslyanalyze character shape at multiple levels of resolution. The system wastrained and tested on a large database of more than 6000 samples of hand-printed alphanumeric characters. The results show that wavelet descriptorsare an efficient representation that can provide for reliable recognition inproblems with large input variability.

3. Wavelet-Based Shape form ShadingPaper [Hsieh et al., 1995] proposes a wavelet-based approach for solv-

ing the shape from shading (SFS) problem. The proposed method takes

Page 67: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

48 Introduction

advantage of the nature of wavelet theory, which can be applied to effi-ciently and accurately represent “things,” to develop a faster algorithm forreconstructing better surfaces. To derive the algorithm, the formulationof Horn and Brooks ((Eds.) Shape from Shading, MIT Press, Cambridge,MA,1989), which combines several constraints into an objective function,is adopted. In order to improve the robustness of the algorithm, two newconstraints are introduced into the objective function to strengthen therelation between an estimated surface and its counterpart in the originalimage. Thus, solving the SFS problem becomes a constrained optimizationprocess. Instead of solving the problem directly by using Euler equationor numerical techniques, the objective function is first converted into thewavelet format. Due to this format, the set of differential operators ofdifferent orders, which is involved in the whole process, can be approxi-mated with connection coefficients of Daubechies bases. In each iterationof the optimization process, and appropriate stem size, which can result inmaximum decrease of the objective function, is determined. After findingcorrect iterative schemes, the solution of the SFS problem can finally bedecided. Compared with conventional algorithms, the proposed scheme is agreat improvement in the accuracy as well as the convergence speed of theSFS problem. Experimental results, using both synthetic and real images,prove that the proposed method is indeed better than traditional methods.

4. Representation of 2-D Pattern by 1-D Wavelet Sub-patternsTang [Tang et al., 1998a] presents an approach to represent a 2-D shape

by several 1-D wavelet sub-patterns. In this way, first, a 2-D pattern isconverted into an 1-D curve by the dimensionality reduction [Tang et al.,1991]. Thereafter, according to the wavelet orthonormal decomposition,the 1-D curve can be decomposed orthogonally into several high-frequencysub-curves and low-frequency ones using the wavelet transform.

5. Wavelet Descriptors for Multiresolution Recognition Of Hand-printed Characters

Paper [Wunsch and Laine, 1995] presents a novel set of shape descriptorsthat represents a pattern in concise way and that is particularly well-suitedfor the recognition of handprinted characters. The descriptors are derivedfrom a contour of a pattern using wavelet transform. This method is closelyrelated to the feature extraction by Fourier series expansion. The motiva-tion to use an orthonormal wavelet basis rather than the Fourier one is

Page 68: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Brief Review of Pattern Recognition with Wavelet Theory 49

that wavelet coefficients provide localized frequency information, and thatwavelets allow us to decompose a function into a multiresolution hierarchyof localized frequency bands. This paper describes a character recognitionsystem where the wavelet descriptors are used to analyze character shape atmultiple levels of resolution. A large set of samples of handprinted alphanu-meric characters are used to train and test this system. The results showthat wavelet descriptors can efficiently represent the shapes of the objects,and can provide for reliable recognition with large input variability.

1.2.8 Invariant Representation of Patterns

The invariance characteristic of size, orientation and translation is a signifi-cant subject in pattern recognition. With such capability, a pattern recogni-tion system can find many applications in character recognition, computervision, document processing, and many others. A lot of researchers paid at-tention to this subject, many methods have been developed. Recently, newmethods in accordance with the wavelet-based approach have been made[Haley and Manjunath, 1999; Shen and Ip, 1999; Tieng and Boles, 1997b;Yoon et al., 1998]. In this sub-section, we introduce three papers, wherethe wavelet approach has been used [Shen and Ip, 1999; Tang et al., 1998a;Yoon et al., 1998].

1. Extraction of Rotation-Invariant Feature by Ring-projection-wavelet-fractal Method

In our previous work [Tang et al., 1998a], a novel approach to ex-tract features with property of rotation-invariant in pattern recognitionis presented, that utilizes ring-projection-wavelet-fractal signatures (RP-WFS). In particular, this approach reduces the dimensionality of a two-dimensional pattern by way of a ring-projection method, and thereafter,performs Daubechies’ wavelet transform on the derived one-dimensionalpattern to generate a set of wavelet transformed sub-patterns, namely,curves that are non-self-intersecting. Further from the resulting non-self-intersecting curves, the divider dimensions are readily computed. Thesedivider dimensions constitute a new feature vector for the original two-dimensional pattern, defined over the curves’ fractal dimensions.

An overall description of this approach can be illustrated by a diagramshown in Fig. 1.30. The detailed description of this method can be foundin Chapter 9 in this book.

Page 69: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

50 Introduction

Analysis

Transformation

DimensionFractalMultiresolutionComputation

Ring-Projection Divider

Dimension

Wavelet

Algorithm

Dimension

Reduction

2-DPattern

1-DPattern

FeatureVector

Sub-Patterns

Fig. 1.30 Diagram of Ring-projection-wavelet-fractal method.

2. Wavelet Rotation-Invariant Shape Descriptors for Recognitionof 2-D Pattern

In a pattern recognition system, typically, a set of numerical featuresare extracted from an image. The selection of discriminative features isa crucial step in the system. The use of moment invariants as featuresfor identification of 2D shape has received much attention. [Shen and Ip,1999] investigates a set of wavelet rotation invariant moments presented forcapturing global and local information from the objects of interest, togetherwith a discriminative feature extraction method, for the classification ofseemingly similar 2D objects with subtle differences.

To achieve rotation invariant moments, typically, a generalized expres-sion is used, which can be written by

Fpq =∫ ∫

f(r, θ)gp(r)ejqθrdrdθ, (1.7)

where Fpq denotes the pq-order moment, and gp(r) stands for a function ofradial variable r. In addition, p and q are integers. It has been proved that

• The value of ||Fpq || is rotation invariant, where ||Fpq || =√Fpq · F ∗

pq,and the symbol ∗ denotes conjugate of complex number.• The combined moments, such as Fpiq ·F ∗

pjq are also rotation invari-ant.

To facilitate the analysis, an expression of 1D sequence is substitutedfor that of the 2D image. Thus, Eq. 1.7 becomes

Fpq =∫Sq(r) · gp(r)rdr, (1.8)

Page 70: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Brief Review of Pattern Recognition with Wavelet Theory 51

where Sq(r) = f(r, θ)ejqθdθ. [Shen and Ip, 1999] treats gp(r) in Eq. 1.8as wavelet basis functions:

ψa,b(r) =1√a(r − ba

).

That indicates that the basis functions gp(r) are replaced by waveletbasis functions ψa,b(r). The mother wavelet used in this work is a cubicB-spline in Gaussian approximation form (Fig. 1.31):

ψ(r) =4an−1√2π(n+ 1)

σwcos(2πf0(2r − 1))

×exp(− (2r − 1)2

2σ2w(n+ 1)

),

where n = 3, a = 0.697066, f0 = 0.409177 and σ2w = 0.561145. The details

of this mother wavelet can be fund in [Unser et al., 1992]. Let a = 0.5m,m = 0, 1, 2, 3, and b = 0.5n0.5m, n = 0, 1, ..., 2m+1. Thereafter, the waveletdefined along a radial axis in any orientation is denoted by

ψm,n(r) = 2m2ψ(2mr − 0.5n)

Consequently, a set of wavelet moment invariants for classifying objects

Fig. 1.31 The cubic B-spline mother wavelet [Shen and Ip, 1999].

can be defined as follows:

||Fwaveletm,n,q || =∣∣∣∣∣∣∣∣∫ Sq(r) · ψm,n(r)rdr

∣∣∣∣∣∣∣∣ , (1.9)

Page 71: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

52 Introduction

where ψm,n(r) replaces gg(r) in Eq. 1.8. The parameters are: m = 0, 1, 2, 3,n = 0, 1, ..., 2m+1, and q = 0, 1, 2, 3. It can be fund that ||Fwaveletm,n,q || isactually a wavelet transform of Sq(r)r. ||Fwaveletm,n,q || can also be consideredto be the first moment of Sq(r) at the mth scale level with shift index n.It has been proved that the wavelet moment invariants, ||Fwaveletm,n,q ||, areinvariant to rotation of a object.

In [Shen and Ip, 1999], the wavelet moment invariants along with aminimum-distance classifier are used, and a high classification rate for fourdifferent sets of patterns are achieved. For instance, 100% recognition rateis obtained for a test set consisting of 26 upper cased English letters withdifferent scales and orientations.

3. Scale-Invariant Object Recognition Based on the Multiresolu-tion Approximation

Boundary-based pattern matching is one of the most useful approachesin pattern recognition. [Yoon et al., 1998] presents a multiresolution ap-proximation approach to obtaining boundary representation for object recog-nition. The summary of this approach is presented below:

It establishes the theory of the continuous multiresolution approxima-tion (CMA), and implements a fast algorithm for the continuous wavelettransform (CWT). The CMT is a vehicle for scale-invariant matching orcoarse-to-fine matching. In addition, the fast algorithm for the CWT en-ables us to quickly compute a representation. [Yoon et al., 1998] proposesgood representations for boundary-based object matching. The represen-tations are obtained using the CMA. These representations allow us torecognize objects in the presence of noise, occlusion, scale variation, rota-tion, and translation. It tests various types of objects such as tools, guns,maps, etc., with occlusion and scale variations. It also tests those objectsby adding various types of noise. The test results show the proposed rep-resentations are reliable and consistent.

Object matching in the presence of noise, occlusion, and scale variationsis considered the most difficult problem in the area of boundary-based ob-ject matching. [Yoon et al., 1998] call this scale-invariant matching. Tosolve this problem, the scaling effect of an object by using the CWT ismodeled. The model enables us to use the CWT for scale-invariant match-ing. Further, a scale-invariant representation is proposed to handle thescale-invariant matching.

Firstly, the modeling scaling effect of an object by using the wavelet

Page 72: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Brief Review of Pattern Recognition with Wavelet Theory 53

transform is introduced below:When an analog signal is converted to a digital one, the analog signal

is pre-filtered by a lowpass filter to reduce aliasing and it is then sampledas shown in Fig. 1.32. An object in a picture may have different scales asthe distance of the camera from the target object changes. Be means of thewavelet transform, the scaling effect of an object can be modeled, whichcan lead to generating a scale-invariant representation for the scaling effect.The mathematical description can be presented as follows:

(Lowpass)Lf (x)LPre-Filtering

Samplingf (n)f(x)

Fig. 1.32 Digitization of analog signal as pre-filtering and sampling [Yoon et al., 1998].

Let h(x) be the lowpass filter, thus, the output, fL(x), of the filteringof an original signal f(x) is

fL(x) = f(x) · h(x) =∫f(α)h(α − x)dα.

The filtered output of the scaled signal is

fL(sx) =1sf(sx) · h(x) =

∫1sf(sα)h(α− x)dα. (1.10)

Seting α′ = sα, Eq. 1.10 becomes

fL(sx) =∫

1sf(α′) · h

(α′

s− x

)dα′

s= f(x) · 1

sh(xs

). (1.11)

Eq. 1.11 is the same formulation as the wavelet transform at the scales, the filter h(x) is considered to be a continuous scaling function. Thisformulation implies that the scaling effect of an object in the process ofdigitization of an analog input image can be represented by the wavelettransform. This idea is the motivation for using the wavelet transform fora scale-invariant representation.

Secondly, the scale-invariant representation is established by means ofthe continuous multiresolution approximation (CMA). The CMA has two

Page 73: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

54 Introduction

important features to receive significant representations for pattern recog-nition, namely, (1) the CMA provides approximations of objects at variousscales, hence, scale-invariant representations can be constructed by usingthe approximations; (2) the representations can efficiently computed byusing the fast algorithm.

The approximation, Rs(k), Qs(k) of a boundary at the scale 2s ismathematically described as follows:

Rs(k) = [r(t) · β3s (−t)]t=pk, (1.12)

Qs(k) = [q(t) · β3s(−t)]t=pk, (1.13)

where p denotes the sampling period in the CWT. Applying Eq. 1.13to an original boundary r(t), q(t) produces a pair of functions for anapproximation of a boundary Rs(k), Qs(k) at each scale. The example ofan approximation is illustrated in Fig. 1.33. An original boundary is shownin Fig. 1.33(a), and an approximation of the original boundary at one-halfof the scale is presented in Fig. 1.33(b). The curvature function of thegun is displayed in Fig. 1.33(c). The curvature function is invariant underscaling, rotation, and translation of a curve. Moreover, zero crossings of thecurvature function are important features for shape analysis or recognition.Therefore, we can use the zero crossing of the curvature functions of theapproximations using the CWT to construct the proposed representations.

The detailed procedure to receive the scale invariant representation canbe presented by the following algorithm:

Step-1 Interpolation: To interpolate an original boundary with the lin-ear interpolation filter h1(n) given by

M(j, x, y) =

1− |n|

L |n| < L,

0 otherwise.

where L is an interpolation length between the original samples.Step-2 Initialization: To apply the dilated cubic B-spline filter for initial-

ization to obtain low-resolution boundaries at scales of 0.5 < s < 1.The low-resolution boundaries of the interpolated signal is given by

Rs(k) = [r(t) · 2sβ3(−2st)]t=2−sk.

Step-3 Decomposition: To obtain the low-resolution boundaries by use

Page 74: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Brief Review of Pattern Recognition with Wavelet Theory 55

(a)

(c)

(b)

Fig. 1.33 The example of an approximation of a gun boundary.

of the DWT, and is presented below:

Rs(k) = [Rs−1 · β32(k)]↓2

where the discrete filter β32(k) is a binomial one.

Step-4 Construction of scale-invariant representation: To computethe curvature functions and find zero crossings of the curvaturefunctions over the desired scales. Moreover, to construct the scale-invariant representation by making zero crossing on the t−k plane.

Experiments are conducted in [Yoon et al., 1998]. Several images, suchas guns, tools, maps, etc. are used. Some objects are taken from a camera,and some, for example, guns are from the X-ray. Maps are taken from a

Page 75: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

56 Introduction

commercial image database. The results have shown the proposed repre-sentations are reliable and consistent.

1.2.9 Handwritten and Printed Character Recognition

Character recognition including the identification of handwritten and printedcharacters is a major branch in the field of pattern recognition. A quite anumber of articles, which deal with this branch, have been published. How-ever, only a fewer have used wavelets [Lee et al., 1996; Tang et al., 1996b;Tang et al., 1998d; Tang et al., 1998a; Wunsch and Laine, 1995]. In thissub-section, two publications [Lee et al., 1996; Wunsch and Laine, 1995]are briefly introduced. In addition, a specific chapter in this book is avail-able to provide a detailed description of the character recognition with thewavelet theory.

1. Wavelet Descriptors for Recognition of Handprinted Charac-ters

Paper [Wunsch and Laine, 1995] describes a character recognition sys-tem that relies upon wavelet descriptors to simultaneously analyze charactershape at multiple levels of resolution. The system was trained and testedon a large database of more than 6000 samples of handprinted alphanu-meric characters. The results show that wavelet descriptors are an efficientrepresentation that can provide for reliable recognition in problems withlarge input variability.

2. Extracting Multiresolution Features in Recognition of Hand-written Numerals with 2-D Haar Wavelet

The well-known Haar wavelet is adequate for local detection of line seg-ments and global detection of line structures with fast computation. [Leeet al., 1996] develops a method based on the Haar wavelet. It enables usto have an invariant interpretation of the character image at different res-olutions and presents a multiresolution analysis in the form of coefficientmatrices. Since the details of character image at different resolutions gen-erally characterize different physical structures of the character, and thecoefficients obtained from wavelet transform are very useful in recogniz-ing unconstrained handwritten numerals. Therefore, in [Lee et al., 1996],wavelet transform with a set of Haar wavelets is used for multiresolutionfeature extraction in handwriting recognition.

Page 76: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Brief Review of Pattern Recognition with Wavelet Theory 57

In this way, we take

1 = cos2ω

2+ sin2 ω

2.

Let us write

|H(ω)|2 = cos2ω

2=

1 + cosω2

=14[1 + 2 cosω + cos2 ω + sin2 ω

]=

14[(1 + cosω)2 + sin2 ω

]=

∣∣∣∣1 + cosω − i sinω2

∣∣∣∣2 =∣∣∣∣1 + e−iω

2

∣∣∣∣2 ,so that

|H(ω + π)|2 = sin2 ω

2=

1− cosω2

=∣∣∣∣1− e−iω2

∣∣∣∣2 .Thus, we can take

H(ω) =1 + e−iω

2=

1∑k=0

1√2hke

−iωk,

where

h0 =1√2, h1 =

1√2.

The scaling function ϕ(x) and wavelet function ψ(x) can be represented by

ϕ(x) =

1 if 0 < x < 10 otherwise

(1.14)

and

ψ(x) = c1ϕ(2x)− c0ϕ(2x− 1) (1.15)

= ϕ(2x)− ϕ(2x− 1)

=

1 if 0 < x < 1

2

−1 if 12 ≤ x < 1

0 otherwise

Page 77: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

58 Introduction

An image of the handwritten character can be decomposed into itswavelet coefficients by using Mallat’s pyramid algorithm. By using Haarwavelets, an image F is decomposed as follows:

F =

w x

y z

⇒p q

r a b

c d

⇒s t

u v b

c d

a = 1/4(w + x+ y + z), b = 1/4(w − x+ y − z)c = 1/4(w + x− y − z), d = 1/4(w − x− y + z)s = 1/4(p+ q + r + a), t = 1/4(p− q + r − a)u = 1/4(p+ q − r − a), v = 1/4(p− q − r + a)

(1.16)

In Eq. (1.16), the image w, x, y, z is decomposed into image a, b,c, and d at resolution 2−1. The image a corresponds to the lowestfrequencies (D1), b gives the vertical high frequencies (D2), c the hori-zontal high frequencies (D3), and d the high frequencies in horizontal andvertical directions (D4). Likewise, the image p, q, r, a at resolution 2−1

is decomposed into image s, t, u, and v at resolution 2−2. Thisdecomposition can be archived by convolving the 2 × 2 image array withthe Haar masks as follows:

Djk = 1

4Ij+1 ⊗Hk k = 1, 2, 3, 4 (1.17)

where, ⊗ is the convolution operator, Djk are decomposed images at reso-

lution 2j , Ij+1 is 2 × 2 image at resolution 2j+1, and Hk are Haar masksdefined in Fig. 1.34.

1 1

1 1

1

1

-1

-1

1 1

-1 -1

1

1-1

-1

(a) (b) (c) (d)

Fig. 1.34 Haar masks (a) Lowest frequencies, (b) Vertical high frequencies, (c) Hori-zontal high frequencies, (d) High frequencies in horizontal and vertical directions.

Page 78: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Brief Review of Pattern Recognition with Wavelet Theory 59

D-1

1

D-1

2

D-1

3

D-1

4

D-2

1

D-2

2

D-2

3

D-2

4

(a)

(b)

(c)

(d)

Fig. 1.35 Overview of multiresolution feature extraction.

In this application, the decomposed results at resolution 2−1 and 2−2

are used as multiresolution features . Fig. 1.35 shows the process of mul-tiresolution feature extraction. Fig. 1.35(a) gives an input image of thehandwritten number “8”, its digitized image is shown in Fig. 1.35(b). Thedecomposed feature vector at resolution 2−1 is illustrated in Fig. 1.35(c),while the decomposed feature vector at resolution 2−2 is in Fig. 1.35(d).

These features are used to recognize the unconstrained handwritten nu-merals from the database of Concordia University of Canada (Fig. 1.36),Electro-Technical Laboratory of Japan (Fig. 1.37), and Electronics andTelecommunications Research Institute of Korea (Fig. 1.38). The errorrates are 3.20%, 0.83%, and 0.75%, respectively. These results are shownthat the proposed scheme is very robust in terms of various writing stylesand sizes. The detailed description of this application can be referred in[Lee et al., 1996].

3. Wavelet Descriptors for Recognition of Printed Kannada Textin Indian languages

An OCR system for Indian languages, especially for Kannada, a popular

Page 79: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

60 Introduction

Fig. 1.36 Handwritten numeral database of Concordia University of Canada.

Fig. 1.37 Handwritten numeral database of Electro-Technical Laboratory of Japan.

South Indian language, is developed in [Kunte and Samuel, 2007]. Someexamples of Kannada language is presented in Fig. 1.39.

1D discrete wavelet transform (DWT) is used for feature extraction.Daubechies wavelet from the family of orthonormal wavelets is considered.A DWT when applied to a sequence of coordinates from the charactercontour returns a set of approximation coefficients and a set of detailedcoefficients. The approximation coefficients correspond to the basic shapeof the contour (low frequency components) and the detailed coefficients

Page 80: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Brief Review of Pattern Recognition with Wavelet Theory 61

Fig. 1.38 Handwritten numeral database of Electronics and Telecommunications Re-search Institute of Korea.

Fig. 1.39 Some examples of Kannada text in Indian languages [Kunte and Samuel,2007].

correspond to the details of the contour (high frequency components), whichreflect the contour direction, curvature, etc. Neural classifiers are effectivelyused for the classification of characters based on wavelet features. Thesystem methodology can be extended for the recognition of other southIndian languages, especially for Telugu.

1.2.10 Texture Analysis and Classification

Texture is a specific kind of pattern, the texture analysis is one of themost important techniques used in the analysis and classification of images

Page 81: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

62 Introduction

where repetition or quasi-repetition of fundamental elements occurs. Sofar, there is no precise definition of texture. Three principal approachesare used in texture analysis, namely, statistical, spectral and structural. Inthis sub-section, several methods based on the wavelet theory [Haley andManjunath, 1999; de Wouwer et al., 1999a; de Wouwer et al., 1999b] areintroduced:

1. Wavelet correlation signatures for color texture characteriza-tion

In the last decade, multiscale techniques for gray-level texture analysishave been intensively used. [de Wouwer et al., 1999a] aims to extend thesetechniques to color images. It introduces wavelet energy-correlation signa-tures and derives the transformation of these signatures upon linear colorspace transformations. Experiments are conducted on a set of 30 naturalcolored texture images in which color and gray-level texture classificationperformances are compared. It is demonstrated that the wavelet correlationfeatures contain more information than the intensity or the energy featuresof each color plane separately. The influence of image representation incolor space is evaluated.

2. Rotation-Invariant Texture Classification Using a CompleteSpace-Frequency Model

A method of rotation-invariant texture classification based on a com-plete space -frequency model is introduced in [Haley and Manjunath, 1999].A polar, analytic form of a two-dimensional (2-d) Gabor wavelet is devel-oped, and a multiresolution family of these wavelets is used to computeinformation-conserving micro-features. From these micro-features, a micro-model, which characterizes spatially localized amplitude, frequency, and di-rectional behavior of the texture, is formed. The essential characteristicsof a texture sample, and its macro-features, are derived from the estimatedselected parameters of the micro-model. Classification of texture samplesis based on the macro-model derived from a rotation invariant subset ofmacro features. In experiments, comparatively high correct classificationrates were obtained using large sample sets.

3. Statistical Texture Characterization from Discrete WaveletRepresentation

Texture analysis plays an important role in many tasks of image pro-cessing, pattern recognition, robot vision, computer vision, etc. [de Wouwer

Page 82: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Brief Review of Pattern Recognition with Wavelet Theory 63

et al., 1999b] conjectures that the texture can be characterized by the statis-tics of the wavelet detail coefficients and therefore introduces two featuresets:

• The wavelet histogram signatures, which capture all first-orderstatistics using a model based approach;• The wavelet co-occurrence signatures, which reflect the coefficients’

second-order statistics.

The (average) best results are obtained by combining both feature sets.The introduced features are very promising for many image processing taskssuch as texture recognition, segmentation, and indexing image databases.

In this sub-section, we would like to briefly introduce the basic ideaof [de Wouwer et al., 1999b]. In this work, the authors combine the sta-tistical and multiscale view on texture. They conjecture that texture canbe completely characterized from the statistical properties of its multiscalerepresentation. The first-order statistical information is derived from thedetail image histogram. The detail histograms of natural textured imagescan be modeled by a family of exponential functions. Introducing the pa-rameters of this model as texture features completely describes the waveletcoefficients’ first-order statistics. Further, improvement in texture descrip-tion is obtained from the coefficients’ second-order statistics, which canbe described using the detailed image co-occurrence matrices. The mostcomplete description is obtained by combining both first- and second-orderstatistical information.

The 2-D discrete wavelet transform is applied in this work, which is aseparable filterbank:

Ln(bi, bj) = [Hx ∗ [Hy ∗ Ln−1]↓2,1]↓1,2(bi, bj) (1.18)

Dn1(bi, bj) = [Hx ∗ [Gy ∗ Ln−1]↓2,1]↓1,2(bi, bj) (1.19)

Dn2(bi, bj) = [Gx ∗ [Hy ∗ Ln−1]↓2,1]↓1,2(bi, bj) (1.20)

Dn3(bi, bj) = [Gx ∗ [Gy ∗ Ln−1]↓2,1]↓1,2(bi, bj) (1.21)

where ∗ denotes the convolution operator, ↓ 2, 1(↓ 1, 2) subsampling alongthe rows (columns), and L0 = I(x) is the original image. H and G are alow and bandpass filter, respectively.

The histogram of the wavelet detail coefficients are noted as hni(u);thus hni(u)du is the probability that a wavelet coefficient Dni(b) has avalue between u and u + du. The detail histograms of natural textured

Page 83: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

64 Introduction

images can be modeled by a family of exponential [Mallat, 1989b]:

h(u) = Ke−(|u|/α)β

. (1.22)

In this model, α and β are wavelet histogram signatures, which are easilyinterpreted as specific, independent characteristics of the detail histogram.They contain all first-order information present in the detail histogram. Eq.1.22 can employed for many texture analysis tasks.

When the features based on the first-order statistics do not suffice, thesecond-order statistics can improve the texture discrimination. The waveletco-occurrence signatures can reflect the coefficients’ second-order statis-tics. The element (j, k) of the co-occurrence matrix Cδθni is defined as thejoint probability that a wavelet coefficient Dni = j co-occurs with a coef-ficient Dni = k on a distance δ in direction θ. Formulas for eight commonco-occurrence features are provided in [de Wouwer et al., 1999b]. Thesefeatures extracted from the detail images are referred to as the waveletco-occurrence signatures.

A database consisting of 30 real-world 512×512 images from differentnatural scenes is used for the experiments, which is presented in Fig. 1.42.This database is available at

http : //www.white.media.mit.edu/vismod/imagery/V isionTexture,

which is provided by MIT Media Lab. Each image region is transformed toan overcomplete wavelet representation of depth four using a biorthogonalspline wavelet of order two [Unser et al., 1993]. Four different feature setsare generated, namely:

• 12 wavelet energy signatures,• 24 wavelet histogram signatures,• 96 wavelet co-occurrence signatures• All feature from 2 and 3.

The results of the experiments can be found in [de Wouwer et al., 1999b].

4. Adaptive Scale Fixing for Multiscale Texture SegmentationK. H. Liang and T. Tjahjadi [Liang and Tjahjadi, 2006] address two

challenging issues in unsupervised multiscale texture segmentation: deter-mining adequate spatial and feature resolutions for different regions of theimage, and utilizing information across different scales/resolutions. The

Page 84: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Brief Review of Pattern Recognition with Wavelet Theory 65

Fig. 1.40 Selection of images from the VisTex-database used in [de Wouwer etal., 1999b].

center of a homogeneous texture is analyzed using coarse spatial resolu-tion, and its border is detected using fine spatial resolution so as to locatethe boundary accurately. The extraction of texture features is achievedvia a multiresolution pyramid. The feature values are integrated acrossscales/resolutions adaptively. The number of textures is determined auto-matically using the variance ratio criterion. Experimental results on syn-thetic and real images demonstrate the improvement in performance of theproposed multiscale scheme over single scale approaches.

Adaptive scale fixing is a method which determines the optimum wsat a site s for segmentation. It also facilitates the utilization of informationacross resolutions. The aim is to maximize the precisions of both textureestimation and boundary localization, overcoming the limitation of single-resolution approaches. This method generates a multiscale segmentationmap as shown in Fig. 1.41. Multiscale representation of a two-texture

Page 85: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

66 Introduction

(a) (b)

Fig. 1.41 Adaptive Scale Fixing [Liang and Tjahjadi, 2006].

image is presented in Fig. 1.41(a), where two homogeneous textures are de-picted as grey and white. The central regions of homogeneous textures arerepresented using large windows, while the border regions of homogeneoustextures are represented using small windows. This representation guaran-tees that only one texture exists in each window, thus reducing erroneoustexture characterization. An image with textures of metal and straw isillustrated in Fig. 1.41(b).

5. Combination of Gabor Wavelet Transforms and Moments forTexture Segmentation

K. Muneeswaran et al. propose a combination approach [Muneeswaranet al., 2005]. It tries to incorporate into itself the better of the two method-ologies, namely, Gabor wavelet and general moments. This method involvesforming the combinational feature vector for a texture image from the ex-tracted features by both approaches. This combinational approach has beenevolved since both measures tend to look for features of a texture imagein different views. The following equation is used to construct the featurevector:

Fc = ∂(FM ⊕ FG),

where, Fc is the feature vector representing a pixel, constructed by the com-binational approach, FM is the feature vector obtained for the same pixelby applying moments and FG is the feature vector using Gabor wavelet. ∂

Page 86: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Brief Review of Pattern Recognition with Wavelet Theory 67

is a stabilizing function which is defined below:

∂(X) = [xi, ∀i ∈ 1, ...,m],

where, X is a vector and m is the vector length and the weight value iscalculated by

=

[m∑i=1

x2i

]−1/2

.

Fig. 1.42 Results of segmentation: (1) left most - input image containing various num-ber of textures; (2) middle-left - segmentation result by Gabor wavelet; (3) middle-right- segmentation result by moments; (4) right most - result by the combination method[Muneeswaran et al., 2005].

1.2.11 Image Indexing and Retrieval

Digital image libraries and other multimedia databases have been dramat-ically expanded in recent years. Storage and retrieval of images in such li-braries become a real demand in industrial, medical, and other applications.A solution for this problem is content-based image indexing and retrieval(CBIR), in which some features are extracted from every picture, and storedas an index vector. Thereafter, the index is compared in retrieval phase tofind some similar pictures to the query image [Special-Issue-Digital-Library,1996; Smeulders et al., 2000]. Two major approaches can be used in CBIR,namely, spatial domain-method and transform domain-method.

1. Wavelet CorrelogramAn approach called “wavelet correlogram” is proposed by H. A. Moghad-

dam et al. [Moghaddam et al., 2005], which can take advantage of both spa-tial and transform domain information. There are three steps in this way.

Page 87: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

68 Introduction

(1) Wavelet coefficients are computed to decompose space-frequency infor-mation of the image; (2) A quantization step is then utilized before com-puting directional autocorrelograms of the wavelet coefficients; (3) Finally,index vectors are constructed using theses wavelet correlograms. Fig. 1.43shows the diagram of the wavelet correlogram indexing method.

Construction of feature vectors

into gray−level imageConverting color image

Phase 3

Wavelet decompositionPhase 1

Quantization of wavelet coefficients

Phase 2

Directional 1−D autocorrelogram

Prepocessing

Processing

Feature construction

Fig. 1.43 Diagram of the wavelet correlogram indexing method [Moghaddam et al.,2005].

The wavelet autocorrelogram computing equations are

Γm,n(i, i, k) = (p1, p2)|p1, p2 ∈Wm,nli

, |p1− p2|n = k,

αm,n(i, k) =|Γm,n(i, i, k)|2hli(Wm,n)

,

Page 88: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Brief Review of Pattern Recognition with Wavelet Theory 69

where, |Γm,n(i, i, k)| represents the size of the wavelet autocorrelogram foreach pair of (m,n); hli(Wm,n) is the total number of pixels of level li.

For evaluation of the proposed approach, some query images were se-lected randomly from a 1000 image subset of the COREL database

http : //wang.ist.psu.edu/docs/related.

The experimental results indicate that a total average of 71% matched re-trieved images is achievable using the wavelet correlogram indexing retrievalalgorithm [Moghaddam et al., 2005].

2. Region Separation and Multiresolution AnalysisA simple and fast querying method for content-based image retrieval is

developed by R. Ksantini et al. [Ksantini et al., 2006]. Using the multi-spectral gradient, a color image is split into two disjoint parts that are thehomogeneous color regions and the edge regions.

(1) The homogeneous regions are represented by the traditional colorhistograms.

hhk(c) =M−1∑i=0

N−1∑j=0

δ(Ik(i, j)− c)χ[0,η](λmax(i, j)),

where, λmax stands for the largest eigenvalue, χ[0,η] is the characteristicfunction, for each c ∈ 0, ..., 255 and k = a, b.

(2) The edge regions are represented by the multispectral gradient mod-ule mean histograms.

hekh(c) =M−1∑i=0

N−1∑j=0

δ(Ik(i, j)− c)χ]η,+∞[(λmax(i, j))λmax(i, j).

In order to measure the similarity degree between two color images bothquickly and effectively, R. Ksantini et al. use a one-dimensional pseudo-metric, which makes use of the one-dimensional wavelet decomposition andcompression of the extracted histograms. This querying method is invariantto the query color image object translations and color intensities.

Apart from the above methods, a content-based image retrieval tech-nique is presented by M. Kubo et al. [Kubo et al., 2003]. which useswavelet-based shift and brightness invariant edge features. P. Jain and S.N. Merchant [Jain and Merchant, 2004] propose a method using wavelet-based multiresolution histogram for fast image retrieval.

Page 89: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

70 Introduction

1.2.12 Wavelet-Based Image Fusion

Image fusion is one of the most important techniques to enhance imageinformation. The fused image is more suitable for image processing. Imagefusion is a process by which, information from different observation im-ages are incorporated into a single image. The importance of image fusionlies in the fact that each observation image contains complementary infor-mation. When this complementary information is integrated with that ofanother observation, an image with the maximum amount of informationis obtained.

Different approaches have been adopted for multi-sensor or multipleobservation image fusion from the simple image averaging approach to thewavelet transform image fusion approach. In [El-Khamy et al., 2006], asuper-resolution Linear Minimum Mean Square Error (LMMSE) algorithmfor image fusion is proposed by S. E. El-Khamy et al. The schematicdiagram of the proposed super-resolution LMMSE algorithm can be foundin Fig. 1.44.

g2

g

fg

LMMSE

Interpolation

y

Wavelet−BasedImage Fusion

p

AligementImage

h

RestorationLMMSE

1 Multi−Channel

Fig. 1.44 The schematic diagram of the proposed super-resolution algorithm [El-Khamyet al., 2006].

fh = Rfn

D1H1M1

···

DpHpMp

t

D1H1M1

···

DpHpMp

Rfn

D1H1M1

···

DpHpMp

t

+Rn

−1

Page 90: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Brief Review of Pattern Recognition with Wavelet Theory 71

g1···gp

,

where, gi, i = 1, 2, ..., p stand for the observed images, Rfn and Rn arethe high resolution images and noise correlation matrices respectively, Di,i = 1, 2, ..., p is the uniform downsapling matrix, Hi, i = 1, 2, ..., p is theblur matrix, and Mi, i = 1, 2, ..., p is the registration shift matrix.

El-Khamy [El-Khamy et al., 2006] adopts the wavelet transform im-age fusion approach to integrate the data from the multiple outputs of theLMMSE image restoration step. This is due to the fact that the multipleoutputs of the LMMSE restoration step are correctly registered and aligned.The registration of the multiple inputs to the wavelet fusion step is a veryimportant pre-requisite to the success of the fusion step. In the applicationof the simple wavelet image fusion scheme, the wavelet packet decomposi-tion is calculated for each observation to obtain the multiresolution levelsof the images to be fused. In the transform domain, the coefficients in allresolution levels whose absolute values are larger are chosen between theavailable observations. This rule is known as the maximum frequency rule.Using this method, fusion takes place in all resolution levels and dominantfeatures at each scale are preserved. Another alternative to the maximumfrequency rule is the area-based selection rule. This rule is called the localvariance or the standard deviation rule. The local variance of the waveletcoefficients is calculated as a measure of local activity levels associated witheach wavelet coefficient. If the measures of activity of the wavelet coeffi-cients in each of the two images to be fused are close together, the averageof the two wavelet coefficients is taken; otherwise, the coefficient with max-imum absolute is chosen. Generally, the process of wavelet packet imagefusion can be summarized in the following steps: (1) The available imagesare first registered (This is achieved for the outputs of the LMMSE restora-tion step). (2) The wavelet packet decomposition of the observations iscalculated using a suitable basis function and decomposition level. (3) Asuitable fusion rule is used to select the wavelet coefficients from the sourceobservations. (4) A decision map is created according to the fusion rule. (5)A wavelet packet reconstruction is performed on the combinations createdcoefficients.

Page 91: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

72 Introduction

A novel pixel level image fusion schemes are presented by H. Li [Li, 2006]based on multi-scale decomposition. In this way, the wavelet coefficientsof image are chosen according to the image fusion operators and differ-ent fusion rules. Experiments of multi-spectral image and high-resolutionpanchromatic images are given. It shows that the wavelet-based humanvisual system method can achieve better fusion performance than others.

An approach to multisensor remote sensing image fusion using station-ary wavelet transform is proposed in [Li, 2008]. In this paper, the authorsinvestigate the effects of orthogonal/biorthogonal filters and decompositiondepth on using stationary wavelet analysis for fusion. Spectral discrepancyand spatial distortion are used as quality measures. Empirical results leadto some recommendations on the wavelet filter parameters for use in remotesensing image fusion applications.

1.2.13 Others

Apart from the above sections, there are many other applications of wavelettheory to pattern recognition. For instance, [Chambolle et al., 1998] exam-ines the relationship between wavelet-based image processing algorithmsand variational problems. Algorithms are derived as exact or approximateminimizers of variational problems; in particular, it shows that waveletshrinkage can be considered the exact minimizer of the following problem:Given an image F defined on a square I. minimize over all g in the Besovspace B1

1(L1(I)) the functional ‖F − g‖2L2(I)+ λ‖g‖B1

1(L1(I)). It uses thetheory of nonlinear wavelet image compression in L2(I) to derive accurateerror bounds for noise removal through wavelet shrinkage applied to imagescorrupted with i.i,d., mean zero, Gaussian noise. A new signal-to-noise ra-tio (SNR), which claim more accurately reflects the visual perception ofnoise in images, arises in this derivation. It presents extensive computa-tions that support the hypothesis that near-optimal shrinkage parameterscan be derived if one knows (or can estimate) only two parameters aboutan image F : the largest α for which F ∈ Bαq (Lq(I)),1/q = α/2 + 1/2, andthe norm ‖F‖Bα

q (Lq(I)). Both theoretical and experimental results indicatethat this choice of shrinkage parameters yields uniformly better results thanDonoho and Johnstone’s VisuShrink procedure.

A standard wavelet multiresolution analysis can be defined via a se-quence of projectors onto a monotone sequence of closed vector subspacespossessing certain properties. [Combettes, 1998] proposes a nonlinear ex-

Page 92: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Brief Review of Pattern Recognition with Wavelet Theory 73

tension of this framework in which the vector subspaces are replaced byconvex subsets. These sets are chosen so as to provide a recursive, mono-tone approximation scheme that allows for various signal and image fea-tures to be investigated. Several classes of convex multiresolution analysisare discussed and numerical applications to signal and image-processingproblems are demonstrated.

Image restoration problems can naturally be cast as constrained convexprogramming problems in which the constraints arise from a priori infor-mation and the observation of signals physically related to the image to berecovered. In [Combettes and Pesquet, 2004], the focus is placed on theconstruction of constraints based on wavelet representations. Using a mixof statistical and convex-analytical tools, P. L. Combettes and J. -C. Pes-quet propose a general framework to construct wavelet-based constraints.The resulting optimization problem is then solved with a block-iterativeparallel algorithm which offers great flexibility in terms of implementation.Numerical results illustrate an application of the proposed framework.

A novel approach for thinning character using modulus minima of wavelettransform is developed in [You et al., 2006]. A method for signal denois-ing using wavelets and block hidden Markov model is presented by Z. Liao[Liao and Tang, 2005].

Page 93: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

This page intentionally left blankThis page intentionally left blank

Page 94: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Chapter 2

Continuous Wavelet Transforms

Similar to Fourier transform, the wavelet theory consists of two parts,namely, the wavelet transform and the wavelet basis. In this chapter, wewill focus on the former and organize it into three sections: (1) the gen-eral theory of wavelet transform, (2) the filtering properties of the wavelettransforms, and (3) the characterization of Lipschitz regularity of signalsby wavelet transforms.

2.1 General Theory of Continuous Wavelet Transforms

In Fourier transform

Ff(ξ) =∫

R

f(ξ − x)eiξxdx,

if we replace eiξx, the dilation of the basic wave function eix, with ψ( t−ba ),the translation and dilation of the basic wavelet ψ(x), then, the transformis referred as a continuous wavelet transform (also called an integral wavelettransform ), which is defined as follows:

Definition 2.1 A function ψ ∈ L2(R) is called an admissible wavelet ora basic wavelet if it satisfies the following “admissibility ” condition:

Cψ :=∫

R

|ψ(ξ)|2|ξ| dξ <∞. (2.1)

The continuous (or integrable) wavelet transform with kernel ψ is defined

75

Page 95: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

76 Continuous Wavelet Transforms

by

(Wψf)(a, b) := |a|− 12

∫R

f(t)ψ(t− ba

)dt, f ∈ L2(R), (2.2)

where a, b ∈ R and a = 0 are the dilation parameter and the translationparameter respectively.

Before showing the functions of the admissibility condition (2.1), wewould like to discuss some basic properties of the continuous wavelet trans-form at first. According to the admissibility condition (2.1), if ψ ∈ L1(R),it can be mathematically inferred that

ψ(0) = 0

and

ψ(ξ)→ 0 (|ξ| → ∞).

This indicates that the function ψ is a bandpass filter.The characteristics of the localized components of a signal f(t) can be

described by the continuous wavelet transform.

• Because of the damp of ψ(x) at infinity, the localized characteristicof f near x = b is described by (2.2). It will be clearer if weextremely assume that the ψ(x) always be zero out of [−1, 1]. Then,for all x ∈ [b− |a|, b+ |a|], we have

ψ(t− ba

) = 0.

Therefore,

(Wψf)(a, b) = |a|− 12

∫R

f(t)ψ(t− ba

)dt

= |a|− 12

∫ b+|a|

b−|a|f(t)ψ(

t− ba

)dt.

This means that (Wψf)(a, b) is completely determined by the be-haviors of f in [b−|a|, b+ |a|] with the center b (Fig. 2.1). It is saidthat (Wψf)(a, b) describes only the localized characteristic of f in[b−|a|, b+|a|]. The smaller a, the better the localized characteristicof f , which can also be found in Fig. 2.1.

Page 96: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

General Theory of Continuous Wavelet Transforms 77

b | a |1-

b 1

b 1 | a |1+b 2 | a |

1

2

b 2

b 2 | a |2+

b 3 | a |3-b 3

b 3 | a |3+

-

Fig. 2.1 Time-frequency localization.

• On the other hand, by the basic properties of Fourier transform,we have:

(Wψf)(a, b) =|a|− 1

2

∫R

f(ξ)(ψ(ψ − ba

)) (ξ)dξ

=|a|− 1

2

∫R

f(ξ)|a|e−ibξψ(aξ)dξ

=|a| 122π

∫R

f(ξ)e−ibξψ(aξ)dξ.

There is only a phase difference between e−ibξψ(aξ) and ψ(aξ).The bandpass property of ψ ensures that the energy of ψ(aξ) con-centrates on two bands, while the bandwidth depends on the scaleparameter a with positive ratio. Hence, the localization of f is illus-trated by (Wψf)(a, b), and f gets worse localization with a smallera.

ψ can be viewed as a basic window function. Through this window, wecan not observe the integrated f or f , whereas the local performances of fand f are very clear. Moving the translation parameter b, each part of fand f can be traveled. Meanwhile, by adjusting a, we can observe f and f

Page 97: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

78 Continuous Wavelet Transforms

with different localization. The later is the so-called focus property of thewavelet.

For the convenience of our discussion, under the meaning of statistics,we define the center of basic window ψ as

x∗ψ :=1‖ψ‖22

∫R

t|ψ(t)|2dt. (2.3)

Moreover, we define the radius of the window , which is the statistic widthof the energy of ψ to its center, as

∆ψ :=1‖ψ‖2

[∫R

(t− x∗)2|ψ(t)|2dt]1/2

, (2.4)

where ‖ψ‖2 is the norm of ψ, i.e.,

‖ψ‖2 :=(∫

R

|ψ(x)|2dx)1/2

.

The window of ψ (also called the time window of ψ in general) is

[x∗ψ −∆ψ, x∗ψ + ∆ψ].

In the same way, the window of ψ (also called the frequency window of ψ)is

[x∗ψ−∆ψ, x

∗ψ

+ ∆ψ].

The following square region

[x∗ψ −∆ψ, x∗ψ + ∆ψ]× [x∗

ψ−∆ψ, x

∗ψ

+ ∆ψ ]

is referred to the time-frequency window of ψ. For a, b ∈ R, a = 0, a set ofwavelets can be generated by the basic wavelet ψ as follows:

ψa,b(t) := |a|− 12ψ(

t− ba

). (2.5)

Thus, the time-frequency window of ψa,b is

[b+ ax∗ψ − |a|∆ψ, b+ ax∗ψ + |a|∆ψ ]×[x∗ψ

a− 1|a|∆ψ ,

x∗ψ

a+

1|a|∆ψ

]. (2.6)

Page 98: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

General Theory of Continuous Wavelet Transforms 79

The procedure of reasoning is below:

x∗ψa,b=

1‖ψ‖22

∫R

t|a|−1|ψ(t− ba

)|2dt

=|a|−1

‖ψ‖22

∫R

(ax+ b)|ψ(x)|2|a|dx

=1‖ψ‖22

[a

∫R

x|ψ(x)|2dx+ b‖ψ‖22]

= ax∗ψ + b;

∆ψa,b=

1‖ψ‖2

[∫R

(t− ax∗ψ − b)2|a|−1|ψ(t− ba

)|2dt]1/2

=1‖ψ‖2

[∫R

(ax− ax∗ψ)2|ψ(x)|2|a|−1|a|dx]1/2

=|a|‖ψ‖2

[∫R

(x− x∗ψ)2|ψ(x)|2dx]1/2

= |a|∆ψ;

ψa,b(ξ) =∫

R

|a|− 12ψ(

t− ba

e−iξtdt = |a| 12 e−ibξψ(aξ);

‖ψa,b‖22 = |a|∫

R

|ψ(aξ)|2dξ = ‖ψ‖22;

x∗ψa,b

=1

‖ψa,b‖22

∫R

ξ|a||ψ(aξ)|2dξ

=1a

1‖ψa,b‖22

∫R

ξ|ψ(ξ)|2dξ

=1ax∗ψ;

∆ψa,b=

1

‖ψ‖2

[∫R

(ξ − 1|a|x

∗ψ)2|a||ψ(aξ)|2dξ

]1/2

=1|a|

1

‖ψ‖2

[∫R

(|a|ξ − x∗ψ)2|ψ(aξ)|2|a|dξ

]1/2

Page 99: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

80 Continuous Wavelet Transforms

=1|a|

1

‖ψ‖2

[∫R

(ξ − x∗ψ)2|ψ(ξ)|2dξ

]1/2

=1|a|∆ψ.

From (2.6), we can easily find out, when |a| changes to be smaller, thetime window of ψ becomes more narrow, whereas the frequency windowbecomes wider. The area of its time-frequency window is a constant, whichis irrelevant to a and b.

(2∆ψa,b)(2∆ψa,b

) = 4∆ψ∆ψ.

From the above discussion, we find an intrinsic fact: for a basic waveletψ, it is impossible to achieve perfect localization in both the time domainand the frequency domain simultaneously. Is there any ψ could make thearea of the time-frequency to be small enough? Unfortunately, the follow-ing theorem, the famous Heisenberg uncertainty principle, gave a negativeanswer to this question.

Theorem 2.1 Let ψ ∈ L2(R) satisfy xψ(x) and ξψ(ξ) ∈ L2(R). Then

∆ψ∆ψ ≥12.

Furthermore, the equality in the above equation holds if and only if

ψ(x) = ceiaxgα(x− b),

where c = 0, α > 0, a, b ∈ R and gα(x) is the Gaussian function defined by

gα(x) :=1

2√πα

e−x24α . (2.7)

Proof. We assume that the window centers of ψ and ψ are 0 withoutlosing generality. Based on the basic knowledge of Fourier analysis, we have

(∆ψ∆ψ)2 =

(∫Rt2|ψ(t)|2dt) (∫

Rξ2|ψ(ξ)|2dξ

)‖ψ‖22‖ψ‖22

=

(∫Rt2|ψ(t)|2dt) (∫

R|ψ′(ξ)|2dξ

)‖ψ‖22‖ψ‖22

Page 100: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

General Theory of Continuous Wavelet Transforms 81

=‖xψ(x)‖22‖ψ′(x)‖22‖ψ‖22‖ψ‖22

=‖xψ(x)‖22 2π‖ψ′(x)‖22‖ψ‖22 2π‖ψ‖22

≥ ‖xψ(x)ψ′(x)‖22‖ψ‖42

≥ 1‖ψ‖42

∣∣∣∣Re ∫R

xψ(x)ψ′(x)dx∣∣∣∣2

=1‖ψ‖42

∣∣∣∣12∫

R

xd

dx|ψ(x)|2dx

∣∣∣∣2=

1‖ψ‖42

(12

∫R

|ψ(x)|2dx)2

=14.

Thus, we have

∆ψ∆ψ ≥12.

Further, by the conditions, which preserve the equal-sign in the Holderinequality, we know that the equalities in above reasoning will be tenable,if and only if there is a constant α such that

−Re(xψ(x)ψ′(x)) = |xψ(x)ψ′(x)|,|xψ(x)| = 2α|ψ′(x)|,‖ψ‖2 = 0

.

First, by the second equality, we have

xψ(x) = 2αψ′(x)eiθ(x),

where θ(x) is a real-valued function. Second, by the first equality, we have

−xψ(x)ψ′(x) ≥ 0.

Then,

−2α|ψ′(x)|2eiθ(x) ≥ 0.

Page 101: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

82 Continuous Wavelet Transforms

It infers eiθ(x) = −1. Thus, we have

xψ(x) = −2αψ′(x).

By resolving this ordinary differential equation, we can obtain

ψ(x) = ce−x24α .

Finally, by the third equality, we know that c = 0.It should be mentioned, at the beginning of our proof, we have assumed

that the window centers of ψ and ψ are 0. Otherwise, consider

ψ(x) := e−iaxψ(x+ b),

where a := x∗ψ, b := x∗ψ. The centers of the time window and the frequency

window of ψ(x) are 0. It means that the above reasoning is available toψ(x). It is easy to know that

∆ψ = ∆ψ , ∆ψ = ∆ ˆψ,

Hence, ∆ψ∆ψ ≥ 12 . The equality holds if and only if

ψ(x) = ce−x24α ,

i.e.

ψ(x) = cei(x−b)ae−(x−b)2

4α ,

where c = 0. Replacing ceiab

2√

2παwith c, we have

ψ(x) = ceiaxgα(x− b),where c = 0, α > 0, a, b ∈ R and gα(x) is the Gaussian function defined by(2.7). This establishes the theorem.

An important fact is supported by this theorem: no matter what waveletψ we choose, it can not achieve perfect localization in both the time do-main and the frequency domain simultaneously. The time window and thefrequency window just like the length and width of a rectangle with a fixedarea. When the time window is narrow, the frequency window must bewide. By the contrary, when the time window is wide, the frequency win-dow must be narrow (see Fig. 2.2). In fact, the narrow time window andthe wide frequency window are good for the high frequency part of a signal,whereas the wide time window and the narrow frequency window are good

Page 102: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

General Theory of Continuous Wavelet Transforms 83

*xψb a+2 2*xψb a+ 11

1

ψ*

ax ^

*

axψ

2

^

ξ

t

Fig. 2.2 Time-frequency windows, a1 < a2.

for the low frequency part of a signal. Therefore, this property of waveletjust meets the demand of signal analysis. It can be applied for self-adaptivesignal analysis.

The area of the time-frequency window of Gaussian is the smallest,which is 4∆ψ∆ψ = 2. Therefore, for the localized time-frequency analysis,Gaussian function is the best. It has been a traditional tool for signalanalysis.

As the same as Fourier transform, wavelet transform is invertible. Theinverse wavelet transform can be viewed as the reconstruction of the originalsignal. First of all, we need to prove the following theorem, which specifiesthat wavelet transform keeps the law of energy-conservation.

Theorem 2.2 Let ψ be a basic wavelet. Then∫R

∫R

Wψf(a, b)Wψg(a, b)dadb

a2= Cψ〈f, g〉

holds for any f, g ∈ L2(R), where Cψ is a constant defined by (2.1), 〈f, g〉is the inner product of f and g. Particularly, for g = f we have∫

R

∫R

|Wψf(a, b)|2 dadba2

= Cψ‖f‖22.

Proof. Obviously, the second equality is a specific instance of the firstequality at g = f . Thus, only the first equality needs to be proved. It iseasy to know that

(ψ(t− ba

)) (ξ) = |a|e−ibξψ(aξ).

Page 103: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

84 Continuous Wavelet Transforms

Denote that F (x) := f(x)ψ(ax)

G(x) := g(x)ψ(ax)

Then,

(Wψf)(a, b) = 〈f(x), |a|− 12ψ(

x − ba

)〉

=12π〈f(ξ), |a| 12 e−bξψ(aξ)〉

=12π|a| 12

∫R

f(ξ)ψ(aξ)ebξdξ

=12π|a| 12

∫R

F (ξ)ebξdξ

=12π|a| 12 F (−b).

In the same way,

(Wψg)(a, b) =12π|a| 12 G(−b).

Therefore, ∫R

(Wψf)(a, b)(Wψg)(a, b)db

= (12π

)2|a|∫

R

F (−b)G(−b)db

= (12π

)2|a|∫

R

F (b)G(b)db

=12π|a|

∫R

F (x)G(x)dx.

Furthermore, ∫R

∫R

(Wψf(a, b)Wψg(a, b)dadb

a2

=∫

R

12π|a|

∫R

F (x)G(x)dxda

a2

=12π

∫R

∫R

|ψ(ax)|2|a| f(x)g(x)dxda

Page 104: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

General Theory of Continuous Wavelet Transforms 85

=12π

∫R

(∫R

|ψ(ax)|2|ax| d(ax)

)f(x)g(x)dx

=12π

(∫R

|ψ(ξ)|2|ξ| dξ

)∫R

f(x)g(x)dx

=12πCψ〈f , g〉

= Cψ〈f, g〉.

This completes our proof.According to the above theorem, the inverse wavelet transform, which

is also called the reconstruction formula, can be formally inferred. Weconsider

Wψg(a, b) = 〈|a|− 12ψ(

x − ba

), g〉.

If we give up the exactness in mathematics temporarily, we have

Cψ〈f, g〉 =∫

R

∫R

Wψf(a, b)〈|a|− 12ψ(

x− ba

), g〉dadba2

= 〈∫

R

∫R

Wψf(a, b)|a|− 12ψ(

x− ba

)dadb

a2, g〉.

Because that g can be any function in L2(R), we can write

f(x) = C−1ψ

∫R

∫R

Wψf(a, b)|a|− 12ψ(

x− ba

)dadb

a2. (2.8)

This is the formal inverse wavelet transform, by which we can reconstructthe original signal from the wavelet transform Wψf(a, b). The above rea-soning is not exact in mathematics. The exact inverse formula is studiedas follows.

Theorem 2.3 Let ψ be a basic wavelet. Then, for any f ∈ L2(R), theinverse wavelet transform (2.8) holds in the sense of L2(R)-norm, namely:∥∥∥∥∥f(x)− C−1

ψ

∫|a|≥A

da

∫|b|≤B

(Wψf)(a, b)|a|− 12ψ(

x − ba

)dadb

a2

∥∥∥∥∥2

→ 0 ,

as A→ 0, B →∞, where Cψ is a constant defined by (2.1).

Page 105: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

86 Continuous Wavelet Transforms

Proof. For any A,B > 0, we prove the following equality at first:

〈∫ ∫

|a|≥A,|b|≤B(Wψf)(a, b)|a|− 1

2ψ(x− ba

)dadb

a2, g(x)〉

=∫ ∫

|a|≥A,|b|≤B(Wψf)(a, b)(Wψg)(a, b)

dadb

a2.

In fact,∫R

∫ ∫|a|≥A,|b|≤B

∣∣∣∣(Wψf)(a, b)|a|− 12ψ(

x − ba

)g(x)∣∣∣∣ dadba2

dx

≤∫ ∫

|a|≥A,|b|≤B|(Wψf)(a, b)||a|− 1

2 (∫

R

|ψ(x− ba

)|2dx) 12 ‖g‖2dadb

a2dx

= ‖ψ‖2‖g‖2∫ ∫

|a|≥A,|b|≤B|(Wψf)(a, b)|dadb

a2

≤ ‖ψ‖2‖g‖2(∫ ∫

|a|≥A,|b|≤B|(Wψf)(a, b)|2 dadb

a2

)1/2

(∫ ∫|a|≥A,|b|≤B

dadb

a2

)1/2

= ‖ψ‖2‖g‖2C1/2ψ ‖f‖2

(4B

∫ ∞

A

da

a2

)1/2

= ‖ψ‖2‖g‖2‖f‖2(

4BACψ

)1/2

<∞,

where Cψ is the constant defined by (2.1). By the Fubini theorem in real-analysis [Rudin, 1974], we have

〈∫ ∫

|a|≥A,|b|≤B(Wψf)(a, b)|a|− 1

2ψ(x− ba

)dadb

a2, g(x)〉

=∫

R

∫ ∫|a|≥A,|b|≤B

(Wψf)(a, b)|a|− 12ψ(

x− ba

)g(x)dadb

a2dx

=∫ ∫

|a|≥A,|b|≤B(Wψf)(a, b)|a|− 1

2

∫R

ψ(x− ba

)g(x)dxdadb

a2

=∫ ∫

|a|≥A,|b|≤B(Wψf)(a, b)(Wψg)(a, b)

dadb

a2.

Page 106: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

General Theory of Continuous Wavelet Transforms 87

This is the equality that we intend to prove. Therefore,∥∥∥∥∥f(x)− C−1ψ

∫|a|≥A

da

∫|b|≤B

(Wψf)(a, b)|a|− 12ψ(

x− ba

)dadb

a2

∥∥∥∥∥2

= C−1ψ sup

‖g‖2=1

|Cψ〈f, g〉−

〈∫ ∫

|a|≥A,|b|≤B(Wψf)(a, b)|a|− 1

2ψ(x− ba

)dadb

a2, g(x)〉

∣∣∣∣∣= C−1

ψ sup‖g‖2=1

∣∣∣∣∣Cψ〈f, g〉 −∫ ∫

|a|≥A,|b|≤B(Wψf)(a, b)(Wψg)(a, b)

dadb

a2

∣∣∣∣∣= C−1

ψ sup‖g‖2=1

∣∣∣∣∣∫ ∫

|a|<A or |b|>B(Wψf)(a, b)(Wψg)(a, b)

dadb

a2

∣∣∣∣∣≤ C−1

ψ sup‖g‖2=1

(∫ ∫R2|(Wψg)(a, b)|2 dadb

a2

)1/2

(∫ ∫|a|<A or |b|>B

|(Wψf)(a, b)|2 dadba2

)1/2

= C−1ψ sup

‖g‖2=1

C1/2ψ ‖g‖2

(∫ ∫|a|<A or |b|>B

|(Wψf)(a, b)|2 dadba2

)1/2

= C−1/2ψ

(∫ ∫|a|<A or |b|>B

|(Wψf)(a, b)|2 dadba2

)1/2

→ 0 , (A→ 0, B →∞).

The proof of the theorem is complete.Note: The result of Theorem 2.3 is not so clear as formula (2.8). It is

important to determine whether formula (2.8) is tenable.By the result of Theorem 2.3, the following conclusion can be mathe-

matically inferred: as A→ 0, B →∞,

fA,B(x) := C−1ψ

∫|a|≥A

da

∫|b|≤B

(Wψf)(a, b)|a|− 12ψ(

x− ba

)dadb

a2

converges to f(x) in measure ([Rudin, 1974]). According to Riesz theorem([Rudin, 1974]), there are two sequences Ak → 0+ and Bk → +∞, such

Page 107: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

88 Continuous Wavelet Transforms

that fAk,Bk(x)→ f(x), (k →∞), a.e. x ∈ R. That is

f(x) = limk→∞

C−1ψ

∫|a|≥Ak

da

∫|b|≤Bk

(Wψf)(a, b)|a|− 12ψ(

x− ba

)dadb

a2.

If the right integral of (2.8) exists, (2.8) holds a.e. x ∈ R. Based on thisconclusion, we have

Theorem 2.4 Let ψ be a basic wavelet. Then for any f ∈ L2(R), (2.8)holds a.e. x ∈ R if∫

R

∫R

∣∣∣∣(Wψf)(a, b)|a|− 12ψ(

x− ba

)∣∣∣∣ dadba2

<∞, (2.9)

where Cψ is a constant, which can be defined by (2.1).

The following theorem gives a sufficient condition such that (2.9) holds.

Theorem 2.5 Let ψ ∈ L1(R) be a basic wavelet. For any f ∈ L2(R), ifthere exists a non-negative measurable function F (a), such that

|Wψf(a, b)| ≤ F (a), and∫

R

1|a|3/2F (a)da <∞,

then, (2.9) holds. Consequently, the inverse wavelet transform (2.8) holdsa.e. x ∈ R. Furthermore, if ψ(x) is continuous, the right part of (2.8) is acontinuous function on R.

Proof. It is known that∫R

∫R

∣∣∣∣(Wψf)(a, b)|a|− 12ψ(

x− ba

)∣∣∣∣ dadba2

≤∫

R

∫R

F (a)∣∣∣∣ψ(

x− ba

)∣∣∣∣ 1|a|5/2 dadb

=∫

R

F (a)1|a|5/2

(∫R

∣∣∣∣ψ(x − ba

)∣∣∣∣ db) da

= ‖ψ‖1∫

R

1|a|3/2F (a)da

<∞.Thus, (2.9) holds. If ψ(x) is continuous, we denote

wx(a, b) := (Wψf)(a, x− b)|a|− 12ψ(

b

a)

1a2.

Page 108: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

General Theory of Continuous Wavelet Transforms 89

Then

|wx(a, b)| ≤ F (a)∣∣∣∣ψ(

b

a)∣∣∣∣ 1|a|5/2 ∈ L

1(R2).

∀xn, x ∈ R, xn → x (n → ∞), by the Lebesgue dominated convergencetheorem (see [Rudin, 1974]), we have:

limn→∞

∫R

∫R

wxn(a, b)dadb =∫

R

∫R

wx(a, b)dadb.

Note that

limn→∞

∫R

∫R

(Wψf)(a, b)|a|− 12ψ(

xn − ba

)dadb

a2

= limn→∞

∫R

∫R

wxn(a, b)dadb

=∫

R

∫R

wx(a, b)dadb,

therefore, the right part of (2.8),∫

R

∫Rwx(a, b)dadb, is a continuous function

on R. Our proof is complete.Note: Let ψ be a basic wavelet, α > 0 and f ∈ L2(R). If there exists

constants C, δ > 0, such that

|Wψf(a, b)| ≤ C|a|α+ 12 , (∀b ∈ R),

for |a| < δ, the conditions of the previous theorem are satisfied. In fact, itwill be clear if we let

F (a) :=C|a|α+ 1

2 , |a| < δ;‖f‖2‖ψ‖2, |a| ≥ δ

The necessity of the admissibility condition (2.1) is very important. Itensures the existence of the inverse wavelet transform. As a conclusion, it isfeasible to apply the wavelet transform to signal analysis, image processingand pattern recognition. It is easy to see that this condition is rather weakand is almost equivalent to ψ(0) = 0, or∫

R

ψ(x)dx = 0. (2.10)

Actually, if ψ(x) ∈ L2(R) and there exists α > 0, such that (1 +|x|)αψ(x) ∈ L1(R), then, (2.1) must be equivalent to (2.10). This con-clusion is proved as below:

Page 109: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

90 Continuous Wavelet Transforms

By (1 + |x|)αψ(x) ∈ L1(R), we know that ψ(x) ∈ L1(R). It means thatψ(ξ) is a continuous function in R. If (2.1) is tenable, then ψ(0) = 0. Itindicates that (2.10) holds. Contrarily, if (2.10) holds, we assume α ≤ 1without losing generality, then

|ψ(ξ)| =∣∣∣∣∫

R

ψ(x)e−iξxdx∣∣∣∣

=∣∣∣∣∫

R

ψ(x)[e−iξx − 1]dx∣∣∣∣

≤∫

R

∣∣∣∣ψ(x)2 sinξx

2

∣∣∣∣ dx≤ |ξ|α

∫|ξx|≤1

|xαψ(x)|dx + |ξ|α∫|ξx|>1

|xαψ(x)|dx

= |ξ|α∫

R

|xαψ(x)|dx= C|ξ|α,

where C :=∫

R|xαψ(x)|dx. Therefore,

Cψ :=∫

R

|ψ(ξ)|2|ξ| dξ ≤ C2

∫|ξ≤1

|ξ|2α−1dξ +∫|ξ|>1

|ψ(ξ)|2dξ <∞.

It specifies that (2.1) holds. This finished our proof.In general, the wavelets applied to practice have good damping and

satisfy the condition (1 + |x|)αψ(x) ∈ L1(R) (α > 0). As a result, inengineering, the wavelet is often defined as the function in L2(R) whichsatisfies the condition (2.10). This definition is not exact in mathematics,however, it is harmless in the application of wavelet. The condition (2.10)is a objective specification of the vibration of ψ. The damping and thevibration are two basic characteristics of basic wavelets.

In signal analysis, only the positive frequency is need to be considered.That is a > 0. With this premise, we have another theorem.

Theorem 2.6 Let ψ be a basic wavelet satisfying

∫ ∞

0

|ψ(ξ)|2ξ

dξ =∫ ∞

0

|ψ(−ξ)|2ξ

dξ =12Cψ <∞.

Page 110: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

The Continuous Wavelet Transform as a Filter 91

Then, for any f, g ∈ L2(R), we have∫ ∞

0

∫R

Wψf(a, b)Wψg(a, b)dadb

a2=

12Cψ〈f, g〉.

In particular, ∫ ∞

0

∫R

|Wψf(a, b)|2 dadba2

=12Cψ‖f‖22.

The proof of this theorem is similar to those of Theorem 2.2 and Theorem2.3.

2.2 The Continuous Wavelet Transform as a Filter

Let ψ be a basic wavelet and we denote

ψ(x) := ψ(−x). (2.11)

We define scale wavelet transform as follows:

Wsf(x) := W ψs f(x) := (f ∗ ψ)(x). (2.12)

By the definition of the wavelet transform, for a > 0, we have

(Wψf)(a, b) :=∫R

f(t)a−12ψ(

t− ba

)dt

=∫R

f(t)a−12 ψ(

b − ta

)dt

= a12 (f ∗ ψa)(b),

where ψa(x) := 1a ψ(xa ). It specifies that the wavelet transform is actually

a convolution, which is also called a filter in engineering.The design of filters is very important in the filter theory. There are two

kinds of digital filters, namely, the finite impulse response (FIR) and theinfinite impulse response (IIR). The former is easy to be realized and hasgood time localization. Therefore, in the above scale wavelet transforms,the basic wavelet ψ, which is the kernel of the transform, should be com-pactly supported. Although Heisenberg uncertainty principle has specifiedthat the area of the time-frequency domain can not be arbitrarily small,the localization in the time-frequency domain still can be perfect, if ψ and

Page 111: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

92 Continuous Wavelet Transforms

its Fourier transform ψ have compact support simultaneously. Unfortu-nately, from the following theorem, we can find that this condition cannotbe satisfied.

Theorem 2.7 If f ∈ L2(R) is a non-zero function, f and its Fouriertransform f can not be compactly supported simultaneously.

Proof. If f is compactly supported, supp f ⊂ [−B,B], then

f(z) :=12π

∫ B

−Bf(ξ)eiξzdξ

is an analytic function on complex plane C. Because of the zero-isolationof non-zero analytic functions, f can not be compactly supported. Thisfinishes our proof.

We have known that the Fourier transform ψ of a compactly supportedbasic wavelet ψ can not be compactly supported. Now, we wish its dampingproperty would be good enough. It is essentially equivalent to that thesmoothness of ψ would be good enough. The following theorem ensuresthis fact.

Theorem 2.8 Let m be a non-negative integer and Hm(R) be the Sobolevspace of order m defined by

Hm(R) := f | f, f ′, · · · , f (m) ∈ L2(R).Then, f ∈ Hm(R) if and only if∫

R

(1 + |x|m)|f(x)|dx <∞. (2.13)

Proof. This is a fundamental fact in the theory of Sobolev spaces. Thedetailed proof can be found in [Gilbarg and Trudinger, 1977].

According to the definition of Hm(R), f ∈ Hm(R) indicates that f hascertainly differentiableness and smoothness (or regularity). However, (2.13)indicates that f has damping of order m . Therefore, when we choose abasic wavelet ψ as a filter function, in order to ensure that ψ is good forlocalized analysis in the time-frequency, we must consider both its damping(or compact support) and its regularity.

Another very important property of filters is the linear phase. With thelinear phase or the generalized linear phase, a filter can avoid distortion.

The linear phase is mathematically defined as follows.

Page 112: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

The Continuous Wavelet Transform as a Filter 93

Definition 2.2 f ∈ L2(R) is said to have liner phase if its Fourier trans-form satisfies

f(ξ) = ε|f(ξ)|e−iaξ,

where ε = 1 or −1 and a is a real constant. f is said to have generalizedlinear phase if there exists a real function F (ξ) and two real constants aand b, such that

f(ξ) = F (ξ)e−i(aξ+b).

Obviously, if f has linear phase, it also has generalized linear phase. Thegeneralized linear phase will degenerate to the linear phase if and only ife−ib = ±1 and the real function F (ξ) keeps its sign, i.e., identically positiveor identically negative.

According to the above mathematical definition, the linear phase or thegeneralized linear phase of ψ is an attribute in Fourier transform domain.In the following, we will demonstrate that the generalized linear phase isequivalent to a symmetry of ψ itself.

Theorem 2.9 f ∈ L2(R) has generalized phase if and only if f is skew-symmetric at a ∈ R, i.e., there exists a constant b ∈ R such that

eibf(a+ x) = eibf(a− x), x ∈ R.

In particular, for a real function f , it has generalized linear phase if andonly if it is symmetric or antisymmetric at a ∈ R. More precisely,

f(a+ x) = f(a− x), x ∈ R,

or

f(a+ x) = −f(a− x), x ∈ R.

Proof. It is easy to see that f has generalized phase, if and only if twoconstants a and b ∈ R exist, such that

f(ξ)ei(aξ+b) = F (ξ)

is a real function. That is

f(ξ)ei(aξ+b) = f(ξ)ei(aξ+b), (ξ ∈ R),

Page 113: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

94 Continuous Wavelet Transforms

which is equivalent to∫R

f(ξ)ei(aξ+b)eiξxdξ =∫

R

f(ξ)ei(aξ+b)e−iξxdξ, (x ∈ R).

i.e.,

eibf(a+ x) = eibf(a− x), (x ∈ R).

If f is a real function, ei2b must be a real function. It means ei2b = 1 or−1. Thus

f(a+ x) = f(a− x), x ∈ R,

or

f(a+ x) = −f(a− x), x ∈ R.

It specifies that f is symmetric or antisymmetric on a. Our proof is com-plete.

Summarily, as a filter, in order to be good for the localized analysisin the time domain, the basic wavelet ψ should have good damping orhave compact support. On the other hand, ψ should have good regular-ity or smoothness, to obtain a good property for the localized analysis inthe frequency domain. At last, ψ should be skew-symmetric to avoid thedistortion.

2.3 Characterization of Lipschitz Regularity of Signal byWavelet

In mathematics, a signal is actually a function. A stationary signal alwayscorresponds to a smooth function, while a transient one refers to a singu-larity. In fact, the concepts of the stability and singularity of the signal areambiguous without using the tool of mathematics. In this section, we willintroduce an accurate description of the regularity of the signal mathemat-ically employing the exponent of Lipschitz.

Definition 2.3 Let α satisfy 0 ≤ α ≤ 1. A function f is called uniformlyLipschitz α over the interval (a, b), if there exists a positive constant K,such that

|f(x1)− f(x2)| ≤ K|x1 − x2|α, ∀x1, x2 ∈ (a, b),

Page 114: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Characterization of Lipschitz Regularity of Signal by Wavelet 95

and we denote f ∈ Cα(a, b). The constant α is called Lipschitz exponent.

Function f to be uniformly Lipschitz α over (a, b) is also equivalent to thefollowing definition:

Definition 2.4 Let α satisfy 0 ≤ α ≤ 1. A function f is called uniformlyLipschitz α over the interval (a, b) if

K := supx1,x2∈(a,b),x1 =x2

|f(x1)− f(x2)||x1 − x2| <∞. (2.14)

It shows that the variation of f depends on |x1−x2|α over (a, b). Functionf has neither the “fracture” points over (a, b), nor sharp transient points.The shape of the f depends on α, and the sharpness of the shape can bedecided by the constant K in (2.14).

In the above definition, the Lipschitz α is confined within α ≤ 1. Oth-erwise, when α > 1, the above definition looses its meaning, because in thiscase, the function will be too smooth. Since the definition of the Lipschitzregularity with α ≤ 1 does not deal with the differentiation, we can extendthe definition of the Lipschitz exponent to α > 1.

Definition 2.5 Let α > 1, and n be the largest number which is less thanα. A function f is uniformly Lipschitz α over (a, b), if f is nth differentiableand f (n) ∈ Cα−n(a, b). It is symbolized by f ∈ Cα(a, b).

The concept of uniformly Lipschitz α can be extended to α < 0, and thedefinition can be modified as:

Definition 2.6 Let α be −1 ≤ α < 0. If the primitive function of f

F (x) :=∫ x

a

f(t)dt

is uniformly Lipschitz (α+1) over (a, b), f is said to be uniformly Lipschitzα over(a, b), and denoted by f ∈ Cα(a, b).

In the following, we will prove an important property, that is the Lipschitzregularity closely correlates with the decay property of wavelet transformin scale.

Theorem 2.10 Let α > 0, and n be the largest integer which is less thanα, ψ ∈ L2(R) satisfy (1 + |x|)αψ(x) ∈ L1(R) and have vanishing moments

Page 115: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

96 Continuous Wavelet Transforms

of order n, i.e., ∫R

tkψ(t)dt = 0, (k = 0, 1, · · · , n).

Then, there exists a constant C > 0, such that ∀f ∈ L2(R) ∩ Cα(R), thefollowing holds

|(Wψf(a, b)| ≤ C|a|α+ 12 , (∀a, b ∈ R).

Proof. ∀a, b ∈ R, we have

|(Wψf(a, b)| =∣∣∣∣∫

R

f(t)1|a|1/2ψ(

t− xa

)dt∣∣∣∣

=∣∣∣∣∫

R

[f(t)− f(x)− f ′(x)(t − x)− · · · − f (n)(x)

n!(t− x)n

]· 1|a|1/2ψ(

t− xa

)dt∣∣∣∣

=∣∣∣∣∫

R

[f (n)(ξ)n!

(t− x)n − f (n)(x)n!

(t− x)n]

· 1|a|1/2ψ(

t− xa

)dt∣∣∣∣ (ξ is between t and x)

≤ C

∫R

|t− x|α−nn!

|t− x|n 1|a|1/2

∣∣∣∣ψ(t− xa

)∣∣∣∣ dt

=C

n!|a|α+ 1

2

∫R

|t|α|ψ(t)|dt

≤ C|a|α+ 12 .

where C denotes a positive constant. The proof is complete.

Theorem 2.11 Let 0 < α < 1, and ψ ∈ L2(R) have vanishing momentof order 0 and satisfy:

(1 + |x|)αψ(x) ∈ L1(R), |ψ′(x)| = O(1

1 + |x|σ ), (∃σ > 1).

Then,

f ∈ Cα(R)⇐⇒ ∃C > 0 : |Wψf(a, b)| ≤ C|a|α+ 12 , (∀a, b ∈ R).

Proof. Here we give only the proof of the sufficiency part. According tothe note in Theorem 2.5, we have f(x) ∈ C(R), and the following inverse

Page 116: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Characterization of Lipschitz Regularity of Signal by Wavelet 97

wavelet transform holds:

f(x) = C−1ψ

∫R

∫R

(Wψf)(a, b)ψa,b(x)dadb

a2, (∀x ∈ R).

Therefore

Cψ|f(x)− f(y)|≤∫

R

∫R

|(Wψf)(a, b)| 1|a|1/2

∣∣∣∣ψ(x− ba

)− ψ(y − ba

)∣∣∣∣ dadba2

≤ C∫|a|≤δ

∫R

|a|α+ 12

1|a|1/2

(∣∣∣∣ψ(x− ba

∣∣∣∣+ ∣∣∣∣ψ(y − ba

)∣∣∣∣) dadb

a2+

+C∫|a|>δ

∫R

|a|α+ 12

1|a|1/2 |ψ

′(ξ)| |x− y||a|dadb

a2

(where ξ is betweenx− ba

andy − ba

)

≤ C∫|a|≤δ

|a|α−1da‖ψ‖1 + C

(∫|a|>δ

∫R

|a|α3 11 + |ξ|σ dadb

)|x− y|

Since ξ is between x−ba and y−b

a , we have that (please refer to the notefollowed by this proof)∣∣∣∣x− ba

∣∣∣∣ ≤ |ξ|+ ∣∣∣∣x− ba − y − ba

∣∣∣∣ = |ξ|+∣∣∣∣x− ya

∣∣∣∣ .In particular, setting δ = |x− y|, for |a| > δ, we can deduce that∣∣∣∣x− ba

∣∣∣∣ ≤ |ξ|+ δ

|a| ≤ |ξ|+ 1.

Therefore, we have

1 +∣∣∣∣x− ba

∣∣∣∣σ ≤ 1 + (|ξ|+ 1)σ ≤ (1 + 2σ)(|ξ|σ + 1).

Subsequently, we arrive at

11 + |ξ|σ ≤ (1 + 2σ)

11 +

∣∣x−ba

∣∣σ ,and hence, for δ = |x− y|,

Cψ |f(x)− f(y)|

Page 117: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

98 Continuous Wavelet Transforms

≤ C

∫|a|≤δ

|a|α−1da‖ψ‖1 + C|x − y|(∫|a|>δ

∫R

|a|α−3(1 + 2σ)1

1 +∣∣x−ba

∣∣σ dadb)

= C1αδα + C|x− y|

∫|a|>δ

|a|α−2da

∫R

db

1 + |b|σ

≤ C1αδα + C|x− y| 1

1− αδα−1

≤ C

(1α

+1

1− α)|x− y|α.

That means f ∈ Cα(R). The proof is complete.Note: In the proof, we have used the following obvious results, namely, if

ξ, a and b are three real numbers, ξ is between a and b, then |a| ≤ |ξ|+|a−b|.In fact, (1) If a, b have the different sign, then |a| ≤ |a− b| ≤ |ξ|+ |a− b|;(2) If a, b have same sign, then |a| ≤ |ξ| ≤ |b| or |b| ≤ |ξ| ≤ |a|. In thefirst case, |a| ≤ |ξ| ≤ |ξ|+ |a− b| already holds; In the second case, we have|a| ≤ |b|+ |a− b| ≤ |ξ|+ |a− b|. These are the results we wanted.

The above theorem can be extended to the case of α > 1 as follows. Weomit the proof here.

Theorem 2.12 Let n be a no-negative integer and α ∈ R satisfy n < α <

n+ 1. Suppose ψ ∈ L2(R) has vanishing moments of order n and satisfies:

(1 + |x|)αψ(x), ψ, ψ′, · · · , ψ(n) ∈ L1(R),

|ψ(n+1)(x)| = O(1

1 + |x|σ ), (∃σ > 1).

Then, ∀f ∈ L1(R), the following holds

f ∈ Cα(R)⇐⇒ ∃C > 0 : |Wψf(a, b)| ≤ C|a|α+ 12 , (∀a, b ∈ R).

2.4 Some Examples of Basic Wavelets

There are a great number of basic wavelets. Generally speaking, the deriva-tive of a compact support function, which is continuous differentiable, is abasic wavelet. Several examples of basic wavelets and their basic propertiesare given in this section.

Page 118: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Some Examples of Basic Wavelets 99

−4 −3 −2 −1 0 1 2 3 4−0.8

−0.6

−0.4

−0.2

0

0.2

0.4

0.6

0.8

Fig. 2.3 Gaussian wavelet f(x) = xe−x22 and its Fourier transform.

• Gaussian Wavelets:

ψα(x) = − x

4α√πα

e−x24α .

It is the derivative of Gaussian function

gα(x) =1

2√πα

e−x24α ,

i.e., ψα(x) = g′α(x). Its Fourier transform is

ψα(ξ) = iξe−αξ2.

The time-frequency window of ψα is

[−√

3α,√

3α]×[−√

34α,

√34α

].

Fig. 7.9 graphically shows Gaussian wavelet with α = 12 , and its

Fourier transform. Both of them have the same shape. The differ-ence between ψα(x) and its Fourier transform is only a constant.

• Mexico hat-like wavelet: When α = 12 , the second derivative of

Gaussian function g 12

is a wavelet, which is referred to as Mexicohat-like wavelet:

ψM (x) := −g′′12(x) =

1√2π

(1− x2)e−12x

2.

Its Fourier transform is

ˆψM (ξ) = ξ2e−12 ξ

2.

Page 119: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

100 Continuous Wavelet Transforms

−5 −4 −3 −2 −1 0 1 2 3 4 5−0.2

−0.1

0

0.1

0.2

0.3

0.4

0.5

−5 −4 −3 −2 −1 0 1 2 3 4 50

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

(a) (b)

Fig. 2.4 (a): Mexico-hat wavelet ψM , and (b): its Fourier transform ψM .

The time-frequency window is[−√

426,

√426

]×[−√

83√π,

√8

3√π

].

Mexico hat-like wavelet and its Fourier transform are shown inFig. 2.4.• Spline wavelet: For m ≥ 1, the B-spline of order m is defined by

Nm(x) = (N1 ∗ · · ·N1︸ ︷︷ ︸m

)(x) = (Nm−1 ∗N1)(x) =∫ 1

0

Nm−1(x − t)dt,

(2.15)where N1(x) is a characteristic function of [0, 1), and can be writtenas

N1(x) :=

1 x ∈ [0, 1);0 otherwise.

Its Fourier transform is

N1(ξ) =2ξe−iξ/2 sin

ξ

2.

We can easily prove that

Nm(x) =1

(m− 1)!

m∑k=0

(−1)k(m

k

)(x− k)m−1

+ .

Nm(x) has compact support [0,m]. For m ≥ 2, the derivative ofNm(x) is a basic wavelet, which is called the spline wavelet of order

Page 120: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Some Examples of Basic Wavelets 101

m− 1 and can be represented as

ψm−1(x) := N ′m(x) =

1(m− 1)!

m∑k=0

(−1)k(m

k

)(x− k)m−2

+ .

Its Fourier transform is

ψm−1(ξ) = (N ′m) (ξ) = iξNm(ξ) = iξ(N1(ξ))m

= iξ

(2ξe−iξ/2 sin

ξ

2

)m.

In particular, we consider the following two cases, namely, m = 2and m = 4:

(1) When m = 2, the first spline wavelet is

ψ1(x) :=

1 x ∈ (0, 1)−1 x ∈ (1, 2)0 x ∈ R\[0, 1]

.

By taking dilation to the 1-D spline wavelet, Haar waveleth(x) := ψ1(2x) can be achieved:

h(x) :=

1 x ∈ (0, 1

2 )−1 x ∈ (1

2 , 1)0 x ∈ R\[0, 1]

.

Its Fourier transform is

h(ξ) =12ψ1(

ξ

2) =

14iξe−iξ/2(

sinξ

4)2.

The time-frequency window is

[12− 1

2√

3,

12

+1

2√

3]× (−∞, ∞).

It is clearly that the width of its frequency window is infinite,Haar wavelet is good for the localized analysis in the timedomain but in the frequency domain. Haar wavelet and itsFourier transform are graphically displayed in Fig. 2.5.

(2) When m = 4, the quadratic spline wavelet is

ψ3(x) :=16

4∑k=0

(−1)k(

4k

)(x− k)2+.

Page 121: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

102 Continuous Wavelet Transforms

0 0.5 1 1.5 2 2.5 3

−1

−0.8

−0.6

−0.4

−0.2

0

0.2

0.4

0.6

0.8

1

−150 −100 −50 0 50 100 150−0.8

−0.6

−0.4

−0.2

0

0.2

0.4

0.6

0.8

(a) (b)

Fig. 2.5 (a): Haar wavelet h(x) and (b): its Fourier transform −ieiξ/2h(ξ) = 4ξ(sin ξ

4)2.

ψ3(x) := 4ψ3(2x+ 2), the quadratic spline wavelet, is appliedwidely in signal processing. It is an odd function and hascompact support [−1, 1]. In [0,∞), it can be represented as

ψ3(x) :=

8(3x2 − 2x) x ∈ [0, 1

2 )−8(x− 1)2 x ∈ [12 , 1)0 x ≥ 1

.

Its Fourier transform can be written as

ˆψ3(ξ) = iξ

(4ξ

sinξ

4

)4

.

The time-frequency window is

[− 1√7,

1√7]× [−4, 4].

Quadratic spline wavelet wavelet and its Fourier transform aregraphically displayed in Fig. 2.6. Note: The width 4 of thefrequency window was approximately computed with Matlabsystem, however, a little error maybe exists.

Page 122: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Some Examples of Basic Wavelets 103

−1.5 −1 −0.5 0 0.5 1 1.5−3

−2

−1

0

1

2

3

−50 −40 −30 −20 −10 0 10 20 30 40 50−2.5

−2

−1.5

−1

−0.5

0

0.5

1

1.5

2

2.5

(a) (b)

Fig. 2.6 (a): Quadratic Spline wavelet ψ3 and (b): its Fourier transform −i ˆψ3.

Page 123: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

This page intentionally left blankThis page intentionally left blank

Page 124: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Chapter 3

Multiresolution Analysis and WaveletBases

3.1 Multiresolution Analysis

3.1.1 Basic Concept of Multiresolution Analysis (MRA)

It was very difficult to construct a wavelet basis of L2(R) early on in thehistory of the wavelet development. From the point of view of functionanalysis, it is also a non-trival task to find such a function ψ with good reg-ularity and localization to ensure that ψj,k(x) := 2j/2ψ(2jx − k)j∈Z, k∈Z

to be an orthonormal basis of L2(R). For a long time, people doubted theexistence of this function. Fortunately, in 1980s, such functions were found,and a standard scheme to construct wavelet bases was set up as well. Ithas been proved theoretically that almost all useful wavelet bases can beconstructed using the standard scheme, namely, Multiresolution Analysis(MRA). MRA was first published in 1989 by Mallat and Meyer [Mallat,1989a; Meyer, 1990]. Since that time, the multiresolution analysis has be-come a very important tool in signal processing, image processing, patternrecognition, and other related fields. In this section, we will introduce theintuitive meaning of wavelet and multiresolution analysis. Our purpose isto find a function ψ to ensure that ψj,k(x) := 2j/2ψ(2jx − k)j∈Z, k∈Z

is an orthonormal bases of L2(R). Two variables are embedded in them,namely the translation factor k ∈ Z, and the dilation factor j ∈ Z. Forψj,k|k ∈ Z, if j is fixed, there will be a fixed bandwidth:

|(ψj.k ) (ξ)| = 2−j/2|ψ(ξ

2j)|.

105

Page 125: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

106 Multiresolution Analysis and Wavelet Bases

Thus, the decomposition of L2(R) in frequency is as follows

Wj := spanψj,k| k ∈ Z,where the ψj,kk∈Z denotes the orthomormal bases of Wj . We can write

L2(R) = · · · ⊕Wj−1 ⊕Wj ⊕Wj+1 ⊕ · · ·in which, from left to right, the frequency of Wj changes from low to high.We denote that

Vj = · · · ⊕Wj−1 ⊕Wj , (j ∈ Z),

where Vj refers to the function set with lower frequency, and satisfies

• · · · ⊂ V−1 ⊂ V0 ⊂ V1 ⊂ · · ·• ⋂

j∈ZVj = 0, ⋃

j∈ZVj = L2(R)

• f(x) ∈ Vj ⇐⇒ f(2x) ∈ Vj+1

We can also write Wj = Vj+1 Vj . Therefore Wjj∈Z can also be rep-resented by Vjj∈Z. According to the above definitions, L2(R) can bedivided into the conjoint “concentric annulus” or the expanding “concen-tric balls” Wjj∈Z by Vjj∈Z. Now, we consider such a question, namely,is there a function φ with low frequency such that φ(· − k)k∈Z is an oth-onormal or a Riesz basis of V0? The answer is affirmative. In this way, wecan find ψ in from

ψ ∈ V1 V0.

By ψ ∈ V0 ⊂ V1, we obtain the two-scale equation as follows:

φ(x) = 2∑k∈Z

hkφ(2x − k), ∃hk ∈ l2(Z).

This is a famous framework referred to as the multiresolution analysis(MRA),by which wavelet can be constructed. In the following, we will show howto construct wavelet bases and the biorthonormal bases by using MRA. Wewill give the formal mathematical definitions of MRA.

Definition 3.1 Let H be a Hilbert space. Then a sequence in H , ej∞j=1

is said to be a Riesz basis of H , if the following conditions are satisfied:(1) spanej∞j=1 = H , i. e., ∀x ∈ H and ∀ε > 0, there exists

∑nj=1 cjej ,

such that ‖x−∑nj=1 cjej‖ < ε;

Page 126: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Multiresolution Analysis 107

(2) Constants A and B exist, such that

A

∞∑j=1

|cj |2 ≤ ‖∞∑j=1

cjej‖2 ≤ B∞∑j=1

|cj |2, ∀cj∞j=1 ∈ l2.

A and B are called the lower and upper bounds of the Riesz basis, respec-tively.

Particularly, if A = B = 1, ej∞j=1 is said to be an orthonormal basis.

Definition 3.2 An closed subspace Vj∞−∞ of L2(R) is sail to be a mul-tiresolution analysis (MRA), if

(1). · · · ⊂ V−1 ⊂ V0 ⊂ V1 ⊂ · · ·(2).

⋂j∈Z

Vj = 0, ⋃j∈Z

Vj = L2(R)(3). f(x) ∈ Vj ⇐⇒ f(2x) ∈ Vj+1

(4). ∃φ ∈ V0, such that φ(· − k)k∈Z is a Riesz basis of space V0. φis called the scaling function of the MRA.Especially, if the basis of (4) is orthonormal, the MRA is then called or-thonormal multiresolution analysis. Furthermore, if φ(· − k)k∈Z is theRiesz basis of V0 with both upper bound B and low bound A, we call thatφ generates a MRA with upper bound B and low bound A.

Note that, certainly, Vj is translation-invariant with 2−jZ. Meanwhile,φj,kk∈Z is a Riesz basis of Vj (the upper and lower bounds are constantsfor any j ∈ Z), here φj,k(x) := 2j/2φ(2jx− k).

In the multiresolution analysis, the key point is how the scale functionφ can be constructed. Because φ ∈ V0 ⊂ V1, and φ(2 · −k)|k ∈ Z is theRiesz basis of V1, hence, hk ∈ l2(Z) exists, such that

φ(x) = 2∑k∈Z

hkφ(2x − k). (3.1)

Applying Fourier transform to both sides of the above equation, we canfind that it is equivalent to the following fact: There exists m0(ξ) =∑

k∈Zhke

−ikξ ∈ L2(T), such that

φ(ξ) = m0(ξ

2)φ(

ξ

2). (3.2)

Therefore, we can obtain

φ(ξ) =

n∏j=1

m0(ξ

2j)

φ(ξ

2n), (∀n ∈ N).

Page 127: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

108 Multiresolution Analysis and Wavelet Bases

It means that if φ(ξ) is continuous at ξ = 0 and φ(0) = 0, we can infer∏∞j=1m0(2−jξ) is convergent, and

φ(ξ) =∞∏j=1

m0(ξ

2j). (3.3)

The construction of φ is then equivalent to looking for the function m0 with2πZ-period. The hk ∈ l2(Z) can be regarded as the mask of the two-scaleequation, and the m0(ξ) =

∑k∈Z

hke−ikξ can be considered to be the filter

function.As in the above discussion, most of wavelet bases can be constructed by

multiresolution analysis, and the key point of the MRA is how to constructφ. Moreover, φ can be constructed by solving the two-scale equation (3.1)or (3.2). Therefore, one of the most important problems in MRA is:

• The existence of the solution for the two-scale equation (3.1) or(3.2).

From (3.2), we can obtain φ which is represented by (3.3). However, itis only the formal solution, in fact, it is very difficult to find the analyticalexpression of φ for the following reasons: First, we do not know whether(3.3) is convergent. Second, we do not know whether φ belongs to L2(R).Actually, the analytical expressions do not exist for most of the scalingfunctions, which are solutions of (3.1). A treatment to handle these prob-lems is to study the convergence of the partial product

∏nj=1m0(2−jξ), and

thereafter, to check if it converges in L2(R).Although the two-scale equation has a solution φ in L2(R), it cannot

guarantee the generation of MRA from φ. The main reason is that φ(· −k)|k ∈ Z must be a Riesz basis of V0. Consequently, the second importantproblem is:

• Whether the solutions of two-scale equation (3.1) can generate aMRA.

Proving that φ(· − k)|k ∈ Z is a Riesz basis of V0 is equivalent to theproof of the [φ, φ] has positive upper and lower bounds.

The orthonormality and biorthonormality are very important in mul-tiresolution analysis and wavelet theory. Thus, the third important problemis:

Page 128: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Multiresolution Analysis 109

• The orthonormality and biorthonormality of the solutions of two-scale equation.

The orthonormality and biorthonormality can strictly be defined below:

Definition 3.3 Suppose that φ, φ ∈ L2(R).(1). If

〈φ(· − k), φ(·)〉 = δ0,k (∀k ∈ Z),

then φ, φ is said to be biorthonormal; furthermore, if φ, φ is biorthonor-mal, we can say φ is orthonormal.

(2). If φ, φ is biorthonormal, and

Vj := φj,k|k ∈ Z, Vj := φj,k|k ∈ Z, (j ∈ Z),

form MRAs in L2(R) with scale functions φ and φ respectively, we say thatφ, φ generate a pair of biorthonormal MRAs; Particularly, if φ, φ formsa pair of orthonormal MRAs, φ is said to generate an orthonormal MRA.

3.1.2 The Solution of Two-Scale Equation

• The General Solution of Two-Scale Equation

As mentioned above, the formal solution of the two-scale equation is∞∏j=1

m0(ξ/2j).

The following is a sufficient condition for its convergence:

Theorem 3.1 Let m0(ξ) ∈ C(T), and satisfy

∃ε > 0, when |ξ| is small enough : m0(ξ) = 1 +O(|ξ|ε).then,

∏∞j=1m0(ξ/2j) is uniformly convergent on any compact subset of R,

consequently, a continuous function can be defined in C(R). Furthermore,there are positive constants C, τ and δ such that the following holds:∣∣∣∣∣∣

n∏j=1

m0(2−jξ)

∣∣∣∣∣∣ ≤

exp(τ |ξ|ε), when |ξ| ≤ δ;C|ξ|σ, when |ξ| > δ,

(∀n ∈ N ∪ +∞),

where σ := log2 ‖m0‖C(T).

Page 129: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

110 Multiresolution Analysis and Wavelet Bases

Proof. According to the condition, there must exist positive constantsM and δ, such that

|m0(ξ)− 1| ≤M |ξ|ε < 1, ∀|ξ| ≤ δ.

For each compact subset K of R, we choose J ∈ N satisfying

|2−Jξ| < δ, ∀ξ ∈ K.

Then, ∀J2 ≥ J , we have

ln

J2∏j=J

m0(2−jξ)

=J2∑j=J

lnm0(2−jξ)

=J2∑j=J

ln[1 + (m0(2−jξ)− 1)

]≤

J2∑j=J

[m0(2−jξ)− 1]

≤ M

J2∑j=J

|2−jξ|ε

≤ M2−ε(J−1)

2ε − 1|ξ|ε. (∗)

Therefore, when J is large enough, we can write

ln

J2∏j=J

m0(2−jξ)

= O(2−Jε)→ 0, (∀ξ ∈ K, J →∞).

Consequently,∏∞j=1m0(ξ/2j) is uniformly convergent on any compact sub-

set of R. Since m0 ∈ C(T), it defines a continuous function.For the inequality, we only focus on n ∈ N. It is obvious, for n =∞.∀ξ ∈ R with ξ = 0, let J1 ∈ Z satisfy

12δ < |2−J1ξ| ≤ δ.

Page 130: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Multiresolution Analysis 111

Now, we denote J := max(1, J1), then ∀J2 ≥ J , according to the formula(*), we have

J2∏j=J

m0(2−jξ) ≤ exp(M

2−ε(J−1)

2ε − 1|ξ|ε

).

If 0 < |ξ| ≤ δ, then J1 ≤ 0, J = 1, and ∀n ∈ N, we denote J2 = n, andobtain∣∣∣∣∣∣

m∏j=1

m0(2−jξ)

∣∣∣∣∣∣ =m∏j=J

m0(2−jξ) ≤ exp(

M

2ε − 1|ξ|ε

)= exp (τ |ξ|ε),

where τ := M2ε−1 > 0.

When ξ = 0, because m0(0) = 1, it satisfies the inequality.If |ξ| > δ, then J1 ≥ 1, J = J1, therefore, when n ≥ J1, we can deduce

that ∣∣∣∣∣∣m∏j=1

m0(2−jξ)

∣∣∣∣∣∣ =

∣∣∣∣∣∣J1−1∏j=1

m0(2−jξ)

∣∣∣∣∣∣m∏j=J

m0(2−jξ)

≤ (‖m0‖C(T)

)J1−1 exp(M

2−ε(J−1)

2ε − 1|ξ|ε

)= 2(J1−1) log2 ‖m0‖C(T) exp

(M

2ε − 1|2−J1ξ|ε

)≤

( |ξ|δ

)σexp

(M

2ε − 1δε)

= C|ξ|σ,

where,

σ := log2 ‖m0‖C(T), C := δ−σ exp(M

2ε − 1δε).

For n < J1, by ‖m0‖C(T) ≥ |m0(0)| = 1, we have∣∣∣∣∣∣m∏j=1

m0(2−jξ)

∣∣∣∣∣∣ ≤ (‖m0‖C(T)

)m ≤ (‖m0‖C(T)

)J1−1 ≤( |ξ|δ

)σ≤ C|ξ|σ .

This concludes our proof.

Page 131: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

112 Multiresolution Analysis and Wavelet Bases

Note: Especially, if m0 is a trigonometric polynomial and m0(0) = 1,then, the conditions of this theorem are satisfied.

We hope that∏∞j=1m0(ξ/2j) ∈ L2(R), so that the inverse Fourier trans-

form of φ can be also in L2(R). This means that φ is a solution of equation(3.1). Unfortunately, under the conditions of (3.1),

∏∞j=1m0(ξ/2j) may

not be in L2(R), which can be shown by a simple example, namely, letm0(ξ) ≡ 1, then

∏∞j=1m0(ξ/2j) ≡ 1 ∈ L2(R). We can handle this prob-

lem in two ways: First, we can enhance the conditions for m0(ξ), so asto ensure

∏∞j=1m0(ξ/2j) ∈ L2(R). Second, we can discuss the solution

of the equation(3.1) in a larger space over L2(R). We will now focus onthe second way. In the conditions of (3.1),

∏∞j=1m0(ξ/2j) is continuous

and increase at most polynomially fast at infinite. It belongs to ϕ′, thespace of all the slowly increasing generalized functions, where the opera-tion of Fourier transform is very convenient. We will discuss the solutionof two-scale equation in ϕ′.

As we know, the space ϕ′ consistes of all the continuous linear func-tionals on ϕ. ϕ is the space of all the fast decreasing C∞ functions, whosedefinition is as below:

ϕ := ϕ ∈ C∞(R) | supx∈R

(1+|x|2) k2 |∂αϕ(x)| ≤Mk,α <∞ (k, |α| = 0, 1, · · ·).

By equiping countable semi-norms as follows:

‖ϕ‖m := sup|α| ≤ mx ∈ R

(1 + |x|2)m2 |∂αϕ(x)|, (m = 0, 1, · · ·),

ϕ becomes a countable-norm space, i.e., a B∗0 space (see [Zhang, 1986]).

For 1 ≤ p ≤ ∞, we define

PLp := PLp(R) := f | ∃m ∈ N : (1 + |x|)−mf(x) ∈ Lp(R). (3.4)

Let f ∈ PL1, and we define

〈f, g〉 :=∫

R

f(x)g(x)dx (∀g ∈ ϕ).

It is obvious that

PL∞ ⊂ PLp ⊂ PL1 ⊂ ϕ′ (1 ≤ p ≤ ∞).

Page 132: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Multiresolution Analysis 113

Now, we will prove that the following two equations are equivalent toeach other:

φ = 2∑k∈Z

hkφ(2 · −k) ( In ϕ′, the right term is convergent) (3.5)

φ = m0(·2)φ(·2) (In ϕ′) (3.6)

Theorem 3.2 Let m0(ξ) =∑k∈Z

hke−ikξ ∈ C(T), and φ ∈ ϕ′. If one of

the following two conditions is satisfied:(1). φ ∈ PL1 and

∑k∈Z|hk| <∞;

(2).∑k∈Z|hk||k|n <∞ (∀n ∈ N),

then, φ satisfies (3.5) if and only if φ satisfies (3.6).

Proof. ∀φ ∈ ϕ′, g ∈ ϕ, we denote

In := limn→∞〈(

∑|k|≤n

hke−ik ·

2 )φ(·2)−m0(

·2)φ(·2), g〉.

The satisfaction of the condition (1) produces

|In| =

∣∣∣∣∣∣∫

R

φ(ξ

2)(∑|k|>n

hke−ik ξ

2 )g(ξ)dξ

∣∣∣∣∣∣≤ (

∑|k|>n

|hk|)∫

R

∣∣∣∣φ(ξ

2)g(ξ)

∣∣∣∣ dξ→ 0 (n→∞).

The satisfaction of the condition (2) yields

gn(ξ) := (∑|k|>n

hke−ik ξ

2 )g(ξ) ∈ ϕ.

Consequently, we have, ∀m ∈ Z+,

‖gn‖m= sup

ξ∈R,|α|≤m|(1 + |ξ|2)m

2 Dαgn(ξ)|

= supξ∈R,|α|≤m

∣∣∣∣∣∣(1 + |ξ|2)m2

∑β≤α

β

)(∑|k|>n

hk(−ik2 )βe−ikξ2 )Dα−βg(ξ)

∣∣∣∣∣∣

Page 133: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

114 Multiresolution Analysis and Wavelet Bases

≤ supξ∈R,|α|≤m

|(1 + |ξ|2)m2

∑β≤α

β

)(∑|k|>n

|hk||k||β|)|Dα−βg(ξ)|

≤ C(∑|k|>n

|hk||k|m) supξ∈R,|α|≤m

|(1 + |ξ|2)m2 |Dαg(ξ)|

= C(∑|k|>n

|hk||k|m)‖g‖m

→ 0 (n→∞),

where, C stands for an constant which depends only on m. Thus, we canobtain gn → 0 (in ϕ as n→ 0). Therefore, we have

|In| =∣∣∣∣∣∣〈φ(·2), (

∑|k|>n

hke−ik ·

2 )g〉∣∣∣∣∣∣ =

∣∣∣〈φ(·2), gn〉

∣∣∣→ 0 (n→ 0).

It implies that

φ satisfies (3.5) ⇐⇒ φ = 2∑k∈Z

hk(φ(2 · −k))

⇐⇒ φ = limn→∞

∑|k|≤n

hke−ik ·

2 φ(·2)

⇐⇒ 〈φ, g〉 = limn→∞〈(

∑|k|≤n

hke−ik ·

2 )φ(·2), g〉 (∀g ∈ ϕ)

⇐⇒ 〈φ−m0(·2)φ(·2), g〉

= limn→∞〈[

∑|k|≤n

hke−ik ·

2 −m0(·2)]φ(·2), g〉 (∀g ∈ ϕ)

⇐⇒ 〈φ−m0(·2)φ(·2), g〉 = lim

n→∞ In = 0 (∀g ∈ ϕ)

⇐⇒ φ satisfy(3.6).

This establishes our proof.As for the solution of two-scale equation in ϕ′, we have the following

results.

Theorem 3.3 Let m0(ξ) =∑k∈Z

hke−ikξ ∈ C(T), such that

∏∞j=1m0( ξ2j )

converges pointwise to M(ξ) ∈ PL1. Then, φ := M ∈ ϕ′ is a solution of(3.6). Futhermore, if M(ξ) is continuous at ξ = 0 and M(0) = 1, then φ

Page 134: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Multiresolution Analysis 115

is the unique solution of (3.6) in ϕ′0 (ϕ′

0 ⊂ ϕ) which is defined by:

ϕ′0 := φ ∈ ϕ′ | φ ∈ PL1, φ(ξ) is continuous at ξ = 0 , φ(0) = 1 (3.7)

Proof. It is clear that

M(ξ) = m0(ξ

2)M(

ξ

2), a.e. ξ ∈ R.

Therefore, as a generalized function in ϕ′, we have M(·) = m0( ·2 )M( ·

2 ),that is, φ := M ∈ ϕ′ satisfies

φ(·) = m0(·2)φ(·2) in ϕ′.

Consequetly, φ is the solution of (3.6).If M(ξ) is continuous at ξ = 0, and M(0) = 1, it is obvious that, φ ∈ ϕ′

0,i.e. φ := M is the solution of (3.6) in ϕ′

0.Now, we will prove the unicity of the solution. Suppose φ ∈ ϕ′

0 is asolution of (3.6), hence, as a generalized function of ϕ′, it satisfies

φ = m0(·2)φ(·2) (in ϕ′).

As φ ∈ PL1, the above result is equivalent to that of ordinary function,thus, we obtain

φ(ξ) = m0(ξ

2)φ(

ξ

2) a. e. ξ ∈ R.

Therefore,

φ(ξ) = m0(ξ

2)φ(

ξ

2) = · · · = (

n∏j=1

m0(ξ

2j))φ(

ξ

2n) a. e. ξ ∈ R.

Let n→∞, we have

φ(ξ) =∞∏j=1

m0(ξ

2j) = M(ξ) a. e. ξ ∈ R.

As a conclusion, φ = M holds. The proof is complete.

Corollary 3.1 Let m0(ξ) =∑

k∈Zhke

−ikξ ∈ C(T), such that∑k∈Z

|hk| <∞,

Page 135: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

116 Multiresolution Analysis and Wavelet Bases

and

∃ε > 0, when |ξ| is small enough, m0(ξ) = 1 +O(|ξ|ε).

Then, (3.5) and (3.6) have the same solution in ϕ′0, which is just the inverse

Fourier transform of∏∞j=1m0( ·

2j ).

Proof. According to threorem 3.2, it is known that the two-scale equa-tions (3.5) and (3.6) have the same solution in ϕ′. By Theorems 3.1 and 3.3,a unique solution exists in ϕ′

0, which is just the inverse Fourier transformof∏∞j=1m0( ·

2j ).This result is enough for wavelet analysis in L2(R), although the solution

of two-scale equation is in ϕ′0. To solve the unique solution of two-scale

equation in L2(R) is much more difficult than that in ϕ′. Thus, we discussedthe case of ϕ′ first. Meanwhile, from the above analysis, we found that theunicity of the solution in ϕ′

0 implicates the unicity in L2(R). Consequently,our task will be changed to investigate the conditions which can guaranteethat the solution in ϕ′

0 belongs to L2(R).

The Cascade Algorithm to Solve Two-Scale Equation

It is assumed that m0(ξ) =∑

k∈Zhke

−ikξ ∈ C(R), we take η0 ∈ L∞(R) ∩L1(R), such that η0(0) = 1. Hence, the general scheme of the Cascadealgorithm is

ηn(x) := 2∑k∈Z

hkηn−1(2x− k), (n = 1, 2, · · ·). (3.8)

In order to guarantee the convergence of the series in the Cascade algorithm,we suppose that

∑∞j=1 |hk| <∞. It is easy to see that the right hand side of

the Cascade algorithm is absolutely convergent, ηn ∈ L∞(R) ∩L1(R) (n =1, 2, · · ·), and

‖ηn‖∞ ≤ (2∑k∈Z

|hk|)‖ηn−1‖∞, ‖ηn‖1 ≤ (∑k∈Z

|hk|)‖ηn−1‖1,

for n = 1, 2, · · ·. Since

ηn(ξ) = (n∏j=1

m0(ξ

2j))η0(

ξ

2n),

Page 136: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Multiresolution Analysis 117

we have, under the condition of Theorem 3.1, that

ηn(ξ)→∞∏j=1

m0(ξ

2j) a.e. ξ ∈ R,

thus, positive constants C and σ exist, such that

|ηn(ξ)| ≤ C(1 + |ξ|)σ , (∀ξ ∈ R).

Therefore, ∀g ∈ ϕ, using Lebesgue’s dominated convergence theorem, weconclude that

〈ηn, g〉 =∫

R

ηn(ξ)g(ξ)dξ → 0, (n→∞),

that is

ηn → (∞∏j=1

m0(ξ

2j)) in ϕ′.

Therefore,

ηn → (∞∏j=1

m0(ξ

2j))ˇ in ϕ′.

Consequently, the limit of ηn in ϕ′0 is just the unique solution of (3.5) in

ϕ′. In summary, we have the following theorem.

Theorem 3.4 Let m0(ξ) =∑k∈Z

hke−ikξ ∈ C(T) satisfy

∑k∈Z|hk| <

∞, and

∃ε > 0, when |ξ|is small enough, m0(ξ) = 1 +O(|ξ|ε).Let η0 ∈ L∞(R) be a function with compact support [A,B], and satisfyη0(0) = 1. Then the function sequence ηn defined by Cascade algorithm(3.8) is convergent in ϕ′. The limit is the unique solution of (3.5) in ϕ′

0.

If hkk∈Z has finite length, that is, the nonzero items in hkk∈Z isfinit, it can be proved that the solution of (3.5) has a compact support inϕ′

0. The support of φ ∈ ϕ′ is defined as

suppφ := x ∈ R| ∀ open set Ox x, ∃g ∈ C∞c (Ox) : 〈φ, g〉 = 0, (3.9)

where C∞c (Ox) denotes the space of all the C∞ functions which is compactly

supported in Ox.

Page 137: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

118 Multiresolution Analysis and Wavelet Bases

Obviously, the support defined in the above is a closed set in R. Whenφ degenerates to an ordinary locally integrable function, the definition ofits support is the same as that of the ordinary meaning. The definition ofthe support of an ordinary function is defined by

suppφ := x ∈ Rd| ∀Ox x, always has : |Ox ∩ φ(x) = 0| > 0. (3.10)

where, Ox denotes an open set containing x, and |Ox∩φ(x) = 0| denotesthe Lebesgue measure of the set Ox∩φ(x) = 0. In order to prove that theunique solution of the equation (3.5) in ϕ′

0 is compactly supported whenhkk∈Z has finite length, we first consider the following lemma:

Lemma 3.1 Let hkk∈Z be a complex sequence supported in [N,M ] inthe meaning that hk = 0 if k ∈ [N,M ]. Let η0 ∈ L∞(R) is compactlysupported on [A,B]. Then, for the function sequence ηn which is givenby Cascade algorithm (3.8), we have

suppηn ⊂ [A(n), B(n)], (n = 0, 1, · · ·),where A(n), B(n) are defined by

A(0) = A

B(0) = B

A(n) = 1

2 (N +A(n−1))B

(n)i = 1

2 (M +B(n−1)), (n = 1, 2, · · ·),

and satisfyA(n)∞n=1 is a monotonous sequence between N and A, and A(n) →

N (n→∞);B(n)∞n=1 is a monotonous sequence between M and B, and B(n) →

M (n→∞).

Proof. We use induction for n to prove suppηn ⊂ [A(n), B(n)]. Obviously,for n = 0, our conclusion is established. Suppose it is right for n−1. As forsuppηn, let ηn(x) = 0, then, ∃k ∈ [N,M ], such that 2x − k ∈ suppηn−1 ⊂[A(n−1), B(n−1)]. This means A(n−1) ≤ 2x−k ≤ B(n−1) or 1

2 (A(n−1) +k) ≤x ≤ 1

2 (B(n−1) + k). Therefore, 12 (A(n−1) + N) ≤ x ≤ 1

2 (B(n−1) + M). Sofar, we proved that

suppηn ⊂[(An−1) +N

2,B(n−1) +M

2

]= [A(n), B(n)].

By induction, the result holds for n ∈ Z+.We now discuss the monotonicity of A(n)∞n=0, in two cases:

Page 138: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Multiresolution Analysis 119

If A(0) = A ≥ N , then, by A(n) = 12 (N+A(n−1)), it is easy to prove that

A(n) ≥ N , so A(n) ≤ A(n−1) ≤ · · · ≤ A(0). i. e. A(n)∞n=1 is a monotonoussequence valued between N and A.

If A(0) = A ≤ N , the same conclusion can be proved in the same way.Leting n → ∞ on the both sides of A(n) = 1

2 (N + A(n−1)), we obtainthat A(n) → N .

We can give the proof in the same way for B(n).The proof of the Lemma completes.

Theorem 3.5 Let hkk∈Z be a complex sequence which is supported in[N,M ],

∑k∈Z

hk = 1. Then, the unique solution φ of equation (3.5) in ϕ′0

is compactly supported on [N,M ].

Proof. Let η0 ∈ L∞(R) satisfy suppη0 ⊂ [A,B], and η0(0) = 1. Then,for the function sequence ηn derivated by the cascade agorithm, we haveηn → φ (in ϕ′), where φ is the unique solution of (3.5)in ϕ′

0, and

suppηn ⊂ [A(n), B(n)] (n = 0, 1, · · ·),

where A(n), B(n) satisfy

A(n) → N , B(n) →M, (n→∞).

∀x ∈ [N,M ], there exists a neighborhoodOx of x, such that the distancebetween [N,M ] and Ox is positive. Then, when n is large enough, we have

([A(n), B(n)])⋂Ox = empty set.

For any g ∈ C∞c (Ox), we have

〈φ, g〉 = limn→∞〈ηn, g〉 = 0.

Therefore, x ∈ suppφ. Now that x is an arbitrary point of R\[N,M ], wehave

R\[N,M ] ⊂ R\suppφ,

i.e., suppφ ⊂ [N,M ].This ends the proof.

Page 139: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

120 Multiresolution Analysis and Wavelet Bases

3.2 The Construction of MRAs

To facilitate the discussion, we assume the 2πZ-periodic function, m0(ξ), iscontinuous on R. We will study how MRAs can be constructed from suchm0(ξ) that satisfies some basic conditions as follows.

Definition 3.4 Suppose m0(ξ) is 2πZ-periodic measurable function onR.

• m0 is said to satisfy the basic condition I , ifm0(ξ) ∈ C(T), m0(0) =1 and m0(π) = 0;• m0 is said to satisfy the basic condition II , if

∏∞j=1m0(ξ/2j) a.e.

converges to a non-zero function, which is denoted by φ and iscalled the corresponding limit function, (where φ denotes a functioninstead of the Fourier transform of a function temporarily.)

To study the sufficient conditions such that the solution of the two-scaleequation belongs to L2(R), the transition operators will be introduced first.

Let m0, m0 be 2πZ−periodic functions on R, we define:

Tf(ξ) :=∣∣∣∣m0(

ξ

2)∣∣∣∣2 f(

ξ

2) +

∣∣∣∣m0(ξ

2+ π)

∣∣∣∣2 f(ξ

2+ π) (3.11)

T f(ξ) :=∣∣∣∣m0(

ξ

2)∣∣∣∣2 f(

ξ

2) +

∣∣∣∣m0(ξ

2+ π)

∣∣∣∣2 f(ξ

2+ π) (3.12)

Sf(ξ) := m0(ξ

2)m0(

ξ

2)f(

ξ

2) + m0(

ξ

2+ π)m0(

ξ

2+ π)f(

ξ

2+ π) (3.13)

|S|f(ξ) :=∣∣∣∣m0(

ξ

2)m0(

ξ

2)∣∣∣∣ f(

ξ

2) +

∣∣∣∣m0(ξ

2+ π)m0(

ξ

2+ π)

∣∣∣∣ f(ξ

2+ π)

(3.14)

The following lemma is important.

Lemma 3.2 Let m0 ∈ C(T) satisfy the basic condition II and the corre-sponding limit function φ ∈ C(R). Let X be a closed subspace of C(T) andsatisfy both of the following conditions:

(1). T (X) ⊂ X and the spectral radius rσ(T |X) of T |X, which is therestriction of the transition operator T on X, satisfies rσ(T |X) < 1;

(2). There exists a non-negative function f ∈ X which has at most onezero point ξ = 0 in [−π, π].

Page 140: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

The Construction of MRAs 121

Then φ ∈ L2(R) and ‖φn − φ‖2 → 0 (n→∞), where φn is defined by

φn(ξ) :=n∏j=1

m0(2−jξ)χ2n[−π,π](ξ). (3.15)

Proof. It can easily be deduced that φ(0) = 1. Let δ : 0 < δ < π satisfy

12≤ |φ(ξ)| ≤ 2, ∀ξ ∈ [−δ, δ].

Since f is continuous and positive on [−π, π]\(− 12δ,

12δ), a constant C > 0

must exist, such that

C−1 ≤ f(ξ) ≤ C, ∀ξ ∈ [−π, π]\(−12δ,

12δ).

We denote

En := [−2nδ, 2nδ], (n = 0, 1, · · ·).Then 2−nξ ∈ E0 = [−δ, δ] for any ξ ∈ En. Therefore,

|φ(ξ)| = |φn(ξ)φ(2nξ)| ≤ |φn(ξ)| supξ∈E0

|φ(ξ)| ≤ 2|φn(ξ)|.

Hence we have∫En\En−1

|φ(ξ)|2dξ ≤ 4∫En\En−1

|φn(ξ)|2dξ

≤ 4∫

[−2nπ,2nπ]\En−1

|φn(ξ)|2dξ

≤ 4C∫

[−2nπ,2nπ]\En−1

|φn(ξ)|2f(2−nξ)dξ

≤ 4C∫

R

|φn(ξ)|2f(2−nξ)dξ

= 4C∫

T

(T nf)(ξ)dξ

= 4C∫

T

((T |X)nf)(ξ)dξ

≤ 4C(2π)‖f‖C(T)‖(T |X)n‖.Let ρ satisfy rσ(T |X) < ρ < 1. According to the spectral radius formula,we deduce that limn→∞ ‖(T |X)n‖1/n = rσ(T |X). Thus there exists N > 0

Page 141: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

122 Multiresolution Analysis and Wavelet Bases

such that ‖(T |X)n‖ ≤ ρn for n > N , which concludes that∫En\En−1

|φ(ξ)|2dξ ≤ 4∫

[−2nπ,2nπ]\En−1

|φn(ξ)|2dξ ≤ 4C(2π)‖f‖C(T)ρn.

Consequently,∫R

|φ(ξ)|2dξ =∫EN

|φ(ξ)|2dξ +∞∑

n=N+1

∫En\En−1

|φ(ξ)|2dξ

≤ (2N+1δ)‖φ‖C(EN) + 4C(2π)‖f‖C(T)

∞∑n=N+1

ρn

< ∞.φ ∈ L2(R) is proved.

To prove ‖φn − φ‖2 → 0 (n→∞). We deduce that

‖φn‖22 =∫

R

|φn(ξ)|2dξ =∫

[−2nπ,2nπ]

|φn(ξ)|2dξ

=∫

[−2nπ,2nπ]\En−1

|φn(ξ)|2dξ +∫En−1

|φn(ξ)|2dξ.

Since 2−nξ ∈ [− 12δ,

12δ] ⊂ [−δ, δ] for any ξ ∈ En−1, we have

|φ(ξ)| = |φn(ξ)φ(2−nξ)| ≥ 12|φn(ξ)|.

Hence

|φn(ξ)|2χEn−1(ξ) ≤ 4|φ(ξ)|2, ∀ξ ∈ R.

Now that φn(ξ)χEn−1(ξ) → φ(ξ) a.e. ξ ∈ R, the Lebesgue dominated con-vergence theorem deduces that∫

En−1

|φn(ξ)|2dξ =∫

R

|φn(ξ)|2χEn−1(ξ)dξ →∫

R

|φ(ξ)|2dξ = ‖φ‖22,

which together with the following result∫[−2nπ,2nπ]\En−1

|φn(ξ)|2dξ ≤ C(2π)‖f‖C(T)ρn → 0 (n→ 0)

concludes that ‖φn‖2 → ‖φ‖2 (n → ∞). Note that φn(ξ) → φ(ξ) a.e. ξ ∈R (n → ∞), we obtain ‖φn − φ‖2 → 0 (n → ∞). Thus, the proof of thelemma is complete.

Page 142: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

The Construction of MRAs 123

Particularly, if m0 satisfies the basic conditions I and II, we set

X = C(T) := f ∈ C(T)|f(0) = 0 or X = PN := f ∈ PN |f(0) = 0corresponding to m0 ∈ C(T) or m0 ∈ P+

N respectively, where

PN :=

N∑

n=−Ncne

−inξ ∣∣ ∀ sequence cnn∈Z

,

P+N :=

N∑n=0

cne−inξ ∣∣ ∀ sequence cnn∈Z

.

Then we have T (X) ⊂ X . According to the above lemma, we obtain thefollowing theorem.

Theorem 3.6 Supposem0 meets the basic conditions I and II and its limitfunction satisfies φ ∈ C(R). If the spectral radius rσ(T |C(T)) of T |X, the

restriction of T defined by (3.11), satisfies rσ(T |C(T)) < 1, then φ ∈ L2(R)

and ‖φn − φ‖2 → 0 (n→∞), where φn is defined by (3.15).

Proof. According to the above lemma, the theorem holds obviously if weset X = C(T) and f(ξ) := (1− cos ξ)2.

Now, we give a theorem for the case that m0 is a trigonometric polyno-mial. The readers can refer to [Long, 1995] for the proof.

Theorem 3.7 Let m0 ∈ P+N ( N = 0), m0(0) = 1,m0(π) = 0 and φ be

its limit function. We denote

PN := f ∈ PN |f(0) = 0.Then the following three conditions are equivalent to each other:

(1). λ = 1 is the simple eigenvalue of the restriction T |PN of T on PN ,and each of its other eigenvalues λ satisfies |λ| < 1, where T is defined by(3.11).

(2). each eigenvalue λ of the restriction T |PNof T on PN satisfies

|λ| < 1.(3). φ ∈ L2(R) and ‖φn − φ‖2 → 0 (n → ∞), where φn is defined by

(3.15)Furthermore, each of them implies the following results:

(i). Φ := [φ, φ] ∈ PN and Φ is the eigenvetor of T |PN corresponding tothe simple eigenvalue λ = 1

Page 143: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

124 Multiresolution Analysis and Wavelet Bases

(ii). There exist constants 0 < ε < 2 and C > 0 such that∑k∈Z

|φ(ξ + 2kπ)|2−ε ≤ C, |φ(ξ)| ≤ C(1 + |ξ|)−ε, (∀ξ ∈ R),

where

Φ(ξ) := [φ, φ] :=∑k∈Z

|φ(ξ + 2πk)|2. (3.16)

We consider whether φ generates an orthonormal MRA or a biorthog-onal MRA. The estimation of the lower and upper bounds of Φ = [φ, φ] iskey to this question. In mathematics, it is difficult since Φ is defined byan infinite sum and not easily to be expressed analytically in general. Theabove theorem, however, tells us that under certain conditions, Φ is justthe eigenvector of T |PN corresponding to the simple eigenvalue λ = 1. Thelatter can be solved with a computer.

A sufficient condition such that φ ∈ L2(R) and ‖φn− φ‖2 → 0 (n→∞)is given as follows. Its proof is omitted here and can be found in somereferences such as [Daubechies, 1992; Long, 1995].

Theorem 3.8 Suppose m0 can be written as

m0(ξ) = (1 + e−iξ

2)LM0(ξ)

where L ∈ Z+ and M0 ∈ C(T) satisfies:(1). M0(π) = 0;(2). There exists a constant 0 < δ < 1 satisfying M0(ξ) = 1 + O(|ξ|δ)

in some neighborhood of ξ = 0;(3). There exists k ∈ N such that

Bk := maxξ∈R

|M0(ξ) · · ·M0(2k−1ξ)|1/k < 2L−12 .

Then, φ ∈ L2(R), ‖φn − φ‖2 → 0 (n → ∞) and a constant C > 0 exists,such that

|φ(ξ)| ≤ C

(1 + |ξ|) 12+ε

, (∀ξ ∈ R),

where ε := L− 12 − logBk > 0 and φn is defined by (3.15).

Page 144: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

The Construction of MRAs 125

The following is a sufficient and necessary condition, which can guaran-tee that φ generates a MRA.

Theorem 3.9 Let m0 satisfy the basic conditions I and II and φ ∈ C(R)be its limit function. Then φ generates MRA if and only if both of thefollowing two conditions hold:

(1). φ ∈ L2(R) and ‖φn − φ‖2 → 0 (n → ∞), where φn is defined by(3.15).

(2). Two positive constants A and B exist, such that A ≤ (T n1)(ξ) ≤B a.e. ξ ∈ T for any n ∈ N, where T is the transition operator defined by(3.11).

Proof. To prove the necessity we assume that φ generates a MRA ofL2(R). Two constants A and B exist, such that Φ defined by (3.16) satisfies

A ≤ Φ(ξ) ≤ B a.e. ξ ∈ T,

which concludes (1).Now, we prove (2). Since T n is a positive linear operator for any n ∈ N,

we deduce that T nf(ξ) ≤ T ng(ξ) a.e. ξ for any f(ξ) ≤ g(ξ) a.e. ξ. UsingT nΦ = Φ, we have:

A ≤ Φ(ξ) = T nΦ(ξ) ≤ (T nB)(ξ) = B(T n1)(ξ), a.e. ξ ∈ T;

B ≥ Φ(ξ) = T nΦ(ξ) ≥ (T nA)(ξ) = A(T n1)(ξ), a.e. ξ ∈ T.

Therefore, AB ≤ (T n1)(ξ) ≤ BA a.e. ξ ∈ T. The proof of (2) is complete.

To prove the sufficiency, we suppose (1) and (2) hold. For any func-tion g which is 2πZ-periodic, bounded, non-negative and measurable, thefollowing holds: ∫

R

|φn(ξ)|2g(ξ)dξ =∫

T

(T n1)(ξ)g(ξ)dξ.

Hence

A

∫T

g(ξ)dξ ≤∫

R

|φn(ξ)|2g(ξ)dξ ≤ B∫T

g(ξ)dξ.

Let n→∞, we have

A

∫T

g(ξ)dξ ≤∫

R

|φ(ξ)|2g(ξ)dξ ≤ B∫T

g(ξ)dξ,

Page 145: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

126 Multiresolution Analysis and Wavelet Bases

i.e.

A

∫T

g(ξ)dξ ≤∫

T

Φ(ξ)g(ξ)dξ ≤ B∫

T

g(ξ)dξ.

Thus, A ≤ Φ(ξ) ≤ B a.e.ξ ∈ T which implies consequently that φ(·−k)|k ∈Z constitute a Riesz basis of V0 := spanφ(· − k)|k ∈ Z. By the fact ofφ(0) = m0(0) = 1 we deduce that ∪j∈ZVj = L2(R) for Vj := f(2j·)|f ∈V0 (j ∈ Z). Therefore, φ generates a MRA of L2(R). This ends the proofof the theorem.

For the case that m0 is trigonometric polynomial, we further have fol-lowing result.

Corollary 3.2 Let m0 ∈ P+N (where N ∈ Z+, N = 0). Then φ(ξ) :=∏∞

j=1m0(ξ/2j) converges a.e. ξ ∈ R, belongs to L2(R) and φ generates aMRA, if and only if the following three conditions hold:

(1). m0(0) = 1 and m0(π) = 0,(2). λ = 1 is the simple eigenvalue of T |PN which is the restriction of

T defined by (3.11) on PN , and each of its other eigenvalues λ satisfies|λ| < 1.

(3). The eigenvector g ∈ PN of T |PN corresponding to the eigenvalue 1has positive lower bound if g(0) = 1, that is, there is a constant C > 0 suchthat g(ξ) ≥ C (∀ξ ∈ T).

Proof. To prove the necessity, we choose ξ0 ∈ R such that∏∞j=1m0(ξ0/2j)

converges. Then limj→∞m0(ξ0/2j) = 1, i.e. m0(0) = 1.Since φ ∈ L2(R), and m0 ∈ P+

N implies that φ is compactly supported,we conclude that Φ := [φ, φ] is a trigonometric polynomial. According tothe fact that φ generates a MRA, it can be shown easily that Φ has positiveupper and lower bounds on T. Therefore, (1) holds.

By Theorems 3.7 and 3.9, it can be concluded that (2) holds and Φ =[φ, φ] is the eigenvector of T |PN corresponding to the eigenvalue 1. Since1 is the simple eigenvalue of T |PN , we deduce that g ∈ PN is just someconstant times of Φ. Now, g(0) = Φ(0) = 1, we further have g ≡ Φ. Henceg has positive lower bound and (3) is proved.

To prove the sufficiency, we deduce that φ ∈ L2(R), Φ ∈ PN and Φ haspositive lower bound according to Theorem 3.7 and condition (3). On theother hand, Φ ∈ PN implies that Φ has positive upper bound. Hence, Φ haspositive upper and lower bounds, which together with the equality φ(0) = 1concludes that φ generates a MRA. The proof is complete.

Page 146: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

The Construction of MRAs 127

This corollary is more convenient to be applied in practice. It can beeasily implemented with a computer.

3.2.1 The Biorthonormal MRA

The purpose of this section is to construct such φ, φ ∈ L2(R) that generatea pair of biorthonormal MRA. The first task is to construct the biorthonor-mal functions φ, φ, or equivalently, to find out the conditions for masksm0 and m0, such that following two-scale relation:

φ(ξ) = m0(ξ

2)φ(

ξ

2) (3.17)

ˆφ(ξ) = m0(

ξ

2)ˆφ(

ξ

2) (3.18)

Generally, it is very difficult to find out the sufficient and necessaryconditions. To avoid such difficulty, we will first study some basic necessaryconditions for m0,m0, Thereafter, by enhancing the conditions until wemeet the sufficient ones.

Let φ, φ generate a pair of biorthonormal MRA. There exists a con-stant C > 0 such that

C−1 ≤ Φ(ξ), Φ(ξ) ≤ C a.e. ξ ∈ R,

where Φ(ξ) is defined by (3.16), and

Φ(ξ) := [ˆφ, ˆφ] :=∑k∈Z

|φ(ξ + 2kπ)|2. (3.19)

Enhance the above inequality by letting

C−1 ≤ Φ(ξ), Φ(ξ) ≤ C (∀ξ ∈ R).

Then it can be deduced that

m0(0) = 1, m0(π) = 0.

In order to define φ, φ from m0, m0 based on the two-scale relation, weassume that

∏∞j=1 m0(ξ/2j) and

∏∞j=1m0(ξ/2j) are pointwise convergent.

This assumption is necessary if ˆφ(ξ) and φ(ξ) are expected to be continuousat ξ = 0 and are not zero functions.

Page 147: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

128 Multiresolution Analysis and Wavelet Bases

According to the biorthonormal property, we have (see Theorem 3.11):

m0(ξ)m0(ξ) + m0(ξ + π)m0(ξ + π) = 1 a.e. ξ ∈ R.

To facilitate the discussion, we assume that 2πZ-period functions m0(ξ)andm0(ξ) are continuous and satisfy the following basic conditions. We willstudy such sufficient conditions m0(ξ), m0(ξ) satisfy, that φ(ξ), φ(ξ)generate a pair of biorthonomal.

Definition 3.5 Let m0(ξ), m0(ξ) be a pair of 2πZ- period measur-able functions on R. The following three conditions are called the basicconditions:

• Basic condition I: m0(ξ), m0(ξ) ∈ C(T), m0(0) = m0(0) = 1,m0(π) = m0(π) = 0.• Basic condition II:

∏∞j=1 m0(ξ/2j) and

∏∞j=1m0(ξ/2j) are point-

wise convergent to non-zero functions ˆφ and φ respectively, whichare called the corresponding limit functions. (Here ˆφ, φ denote twofunctions instead of the Fourier transforms of functions temporar-ily).• Basic condition III: m0(ξ)m0(ξ)+m0(ξ+π)m0(ξ+π) = 1, a.e. ξ ∈ R.

m0(ξ), m0(ξ) is called to be basic if it satisfies the above three conditions.

Particularly, if m0 = m0, the corresponding basic conditions are definedbelow:

Definition 3.6 Let m0(ξ) be a 2πZ-period measurable functions on R.The following three conditions are called the basic conditions:

• Basic condition I: m0(ξ) ∈ C(T) and m0(0) = 1,m0(π) = 0.• Basic condition II:

∏∞j=1m0(ξ/2j) is pointwise convergent to a non-

zero function φ, which is called the corresponding limit functions.(Here φ denotes a function instead of the Fourier transform of afunction temporarily).• Basic condition III: |m0(ξ)|2 + |m0(ξ + π)|2 = 1, a.e. ξ ∈ R.

m0(ξ) is called to be basic if it satisfies the above three conditions.

Note 1: if m0(ξ) is basic and its limit function φ ∈ L2(R) ∩ C(R), thenφ(2πα) = δ0,α (∀α ∈ Z).

Page 148: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

The Construction of MRAs 129

Note 2: Differing from the case of function pair in Definition 3.5, theconditions m0(0) = 1 and m0(π) = 0 in the basic condition I of Definition3.6 is implied in the basic conditons II and III of Definition 3.6. Furthermore,φ ∈ L2(R) can also be concluded by them. The details are included in thefollowing theorem.

Theorem 3.10 Assume that m0,m0 ⊂ C(R) satisfies the basic condi-

tion II, ˆφ, φ are the corresponding limit functions, then

(1). if there is a constant B > 0, such that operator |S|, which isdefined by (3.14), satisfies |S|n1(ξ) ≤ B (a.e. ξ ∈ T, for all n ∈ N), then,ˆφ¯φ ∈ L1(R).

(2). if m0 satisfies the basic condition III, then φ ∈ L2(R), m0(0) =1, and m0(π) = 0.

Proof. We will prove (1) first. Similar to (3.15), we denote

ˆφn(ξ) :=n∏j=1

m0(2−jξ)χ2n[−π,π](ξ), ) (3.20)

then it is easy to see that∫R

|ˆφn(x)¯φn(x)|dx =∫

R

(|S|n1)(ξ)dξ ≤ B(2π) (∀n ∈ N).

Since

ˆφn(ξ)→ ˆ

φ(ξ) φn(ξ)→ φ(ξ) a.e. ξ ∈ R.

By Fatou lemma, letting n→∞, we have∫R

|ˆφ(ξ)¯φ(ξ)|dξ ≤ B2π.

This establishes ˆφ¯φ ∈ L1(R).

To prove (2), let ˆφ = φ. It is clear that the corresponding operator |S|

satisfies |S|n1(ξ) ≡ 1 (a.e. ξ ∈ T, ∀n ∈ N), therefore, φ¯φ ∈ L1(R), or

equivalently, φ ∈ L2(R). Since

φn+1(ξ) = m0(ξ/2n+1)φn(ξ/2), (∀ξ ∈ 2n[−π, π)),

by letting n→∞, we have

φ(ξ) = m0(0)φ(ξ) a.e. ξ ∈ R.

Page 149: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

130 Multiresolution Analysis and Wavelet Bases

It can be observed easily that φ(0) = 1, therefore m0(0) = 1. Furthermore,since m0 satisfies the basic condition III, (2) is proven.

Theorem 3.11 Let φ, φ ∈ L2(R). Then,

φ, φ is biorthonormal ⇐⇒ F (ξ) = 1 a.e. ξ ∈ R

=⇒ ∃C > 0 : |F |(ξ) ≥ C a.e. ξ ∈ R

=⇒ ∃C > 0 : Φ(ξ)Φ(ξ) ≥ C a.e. ξ ∈ T,

where

F (ξ) :=∑k∈Z

ˆφ(ξ + 2kπ)¯φ(ξ + 2kπ). (3.21)

Furthermore,(1). If there are 2πZ-periodic measurable functions m0(ξ) and m0(ξ)

such that two-scale equations (3.17) and (3.18) hold, then

φ, φ is biorthonormal =⇒m0(ξ)m0(ξ) + m0(ξ + π)m0(ξ + π) = 1 a.e. ξ ∈ R.

(2). If Φ, Φ ∈ L∞(T), then

φ, φ is biorthonormal =⇒ There is a constant C > 0, such that :

C−1 ≤ Φ(ξ), Φ(ξ) ≤ C a.e. ξ ∈ T.

Proof. By ∫R

φ(x − k)φ(x)dx =(

12π

)∫R

ˆφ(ξ)¯φ(ξ)e−ikξdξ

=(

12π

)∫T

F (ξ)e−ikξdξ (∀k ∈ Z),

we have∫R

φ(x− k)φ(x)dx = δ0,k (∀k ∈ Z) ⇐⇒ F (ξ) = 1 a.e. ξ ∈ T.

(1). If there are 2πZ-periodic measurable functions m0(ξ) and m0(ξ)such that two-scale equations (3.17) and (3.18) hold, by

F (2ξ) = m0(ξ)m0(ξ)F (ξ) + m0(ξ + π)m0(ξ + π)F (ξ + π),

Page 150: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

The Construction of MRAs 131

we conclude that

F (ξ) = 1 a.e. ξ ∈ R

implies

m0(ξ)m0(ξ) + m0(ξ + π)m0(ξ + π) = 1, a.e. ξ ∈ R.

(2). If Φ, Φ ∈ L∞(T), then

φ, φ is biorthonormal

=⇒ ∃C > 0 : Φ(ξ)Φ(ξ) ≥ C a.e. ξ ∈ T

=⇒ ∃C > 0 : Φ(ξ), Φ(ξ) ≥ C a.e. ξ ∈ T

=⇒ ∃C > 0 : C−1 ≤ Φ(ξ), Φ(ξ) ≤ C a.e. ξ ∈ T.

This finishes our proof.

Note: According to the above discussion, ∀φ, φ ∈ L2(R), if φ, φis biorthonormal and Φ, Φ ∈ L∞(T), then φ(· − k)|k ∈ Z is a Rieszbasis of V0 := spanφ(· − k)|k ∈ Z and φ(· − k)|k ∈ Z is a Rieszbasis of V0 := spanφ(· − k)|k ∈ Z. Furthermore, if φ, φ ∈ L(R), thenˆφ(0) = φ(0) = 1. Consequently, biorthonormal MRA Vj, Vj can begenerated from φ, φ, here,

Vj := f(2j·)|f ∈ V0, Vj := f(2j·)|f ∈ V0 (∀j ∈ Z).

Theorem 3.12 Let m0(ξ), m0(ξ) be basic, ˆφ, φ ⊂ L2(R) ∩C(R) be

their limit functions. Suppose φn is defined by (3.15) and ˆφn is definedby (3.20). Then,

φ, φ is biorthonormal ⇐⇒ F (ξ) = 1 a.e. ξ ∈ R

⇐⇒ ∃C > 0 : |F |(ξ) ≥ C a.e. ξ ∈ R

⇐⇒ ∃C > 0 : Φ(ξ)Φ(ξ) ≥ C a.e. ξ ∈ T

⇐⇒ ‖ˆφnφn − ˆφφ‖1 → 0 (n→∞).

Furthermore, if Φ, Φ ∈ L∞(T), then

φ, φ can generate a pair of biorthonormal MRAs

⇐⇒ F (ξ) = 1 a.e. ξ ∈ R

⇐⇒ ∃C > 0 : |F |(ξ) ≥ C a.e. ξ ∈ R

Page 151: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

132 Multiresolution Analysis and Wavelet Bases

⇐⇒ ∃C > 0 : Φ(ξ)Φ(ξ) ≥ C a.e. ξ ∈ T

⇐⇒ ‖ˆφnφn − ˆφφ‖1 → 0 (n→∞).

Proof. According to Theorem 3.11, we only need to prove that

∃C > 0 : Φ(ξ)Φ(ξ) ≥ C a.e.ξ ∈ T =⇒ ‖ˆφnφn − ˆφφ‖1 → 0 (n→∞);

(3.22)

and

‖ˆφnφn − ˆφφ‖1 → 0 (n→∞) =⇒ φ, φ is biorthonormal.

(3.23)

It is known that∫R

φ(x)φ(x− k)dx = (12π

)∫

R

ˆφ(ξ)φ(ξ)eikξdξ

= limn→∞(

12π

)∫

R

ˆφn(ξ)φn(ξ)eikξdξ

= δ0,k.

Therefore, the second implication is proven. We will ignore the proof of thefirst implication for short (see [Long, 1995]).

When Φ, Φ ∈ L∞(T), the equivalent equations in the theorem can eas-ily be proved based on the note of Theorem 3.11.

A key problem of the theory of the wavelet construction is to find out thesufficient conditions for m0, m0 to ensure that φ, φ is biorthonormal.Two important results are given below.

Theorem 3.13 Let m0 satisfy the conditions in Theorem 3.8, and

|m0(ξ)|2 + |m0(ξ + π)|2 = 1, ∀ξ ∈ R.

Then,∏∞j=1m0(ξ/2j) is pointwise convergent to φ ∈ L2(R) ∩ C(R), and φ

can generate an orthonormal MRA.

Proof. By Theorems 3.8 and 3.12, it is clear that the theorem holds.

The famous Daubechies wavelet is based on this construction method.The key problem is to ensure that m0 satisfies both Theorem 3.8 and thebasic condition III. This means to construct the M0 in Theorem 3.8, and

Page 152: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

The Construction of MRAs 133

ensure that m0 satisfies the basic condition III (see Chapter 4 of this bookand [Daubechies, 1992]).

Theorem 3.14 Let m0, m0 ⊂ P+N (N = 0) be basic; ˆφ, φ be their

limit functions. Then, the following two statements are equivalent:(1). φ, φ can generate a pair of biorthonormal MRAs.(2). Each eigenvalue λ of T |PN

and T |PN, which are the restrictions of

the translation operators T and T in PN , satisfies |λ| < 1.

Corollary 3.3 Let m0, m0 ⊂ PN (N = 0) satisfy the basic condition

I; ˆφ, φ be their limit functions. Then, the following two statements areequivalent:

(1). ˆφ, φ ∈ L2(R), and φ, φ can generate a pair of biorthonormal

MRAs.(2). m0(ξ)m0(ξ) + m0(ξ + π)m0(ξ + π) = 1 a.e. ξ ∈ R, and each

eigenvalue λ of T |PNand T |PN

, which are the restrictions of the translationoperators T and T in PN , satisfies |λ| < 1.

Proof. Obviously, m0, m0 satisfies the basic condition II.“(1)⇒(2)”: By (1) in Theorem 3.11, we obtain

m0(ξ)m0(ξ) + m0(ξ + π)m0(ξ + π) = 1 a.e. ξ ∈ R,

i.e., m0,m0 satisfies the basic condition III. Thus, m0, m0 is basic. ByTheorem 3.14, (2) is proven.

“(2)⇒(1)”: Since m0, m0 is basic, according to Theorem 3.14, (1) istrue.

3.2.2 Examples of Constructing MRA

Examples of constructing MRAs based on Theorem 3.3 will be discussed inthis subsection.

First of all, the basic condition I can be equivalently illustrated bymasks. That is:

Theorem 3.15 Let m0(ξ) :=∑k∈Z

hke−ikξ, where hk ∈ l1(Z). Then

m0(0) = 1 and m0(π) = 0 ⇐⇒∑k∈Z

h2k =∑k∈Z

h2k+1 =12.

Page 153: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

134 Multiresolution Analysis and Wavelet Bases

Proof. For µ = 0 or 1, we have

m0(πµ) =∑k∈Z

hke−iπkµ

= (∑k∈Z

h2k) + (∑k∈Z

h2k+1)e−iπµ,

or, m0(0) =

∑k∈Z

h2k +∑

k∈Zh2k+1

m0(π) =∑k∈Z

h2k −∑k∈Z

h2k+1

Therefore,m0(0) = 1m0(π) = 0

⇐⇒ ∑

k∈Zh2k +

∑k∈Z

h2k+1 = 1∑k∈Z

h2k −∑

k∈Zh2k+1 = 0

⇐⇒∑k∈Z

h2k =∑k∈Z

h2k+1 =12.

This finishes our proof.For m0 ∈ P+

N (N = 0), by corollary 3.2, we see that whether φ, whichis defined by m0, can generates a MRA, depends on the properties of theeigenvalues and eigenvectors of T |PN . It is easy to see that T |PN can berepresented by a 2N + 1-order matrix. Since the eigenvalues and eigenvec-tors of a matrix can be calculated easily with a computer, the constructionof MRAs in this case is always feasible.

Let m0(ξ) =∑

k∈Zhke

−ikξ ∈ P+N (N = 0). e−ikξ|k ∈ Z ∩ [−N,N ] be

a set of basis of PN . Our first step is to get the matrix of T |PN based onthis basis. We have that

(Te−ilx)(ξ) = |m0(ξ

2)|2e−il ξ

2 + |m0(ξ

2π)|2e−il ξ

2 e−ilπ

=(|m0(

ξ

2)|2 + |m0(

ξ

2+ π)|2e−ilπ

)e−il

ξ2

=∑n∈Z

∑k∈Z

hnhke−i(n−k) ξ

2 [1 + e−i(n−k+l)π ]e−ilξ2

=∑n∈Z

∑k∈Z

hnhke−i(n−k+l) ξ

2 [1 + e−i(n−k+l)π ]

=∑n∈Z

∑k∈Z

hnhn+l−ke−ikξ2 [1+−ikπ]

Page 154: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

The Construction of MRAs 135

=∑k∈Z

(2∑n∈Z

hnhn+l−2k)e−ikξ ,

Let r1, · · · , rs (s := 2N+1) be a permutation of the set Z∩ [−N,N ], and

(Te−ir1ξ, · · · , T e−irsξ) = (e−ir1ξ, · · · , e−irsξ)A,

where A, the corresponding matrix of T |PN based on the basis e−ir1ξ, · · ·,e−irsξ, is a 2N + 1-order matrix:

A =

a1,1 a1,2 · · · a1,s

a2,1 a2,2 · · · a2,s

......

......

as,1 as,2 · · · as,s

.

The (k, l)-th element of A is:

ak,l = 2∑n∈Z

hnhn+rl−2rk(k, l = 1, · · · , s).

By corollary 3.2, we have

Theorem 3.16 Let m0(ξ) =∑k∈Z

hke−ikξ ∈ P+

N , (N = 0), r1, · · · , rsbe a permutation of −N,−N + 1, · · · , N(s := 2N + 1), and the (k, l)-thelement of A is:

ak,l = 2N∑n=0

hnhn+rl−2rk(k, l = 1, · · · , s).

Then, φ(ξ) :=∏∞j=1m0(ξ/2j) is pointwise convergent on R and φ generates

a MRA of L2(R), if and only if the following three conditions are satisfied:(1).

∑k∈Z

h2k =∑k∈Z

h2k = 12 ;

(2). 1 is the simple eigenvalue of matrix A, and each of the othereigenvalues λ satisfies |λ| < 1;

(3). The eigenpolynomial , g(ξ) :=∑s

k=1 bke−irkξ, has a positive lower-

bound, where (b1, · · · , bs)T is the eigenvector of matrix A, which correspondsto the eigenvalue 1 and satisfies

∑sk=1 bk = 1.

Proof. Due to that A is the corresponding matrix of T |PN based on thebasis e−ir1ξ, · · · , e−irsξ of PN , it is clear that (1) and (2) in the theoremare equivalent to (1) and (2) in corollary 3.2 respecteively. We concludethat g(ξ) :=

∑sk=1 bke

−irkξ is the eigenvector of T |PN corresponding tothe eigenvalue 1, and satisfies g(0) = 1, if and only if, (b1, · · · , bs)T is the

Page 155: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

136 Multiresolution Analysis and Wavelet Bases

eigenvector of A corresponding to the eigenvalue 1 and satisfies∑sk=1 bk =

1. In fact, it is easy to see that

Tg(ξ) = g(ξ)

⇐⇒ (Te−ir1ξ, · · · , T e−irsξ)

b1...bs

= (e−ir1ξ, · · · , e−irsξ)

b1...bs

⇐⇒ (e−ir1ξ, · · · , e−irsξ)A

b1...bs

= (e−ir1ξ, · · · , e−irsξ)

b1...bs

⇐⇒ A

b1...bs

=

b1...bs

.

Obviously, g(0) = 1 ⇐⇒ ∑sk=1 bk = 1. By Corollary 3.2, our proof is

complete.

For a natural permutation of Z∩[−N,N ] = −N,−N+1, · · · , N−1, N:

r1 = −N, · · · , rk = −N − 1, · · · , r2N+1 = N.

The corresponding matrix A is a 2N + 1-order matrix whose (k, l)-th ele-ments is:

ak,l = 2N∑n=0

hnhn+N+1+l−2k, (k, l = 1, · · · , 2N + 1),

where hk = 0 for k < 0 and k > N .To construct MRA, a necessary condition that h0, · · · , hN should sat-

isfy is ∑k∈Z,0≤2k≤N

h2k =∑

k∈Z,0≤2k+1≤Nh2k+1 =

12.

Now, for N = 1, 2, we discuss the conditions that h0, · · · , hN shouldsatisfy so that it can generate a MRA. We will focus on the three conditionsin Theorem 3.16.

Page 156: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

The Construction of MRAs 137

1). For N = 1, we have h0 = h1 = 12 . A is a 3-order matrix whose

elements are:

ak,l = 2(h0h2+l−2k + h1h3+l−2k) = h2+l−2k + h3+l−2k, (k, l = 1, 2, 3).

Thus, A can be represented as:

A =

12 0 012 1 1

2

0 0 12

.

The eigenvalues of A are 1, 12 . The eigenvector corresponding to 1 is

(b1, b2, b3)t = (0, 1, 0)t, and the sum of its components equals to 1. Hence,the eigenpolynomial

g(ξ) = e−ir2ξ = e−i0ξ ≡ 1

has a positive lower-bound. This tells us that there is only one MRA whenN = 1. Now, we intend to find out its corresponding scale function. By

m0(ξ) = e−i12 ξcos

ξ

2,

we have

φ(ξ) = limn→∞

n∏j=1

m0(ξ

2j)

= limn→∞

n∏j=1

(e−iξ

2j+1 cosξ

2j+1)

= e−iξ2 limn→∞

n∏j=1

cosξ

2j+1

= e−iξ2 limn→∞

sin ξ2

2n sin ξ2n+1

= e−iξ22ξ

sinξ

2

This is just the Fourier transform of the characteristic function χ[0,1](x) ofinterval [0, 1]. Therefore,

φ(x) = χ[0,1](x) :=

1 when x ∈ [0, 1]0 otherwise

Page 157: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

138 Multiresolution Analysis and Wavelet Bases

As a conclusion, for N = 1, there is only one MRA, which is generated byχ[0,1](x).

2). For N = 2, we have

h0 + h2 =12, h1 =

12.

Therefore, A is a 5-order matrix whose (k, l)-th elements is:

ak,l = 2(h0h3+l−2k +12h4+l−2k + h2h5+l−2k), (k, l = 1, · · · , 5).

Thus, a1,l = 2h0h1+l

a2,l = 2(h0hl−1 + 12 hl + h2hl+1)

a3,l = 2(h0hl−3 + 12 hl−2 + h2hl−1)

a4,l = 2(h0hl−5 + 12 hl−4 + h2hl−3)

a5,l = 2h2hl−5

Hence, matrix A can be written as:h0− 2|h0|2 0 0 0 0

1− h0− h0+ 4|h0|2 12+ h0− h0 h0− 2|h0|2 0 0

h0− 2|h0|2 12+ h0− h0 1− h0− h0+ 4|h0|2 1

2+ h0− h0 h0− 2|h0|2

0 0 h0− 2|h0|2 12+ h0− h0 1− h0− h0+ 4|h0|2

0 0 0 0 h0− 2|h0|2

.

The eigenpolynomial of A is

|λI −A| = (λ− h0 + 2|h0|2)(λ− h0 + 2|h0|2)

·∣∣∣∣∣ λ− 1

2− h0 + h0 −h0 + 2|h0|2 0

− 12− h0 + h0 λ− 1 + h0 + h0 − 4|h0|2 − 1

2− h0 + h0

0 −h0 + 2|h0|2 λ− 12− h0 + h0

∣∣∣∣∣= (λ− h0 + 2|h0|2)(λ− h0 + 2|h0|2)

·∣∣∣∣∣∣λ− 1

2 − h0 + h0 −h0 + 2|h0|2 0λ− 1 λ− 1 λ− 1

0 −h0 + 2|h0|2 λ− 12 − h0 + h0

∣∣∣∣∣∣= (λ− h0 + 2|h0|2)(λ− h0 + 2|h0|2)(λ− 1)

Page 158: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

The Construction of MRAs 139

·∣∣∣∣∣∣λ− 1

2 − h0 + h0 −h0 + 2|h0|2 01 1 10 −h0 + 2|h0|2 λ− 1

2 − h0 + h0

∣∣∣∣∣∣= (λ− h0 + 2|h0|2)(λ− h0 + 2|h0|2)(λ− 1)

·∣∣∣∣∣∣λ− 1

2 − h0 + h0 1 0−h0 + 2|h0|2 1 −h0 + 2|h0|2

0 1 λ− 12 − h0 + h0

∣∣∣∣∣∣= −(λ− h0 + 2|h0|2)(λ − h0 + 2|h0|2)(λ − 1)

·∣∣∣∣∣∣1 λ− 1

2 − h0 + h0 01 −h0 + 2|h0|2 −h0 + 2|h0|21 0 λ− 1

2 − h0 + h0

∣∣∣∣∣∣= −(λ− h0 + 2|h0|2)(λ − h0 + 2|h0|2)(λ − 1)

·∣∣∣∣∣∣1 λ− 1

2 − h0 + h0 00 −λ+ 1

2 + 2|h0|2 − h0 2|h0|2 − h0

0 h0 − 2|h0|2 λ− 12 + h0 − 2|h0|2

∣∣∣∣∣∣= −(λ− h0 + 2|h0|2)(λ − h0 + 2|h0|2)(λ − 1)

·∣∣∣∣−λ+ 1

2 + 2|h0|2 − h0 2|h0|2 − h0

h0 − 2|h0|2 λ− 12 + h0 − 2|h0|2

∣∣∣∣= −(λ− h0 + 2|h0|2)(λ − h0 + 2|h0|2)(λ − 1)

·∣∣∣∣−λ+ 1

2 2|h0|2 − h0

−λ+ 12 λ− 1

2 + h0 − 2|h0|2∣∣∣∣

= (λ− h0 + 2|h0|2)(λ− h0 + 2|h0|2)(λ− 1)(λ− 12)

·∣∣∣∣ 1 2|h0|2 − h0

1 λ− 12 + h0 − 2|h0|2

∣∣∣∣= (λ− h0 + 2|h0|2)(λ− h0 + 2|h0|2)(λ− 1)(λ− 1

2)

Page 159: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

140 Multiresolution Analysis and Wavelet Bases

·∣∣∣∣ 1 2|h0|2 − h0

0 λ− 12 + h0 + h0 − 4|h0|2

∣∣∣∣= (λ− h0 + 2|h0|2)(λ− h0 + 2|h0|2)(λ− 1)(λ− 1

2)

·(λ− 12

+ h0 + h0 − 4|h0|2).

Therefore, the eigenvalues of A are:

1,12, h0 − 2|h0|2, h0 − 2|h0|2, 1

2+ 4|h0|2 − h0 − h0.

In order to generate MRA, the moduli of the above eigenvalues, except1, must be smaller than 1, that is, |h0 − 2|h0|2| < 1

|12 + 4|h0|2 − h0 − h0| < 1.

We now simplify these conditions as follows. By

12|h0|2 − h0 − h0 =

120h0 − h0 − h0 =

14|h0 − 1

4|2 > 0.

we get

|12

+ 4|h0|2 − h0 − h0| < 1 ⇐⇒ |h0 − 14| <√

34.

For |h0 − 14 | <

√3

4 , we have:∣∣h0 − 2|h0|2∣∣ =

√|2|h0|2 −Re(h0)|2 + |Im(h0)|2

=

√|2|h0|2 − 1

2(h0 + h0)|2 + |Im(h0)|2

=

√14

∣∣4|h0|2 − h0 − h0

∣∣2 + |Im(h0)|2

=

√14

∣∣∣∣4|h0 − 14|2 − 1

4

∣∣∣∣2 + |Im(h0)|2

<

√14

(12

)2

+ |Im(h0)|2

=12

√14

+ 4|Im(h0)|2.

Page 160: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

The Construction of MRAs 141

And by

|12− h0 + h0| = |12 − 2iIm(h0)| =

√14

+ 4|Im(h0)|2,

we have ∣∣h0 − 2|h0|2∣∣ <

12

∣∣∣∣12 − h0 + h0

∣∣∣∣=

12

∣∣∣∣12 − (h0 − 14) + (h0 − 1

2)∣∣∣∣

<12

(12

+√

34

+√

34

)

=1 +√

34

< 1,

Hence |h0 − 2|h0|2| < 1|12 + 4|h0|2 − h0 − h0| < 1

⇐⇒ |h0 − 14| <√

34.

Now we suppose |h0 − 14 | <

√3

4 . To solve the eigenvector correspondingto 1, such that the sum of whose components equals to 1, we apply theelementary row transformation to matrix I −A as follows:

I − A =⇒1−h0 + 2|h0|2 0 0 0 0

h0 + h0−1−4|h0|2 12−h0 + h0 2|h0|2−h0 0 0

2|h0|2−h0 h0−h0− 12

−4|h0|2 + h0 + h0 h0−h0− 12

2|h0|2−h0

0 0 2|h0|2−h012

+ h0−h0 h0 + h0−1−4|h0|20 0 0 0 1 + 2|h0|2−h0

1−h0 + 2|h0|2 0 0 0 0

h0 + h0−1−4|h0|2 12−h0 + h0 2|h0|2−h0 0 0

0 0 0 0 0

0 0 2|h0|2−h012 0

+ h0−h0 h0 + h0−1−4|h0|20 0 0 0 1 + 2|h0|2−h0

1 0 0 0 0

0 12− h0 + h0 2|h0|2 − h0 0 0

0 0 2|h0|2 − h012

+ h0 − h0 0

0 0 0 0 10 0 0 0 0

.

Page 161: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

142 Multiresolution Analysis and Wavelet Bases

By solving the following linear system:

1 0 0 0 00 1

2 − h0 + h0 2|h0|2 − h0 0 00 0 2|h0|2 − h0

12 + h0 − h0 0

0 0 0 0 10 0 0 0 0

b1b2b3b4b5

= 0

b1 + b2 + b3 + b4 + b5 = 1

,

we obtain the eigenvector corresponding to the eigenvalue 1, so that thesum of its components equals to 1. It is

b1b2b3b4b5

=8| 12 − h0 + h0|23− 16|h0 − 1

4 |2

0

h0−2|h0|212−h0+h0

1h0−2|h0|212−h0+h0

0

Thus, the eigenpolynomial is:

g(ξ) = b1ei2ξ + b2e

iξ + b3 + b4e−iξ + b5e

−i2ξ

=8| 12 − h0 + h0|23− 16|h0 − 1

4 |2(h0 − 2|h0|2

12 − h0h0

eiξ + 1 +h0 − 2|h0|212 − h0 + h0

e−iξ)

=8|12 − h0 + h0|23− 16|h0 − 1

4 |2(

1 + 2Re(h0 − 2|h0|212 − h0 + h0

eiξ))

≥ 8|12 − h0 + h0|23− 16|h0 − 1

4 |2(

1− 2∣∣∣∣ h0 − 2|h0|2

12 − h0 + h0

∣∣∣∣)> 0,

which shows that g(ξ) has a positive lower-bound.All the discussion above shows that, for N = 2, m0(ξ) := h0 + h1e

−iξ +h2e

−i2ξ can generate a MRA based on Theorem 3.16 if and only if:h0 = 0, h0 = 12 and |h0 − 1

4 | <√

34

h1 = 12

h2 = 12 − h0

(3.24)

There are infinite bank of h0, h1, h2 which satisfy the above condi-tions. Generally speaking, it is very difficult to find the corresponding scalefunction φ. Now, we consider a particular case.

Page 162: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

The Construction of Biorthonormal Wavelet Bases 143

For h0 = 14 , we have

m0(ξ) =14

+12e−iξ +

14e−2iξ

=14(1 + e−iξ)2

=(e−iξ/2 cos(

12ξ))2

.

Obviously, it is just the square of the filter function m0 for N = 1. There-fore,

φ(ξ) =(χ[0,1)(ξ)

)2 = (χ[0,1) ∗ χ[0,1)) (ξ),

i.e.,

φ(x) = χ[0,1) ∗ χ[0,1)(x) =

x x ∈ [0, 1)2− x x ∈ [1, 2)0 otherwise

.

This is the well-known first order B-spline function.

3.3 The Construction of Biorthonormal Wavelet Bases

Multiresolution Analysis (MRA), since it was proposed by S. Mallat andY. Meyer in late 1980’s, has become the standard scheme for constructionof wavelet bases. It has shown that almost all the wavelet bases with usualproperties can be constructed from MRAs. In this section, we will studyhow to construct a general (orthonormal or not) wavelet basis ψj,k froman MRA.

Definition 3.7 φ ∈ L2(R) is said to satisfy the basic smooth conditionif there exist positive numbers δ < 2 and C such that∑

k∈Z|φ(ξ + 2πk)|2−δ ≤ C a. e. ξ ∈ T∑∞

j=0 |φ(2jξ)|δ ≤ C a. e. 1 ≤ |ξ| ≤ 2.

Note 1: The condition in the definition is called the basic smooth condi-tion since the smoothness of φ corresponds to the decreasing of its Fouriertransform.

Page 163: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

144 Multiresolution Analysis and Wavelet Bases

Note 2: It can be proved that φ defined by φ(ξ) :=∏∞j=1m0(ξ/2j)

satisfies the basic smooth condition if m0 satisfies either the following con-ditions:

(1) the conditions of Theorem 3.8;(2) m0 ∈ P+

N (N = 0),m0(0) = 1,m0(π) = 0 and any eigenvalue λof TPN

, the restriction of transition operator T on PN , satisfies|λ| < 1.

Theorem 3.17 Suppose φ, φ ∈ L2(R), generate biorthonormal MRAVj, Vj, satisfy the basic smooth condition and the corresponding filterfunction m0,m0 ∈ L∞(T) satisfy

|m0(ξ)|2 + |m0(ξ + π)|2 = 0,

and

m0(ξ)m0(ξ) + m0(ξ + π)m0(ξ + π) = 1, a.e.ξ ∈ R.

Then, for

m1(ξ) = a(2ξ) ¯m0(ξ + π)e−iξ, m1(ξ) = a−1(2ξ)m0(ξ + π)e−iξ,

where a(ξ) denotes a 2π-periodic function bounded by positive numbers fromboth the above and below, ψj,k, ψj,kj,k∈Z which is defined by

ˆψ(ξ) := m1(

ξ

2)ˆφ(

ξ

2), ψ(ξ) := m1(

ξ

2)φ(

ξ

2) (3.25)

constitutes a pair of biorthonaoral wavelet bases of L2(R), that is, bothψj,kj,k∈Z and ψj,kj,k∈Z constitute a Riesz basis of L2(R) and they arebiorthonoral each other, i.e.

〈ψj,k , ψj′,k′〉 = δj,j′δk,k′ (∀j, j′ ∈ Z, k, k′ ∈ Z).

Further, the following results hold:(1). The operators defined by

Pjf :=∑k∈Z

〈f, φj,k〉φj,k Pjf :=∑k∈Z

〈f, φj,k〉φj,k (3.26)

Qjf :=∑k∈Z

〈f, ψj,k〉ψj,k Qjf :=∑k∈Z

〈f, ψj,k〉ψj,k (3.27)

Page 164: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

The Construction of Biorthonormal Wavelet Bases 145

satisfy that, ∀j ∈ Z,Pj+1 = Pj + Qj , Pj+1 = Pj +Qj,

limj→−∞ ‖Pjf‖2 = limj→−∞ ‖Pjf‖2 = 0 ∀f ∈ L2(R),limj→+∞ ‖Pjf − f‖2 = limj→+∞ ‖Pjf − f‖2 = 0 ∀f ∈ L2(R).

(2). If we denote

Wj := spanψj,k|k ∈ Z, Wj := spanψj,k|k ∈ Z, (3.28)

then, for any j ∈ Z, operators Pj , Pj , Qj, Qj are the projectors fromL2(R) to Vj , Vj , Wj and Wj respectively satisfying:

Vj⋂V ⊥j = Vj

⋂V ⊥j = 0

Wj

⋂W⊥j = Wj

⋂W⊥j = 0

Wj = Vj+1

⋂V ⊥j

Wj = Vj+1

⋂V ⊥j

Vj+1 = Vj+Wj

Vj+1 = Vj+Wj,

where + denotes the direct sum.

We omit the proof of the theorem because it is complicated and refers tosome mathematical analysis which is not included in this book. The readercan obtain the details from [Daubechies, 1992; Long, 1995] and other relatedreferences.

Sometimes, Vj ⊥Wj is useful in practice. We will discuss this questionhere. A lemma is given first.

Lemma 3.3 Let m0 be a 2π-periodic measurable function on R satisfying|m0(ξ)|2 + |m0(ξ + π)|2 = 0 a.e. ξ ∈ R. Then, a 2π-periodic measurablefunction m1 satisfies

m0(ξ)m1(ξ) +m0(ξ + π)m1(ξ + π) = 0, a.e. ξ ∈ R,

if and only if a 2π-periodic measurable function ν exists such that

m1(ξ) = e−iξν(2ξ)m0(ξ + π), a.e. ξ ∈ R.

Proof. The part of the sufficiency holds obviously. We need to proveonly the necessity, and we assume without losing generality that, ∀ξ ∈ R,

m0(ξ) = m0(ξ + 2π), m1(ξ) = m1(ξ + 2π)|m0(ξ)|2 + |m0(ξ + π)|2 = 0m0(ξ)m1(ξ) +m0(ξ + π)m1(ξ + π) = 0

.

Page 165: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

146 Multiresolution Analysis and Wavelet Bases

It is easy to see that

λ(ξ) :=

−m1(ξ+π)

m0(ξ) for m0(ξ) = 0m1(ξ)

m0(ξ+π) for m0(ξ) = 0.

is a 2π-periodic measurable function. We claim that

λ(ξ) + λ(ξ + π) = 0, ∀ξ ∈ T.

In fact,(1). If m0(ξ) = 0, it is clear that m0(ξ + π) = 0, therefore,

λ(ξ) + λ(ξ + π) =m1(ξ)

m0(ξ + π)− m1(ξ + 2π)

m0(ξ + π)= 0;

(2). If m0(ξ + π) = 0, it is still easy to deduce that m0(ξ) = 0. By theresult of (1), we have λ(ξ + π) + λ(ξ + 2π) = 0, i.e.

λ(ξ) + λ(ξ + π) = 0;

(3). At last, if m0(ξ) = 0 and m0(ξ + π) = 0, we can obtain

λ(ξ) + λ(ξ + π) = −m1(ξ + π)m0(ξ)

− m1(ξ)m0(ξ + π)

= −m1(ξ)m0(ξ) +m1(ξ + π)m0(ξ + π)m0(ξ)m0(ξ + π)

= 0.

Our claim is proved.If m0(ξ) = 0, we have

m1(ξ) = λ(ξ)m0(ξ + π).

If m0(ξ) = 0, it is obvious that

m1(ξ + π) = −λ(ξ)m0(ξ),

which concludes that

m1(ξ)m0(ξ) = −m1(ξ + π)m0(ξ + π)

= λ(ξ)m0(ξ)m0(ξ + π).

Page 166: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

The Construction of Biorthonormal Wavelet Bases 147

Hence, we also have

m1(ξ) = λ(ξ)m0(ξ + π).

Obviously, λ(ξ) + λ(ξ + π) = 0 implies that λ(ξ)e−iξ is π-periodic. Wedenote

ν(ξ) := λ(ξ

2)e−i

12 ξ,

then ν(ξ) is a 2π-periodic measurable function and λ(ξ) = ν(2ξ)eiξ. There-fore,

m1(ξ) = eiξν(2ξ)m0(ξ + π).

This ends the proof.According to the above lemma, the conditions of Vj ⊥Wj can be char-

acterized as follows:

Theorem 3.18 Let m0 and φ be the filter function and scale function ofa MRA Vjj∈Z respectively, m1 ∈ L∞(T). We denote

ψ(ξ) := m1(ξ

2)φ(

ξ

2),

Wj := spanψ(2j · −k)|k ∈ Z, (∀j ∈ Z).

Then Vj ⊥ Wj (∀j ∈ Z) if and only if there is a 2π−periodic measurablefunction ν(ξ) such that

m1(ξ) = e−iξν(2ξ)m0(ξ + π)Φ(ξ + π),

where Φ := [φ, φ].

Proof. It is easy to see that

Vj ⊥Wj (∀j ∈ Z) ⇐⇒ V0 ⊥W0

⇐⇒ 〈ψ(· − k), φ(·)〉 = 0 (∀k ∈ Z)

⇐⇒ [ψ, φ](ξ) = 0 a.e. ξ ∈ T.

Since

[ψ, φ](ξ) =∑k∈Z

ψ(ξ + 2πk)¯φ(ξ + 2πk)

=∑k∈Z

m1(ξ

2+ πk)φ(

ξ

2+ πk)m0(

ξ

2+ πk)¯φ(

ξ

2+ πk)

Page 167: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

148 Multiresolution Analysis and Wavelet Bases

=∑k∈Z

m1(ξ

2+ πk)m0(

ξ

2+ πk)|φ(

ξ

2+ πk)|2

=∑α∈Z

[m1(

ξ

2)m0(

ξ

2))|φ(

ξ

2+ 2πα)|2

+m1(ξ

2+ π)m0(

ξ

2+ π))|φ(

ξ

2+ 2πα+ π)|2

]= m1(

ξ

2)m0(

ξ

2)Φ(

ξ

2) +m1(

ξ

2+ π)m0(

ξ

2+ π)Φ(

ξ

2+ π),

we conclude that

Vj ⊥Wj (∀j ∈ Z) ⇐⇒ m1(ξ)m0(ξ)Φ(ξ)

+m1(ξ + π)m0(ξ + π)Φ(ξ + π)

= 0 a.e. ξ ∈ T.

Set m0 in Lemma 3.3 to be m0(ξ)Φ(ξ) here and notice that φ generatesan MRA, it can be concluded easily that there exist positive numbers Aand B such that

A ≤ |m0(ξ)Φ(ξ)|2 + |m0(ξ + π)Φ(ξ + π)|2 ≤ B, a.e. ξ ∈ R.

By Lemma 3.3, our theorem is proved.

3.4 S. Mallat Algorithms

Under the conditions of Theorem 3.17, the well-known S. Mallat algorithmcan be deduced easily. This algorithm provides a recursive scheme to cal-culate the coefficients of the biorthonormal wavelet expansion of a signalfrom one layer to the next layer. It can be applied to image processing,pattern recognition and other related subjects effectively.

Theorem 3.19 Suppose the conditions of Theorem 3.17 are satisfied anddenote m0, m0, m1, m1 of Theorem 3.17 as follows:

m0(ξ) =∑k∈Z

hke−ikξ, m0(ξ) =

∑k∈Z

hke−ikξ ,

m1(ξ) =∑k∈Z

gke−ikξ, m1(ξ) =

∑k∈Z

gke−ikξ.

Page 168: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

S. Mallat Algorithms 149

Then, ∀f ∈ L2(R), the following S.Mallat decomposition algorithm holds: 〈f, φj,k〉 = √2∑

l∈Zhl〈f, φj+1,2k+l〉

〈f, ψµ,j,k〉 =√

2∑

l∈Zgl〈f, φj+1,2k+l〉 (∀j ∈ Z, k ∈ Z);

〈f, φj,k〉 = √2∑l∈Z

hl〈f, φj+1,2k+l〉〈f, ψj,k〉 =

√2∑

l∈ gl〈f, φj+1,2k+l〉 (∀j ∈ Z, k ∈ Z).

And the corresponding reconstruction algorithm holds as follows:

〈f, φj+1,k〉 =√

2∑l∈Z

¯hk−2l〈f, φj,l〉+√

2∑l∈Z

¯gk−2l〈f, ψj,l〉,

(∀j ∈ Z, k ∈ Z);

〈f, φj+1,k〉 =√

2∑l∈Z

hk−2l〈f, φj,l〉+√

2∑l∈Z

gk−2l〈f, ψj,l〉,

(∀j ∈ Z, k ∈ Z).

Proof. Using the two-scale relation and the expression of m0, we have

φ(x) = 2∑l∈Z

hlφ(2x− l),

which is equivalent to

φj,k(x) =∑l∈Z

hlφj+1,2k+l(x).

Hence

〈f, φj,k〉 =∑l∈Z

hl〈f, φj+1,2k+l〉.

The other formulae of the decomposition algorithm can be proved sim-ilarly. Now we turn to the proof of the reconstruction algorithm.

By Theorem 3.17, we deduce that, ∀j ∈ Z, l ∈ Z,

Pj+1φj+1,l = Pj φj+1,l + Qj φj+1,l,

i.e.

φj+1,l =∑k∈Z

〈φj+1,l, φj,k〉φj,k +∑k∈Z

〈φj+1,l, ψj,k〉ψj,k

Page 169: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

150 Multiresolution Analysis and Wavelet Bases

=∑k∈Z

〈φj+1,l,∑m∈Z

hmφj+1,2k+m〉φj,k

+∑k∈Z

〈φj+1,l,∑m∈Z

gµ,mφj+1,2k+m〉ψj,k

=∑k∈Z

hl−2kφj,k +∑k∈Z

gl−2kψj,k.

Therefore, we have

〈f, φj+1,l〉 =∑k∈Z

hl−2k〈f, φj,k〉+∑k∈Z

gl−2k〈f, ψj,k〉.

The another formula of the reconstruction algorithm can be shown similarly.The proof of this theorem is complete.

Note: S.Mallat decomposition algorithm and reconstruction algorithmcan be illustrated in Table 3.1.

Decompostion:· · · −→ 〈f, φj+1,k〉 −→ 〈f, φj,k〉 −→ 〈f, φj−1,k〉 −→ · · ·

〈f, ψj+1,k〉 〈f, ψj,k〉 〈f, ψj−1,k〉 · · ·

Reconstruction:· · · −→ 〈f, φj−1,k〉 −→ 〈f, φj,k〉 −→ 〈f, φj+1,k〉 −→ · · ·

· · · 〈f, ψj−1,k〉 〈f, ψj,k〉 〈f, ψj+1,k〉

Table 3.1 S. Mallat algorithm

S. Mallat algorithm can be applied effectively to image processing, pat-tern recognition, fast computation of singular integrals and some other ar-eas. It decomposes a signal from the lower frequency to the higher frequencylocally both in time and frequency domains. In practical applications, weusually need the discrete form of S. Mallat algorithm. Let

sjk := 2j/2〈f, φj,k〉sjk := 2j/2〈f, φj,k〉 ,

tjk := 2j/2〈f, ψj,k〉tjk := 2j/2〈f, ψj,k〉. (3.29)

Then, its discrete form can be written as follows: ∀j ∈ Z, k ∈ Z,

Page 170: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

S. Mallat Algorithms 151

Decomposition Algorithm:sjk =

∑l∈Z

hlsj+12k+l

tjk =∑

l∈Zgls

j+12k+l

sjk =

∑l∈Z

hlsj+12k+l

tjk =∑l∈Z

glsj+12k+l;

(3.30)

Reconstruction Algorithm:sj+1k = 2d

∑l∈Z

¯hk−2lsjl + 2d

∑l∈Z

¯gk−2ltjl

sj+1k = 2d

∑l∈Z

hk−2lsjl + 2d

∑l∈Z

gk−2lsjl .

(3.31)

The discrete S.Mallat algorithm is depicted in Table 3.2.

Decomposition:· · · −→ sj+1

k −→ sjk −→ sj−1k −→ · · ·

tj+1k tjk tj−1

k · · ·

Reconstruction:· · · −→ sj−1

k −→ sjk −→ sj+1k −→ · · ·

· · · tj−1

k tjk tj+1k

Table 3.2 Discrete form of S. Mallat algorithm

The first formula of the decomposition algorithm (3.30) can be explainedas follows: An input signal sj+1

k k∈Z is first filtered by a filter h−kk∈Z,which corresponds to a convolution in mathematics, then the output signal∑l∈Z

hlsj+1k+l is sampled alternately (that is, only the points with even

indices are kept), which is called “downsample” and denoted by “2 ↓” . Atlast, we get sjkk∈Z. The procedure is represented below:

sj+1k k∈Z −→ h−kk∈Z −→ 2 ↓ −→ sjkk∈Z.

The other formulae of (3.30) can be illustrated similarly.The implementation of the first part of the first formula of the recon-

struction algorithm (3.31), xj+1k :=

∑l∈Z

¯hk−2lsjl , is just in inverse order.

At first, the input signal is upsampled. More precisely, a zero is placed inbetween every two consecutive terms of the input sequence sjkk∈Z, whichis denoted by “2 ↑”. Then the upsampled sequence is filtered by ¯hkk∈Z

and at last the output signal xj+1k k∈Z is obtained. The following is an

illustration of the procedure.

Page 171: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

152 Multiresolution Analysis and Wavelet Bases

sjkk∈Z −→ 2 ↑ −→ ¯hkk∈Z −→ xj+1k k∈Z

The other parts of (3.31) can be explained similarly.

Page 172: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Chapter 4

Some Typical Wavelet Bases

The purpose of this chapter is to give readers more complete informationabout the wavelet bases commonly used in the areas of signal processing,image processing and pattern recognition. Some important properties ofthese wavelet bases are presented. To facilitate the understanding of theseproperties and further application of these wavelet bases for engineers andscientists, the properties are described in detail while the construction oftheir mathematical formula is avoided as much as possible. The reasonis that in pattern recognition, wavelet transform is only a tool or methodwhich is similar to the Fourier transform in signal analysis.

In practice, we usually apply real wavelet ψ(t), which is a real-valuedfunction. For such a wavelet, it is easy to show that its Fourier transformψ(ω) satisfies

ψ(−ω) = ψ(ω),

and ψ(ω) is also a real-valued function if and only if ψ(t) is an even function.In fact, for real-valued function ψ(t), there holds

ψ(−ω) =∫

R

ψ(t)eitωdt

=∫

R

ψ(t)e−itωdt

=∫

R

ψ(t)e−itωdt

= ψ(ω).

153

Page 173: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

154 Some Typical Wavelet Bases

And since

ψ(ω) =∫

R

ψ(t)e−itωdt

=∫

R

ψ(t)eitωdt

=∫

R

ψ(−t)e−itωdt

= ˆψ(−t)(ω),

ψ(ω) is real-valued function if and only if

ψ(ω) = ψ(ω),

i.e.,

(ψ(−t))(ω) = (ψ(t))(ω),

i.e.,

ψ(−t) = ψ(t),

which means ψ(t) is an even function.In general, wavelet ψ(t) is not an even function, which implies that ψ(ω)

is an imaginary function. Therefore we usually indicate the graph of |ψ(ω)|instead. Now that ψ(−ω) = ψ(ω), we have that

|ψ(−ω)| = |ψ(ω)|,that is, |ψ(ω)| is an even function. Hence we only need to indicate thegraph of |ψ(ω)| on positive semi-axis [0,∞).

Two important construction of orthonormal wavelet bases from MRAsare listed below:

• Construction of orthonormal wavelet basis from an orthonormalMRA

Theorem 4.1 Let φ be the scaling function of an orthonormal MRA withfilter function m0. Then ψ, which is defined by

ψ(ξ) := e−iξ2 m0(

ξ

2+ π)φ(

ξ

2+ π),

generates an orthonormal wavelet basis of L2(R).

Page 174: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Some Typical Wavelet Bases 155

• Construction of orthonormal wavelet basis from nonorthonor-mal MRA

Theorem 4.2 Let m0 ∈ C(T) satisfy the following conditions:(1).

∏∞j=1m0(ξ/2j) converges for almost every ξ ∈ R;

(2). Φ(ξ) ∈ C(T) and there exist positive constants A and B such thatA ≤ Φ(ξ) ≤ B (∀ξ ∈ R), where

Φ(ξ) :=∑k∈Z

|φ(ξ + 2kπ)|2

and

φ(ξ) :=∞∏j=1

m0(ξ/2j).

Then,

φ (ξ) :=φ(ξ)√Φ(ξ)

is in L2(R) and generates an orthonormal MRA of L2(R). The correspond-ing scaling function and filter function are respectively φ (ξ) and m

0(ξ)defined by

m 0(ξ) := m0(ξ)

√Φ(ξ)Φ(2ξ)

.

Proof. It is obvious that m 0 ∈ C(T) and we can prove that Φ(0) = 1 by

Condition (2). It is also easy to see that

∞∏j=1

m 0(ξ/2

j) =

√√√√ ∞∏j=1

Φ(ξ/2j)Φ(ξ/2j−1)

∞∏j=1

m0(ξ/2j) =φ(ξ)√Φ(ξ)

.

Hence φ , which is defined by

φ (ξ) :=φ(ξ)√Φ(ξ)

=∞∏j=1

m 0(ξ/2

j),

Page 175: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

156 Some Typical Wavelet Bases

-1.5

-1

-0.5

0

0.5

1

1.5

-0.2 0 0.2 0.4 0.6 0.8 1 1.20

0.10.20.30.40.50.60.70.8

0 10 20 30 40 50 60 70 80 90 100

(a) Haar wavelet in time domain (b) Frequency spectrum

Fig. 4.1 Haar wavelet and its frequency spectrum.

is refineable and the filter function is m 0. Since

∑k∈Z

|φ (ξ + 2kπ)|2 =∑

k∈Z|φ(ξ + 2kπ)|2Φ(ξ)

= 1, (∀ξ ∈ R),

φ generates an orthonormal MRA of L2(R). The corresponding scalingfunction and filter function are φ (ξ) and m

0(ξ) respectively. The proof iscomplete.

4.1 Orthonormal Wavelet Bases

4.1.1 Haar Wavelet

The simplest well-known wavelet is the Haar wavelet, which was presentedin 1910 by Haar and defined by

ψ(t) =

1 0 ≤ t < 1

2 ;−1 1

2 ≤ t < 1;0 otherwise.

Its Fourier transform is

ψ(ξ) ==14iξe−iξ/2(

4ξsin

ξ

4)2 (4.1)

The Haar wavelet has bad decay in the frequency domain, i.e., its local-ization in the frequency domain is not good. But in the time domain it iscompactly supported on [0, 1]. It is also orthonormal and anti-symmetric.Fig. 4.1 shows the Haar wavelet and and its frequency spectrum.

Page 176: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Orthonormal Wavelet Bases 157

t

φ (2t)

1

1/20

1

φ (2t-1)

0 t11/2

(a) (b)

φ

1

t0 1

( )t

10 t

-1

(t)ψ

1

21

(c) (d)

Fig. 4.2 Haar scale function and Haar wavelet: (a) φ(2t); (b) φ(2t − 1); (c) φ(t); (d)ψ(t).

The corresponding scale function of Haar wavelet is as follows:

φ(t) =

1 0 ≤ t ≤ 1,0 otherwise.

(4.2)

It is easy to see that φ(t) satisfies the following two-scale equation:

φ(t) = φ(2t) + φ(2t− 1) (4.3)

and ψ can be generated by φ according to the following equation:

ψ(t) = φ(2t)− φ(2t− 1). (4.4)

Equations (4.2)-(4.4) are graphically illustrated in Fig. 4.2.

Page 177: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

158 Some Typical Wavelet Bases

-1-0.8-0.6-0.4-0.2

00.20.40.60.8

1

-10 -8 -6 -4 -2 0 2 4 6 8 10-0.05

0

0.05

0.1

0.15

0.2

0 1 2 3 4 5 6 7

(a) LP wavelet (b) Frequency spectrum

Fig. 4.3 LP wavelet and its frequency spectrum.

4.1.2 Littlewood-Paley (LP) Wavelet

Corresponding to the Haar wavelet, an orthonormal wavelet that is com-pactly supported in the frequency domain was given by Littlewood andPaley. Its analytical expression in the frequency domain is

ψ(ξ) =

(2π)−12 π ≤| ξ |≤ 2π,

0 otherwise.(4.5)

Its inverse Fourier transform is

ψ(t) = (πt)−1(sin 2πt− sinπt) (4.6)

Fig. 4.3 shows the LP wavelet and its frequency spectrum. LP waveletψ(t) ∈ C∞ has order one vanishing moment and is not compactly sup-ported. The slow decay of ψ(t) makes it has not localization in time domain(ψ(t) ∼| x |−1 for t → ∞) but excellent localization in frequency domainsince its Fourier transform is compactly supported. Table 4.1 shows the

Time Window Freq. Window Time-freq.

Wavelet Center Radius Center Radius Area

LP 0 ∞ π2

√3 12.029 ∞

Table 4.1 The centers, radii and area of time window, frequency window and time-frequency window of the LP wavelet

centers and radii of time and frequency windows and the area of the time-frequency window of the LP wavelet.

Page 178: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Orthonormal Wavelet Bases 159

-0.4

-0.2

0

0.2

0.4

0.6

0.8

1

-10 -8 -6 -4 -2 0 2 4 6 8 10-0.4-0.2

00.20.40.60.8

11.21.4

-5 -4 -3 -2 -1 0 1 2 3 4 5

(a) Time domain (b) Frequency domain

Fig. 4.4 Shannon sampling function and its frequency spectrum.

The corresponding scale function of Littlewood-Paley wavelet is

φ(t) =sinπtπt

whose Fourier transform is as follows:

φ(ξ) =

1 −π ≤ ξ < π,

0 otherwise.

The two-scale equation φ(t) satisfies:

φ(ξ) = m0(ξ

2)φ(

ξ

2),

where m0(ξ) is a 2π-periodic function whose definition on [−π2 , 3π2 ) is as

follows:

m0(ξ) =

1 ξ ∈ [−π2 , π2 )0 ξ ∈ [π2 ,

3π2 ) .

Since

|m0(ξ)|2 + |m0(ξ + π)|2 = 1, ∀ξ ∈ T,

φ generates an orthonormal MRA, and consequently ψ, which is defined by

ψ(ξ) = e−iξ2m0(

ξ

2+ π)φ(

ξ

2),

generates an orthonoral wavelet basis.It is easy to see that φ(t) happens to be the Shannon sampling function.

Fig. 4.4 shows it and its frequency spectrum.

Page 179: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

160 Some Typical Wavelet Bases

4.1.3 Meyer Wavelet

Meyer wavelet was constructed by Y. Meyer in 1985. The fourier transformof the corresponding scale function is defined by

φ(ξ) :=

1 |ξ| ≤ 2

cos[π2 ν(32π |ξ| − 1)] 2

3π ≤ |ξ| ≤ 43π

0 otherwise,

where ν(ξ) is an arbitrary C∞ function satisfying

ν(x) =

0 x ≤ 01 x ≥ 1

and ν(x) + ν(1 − x) = 1 (∀x ∈ [0, 1]). (4.7)

φ generates an orthonormal MRA since we can deduce that

Φ(ξ) =∞∑

k=−∞|φ(ξ + 2kπ)|2 = 1, (∀ ξ ∈ T).

It can be proven that the filter function is

m0(ξ) =∞∑

k=−∞φ(2(ξ + 2πk)),

and Meyer wavelet ψ, which is an orthonormal wavelet, is then defined by

ψ(ξ) = e−iξ2 m0(

ξ

2+ π)φ(

ξ

2).

It can be shown that

ψ(ξ) =

e−iξ2 sin[π2 ν(

32π | ξ | −1)] 2π

3 ≤| ξ | 4π3

e−iξ2 cos[π2 ν(

34π | ξ | −1)] 4π

3 ≤| ξ | 8π3

0 otherwise.

(4.8)

Obviously, ψ(ξ) is compactly supported and its regularity is the same asthat of ν.

Particularly, if we take ν(t) = 0 for t ∈ (−∞, 0) ∪ (1,∞) and

ν(t) = t4(35− 84t+ 70t2 − 20t3), t ∈ [0, 1], (4.9)

it is easy to see that ν(t), which is plotted in Fig. 4.5, satisfies (4.7).The corresponding Meyer wavelet, which is the inverse Fourier transformof (4.8), and its frequency property are shown in Fig. 4.6 for ν defined by(4.9). The regularity of ψ(t) is C∞. The decay of ψ(t) is faster than any

Page 180: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Orthonormal Wavelet Bases 161

0

0.2

0.4

0.6

0.8

1

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1

Fig. 4.5 Function ν(t) as given by (4.7).

inverse polynomal, i.e., for any natural numbers N , there exists CN < ∞such that

| ψ(t) |≤ CN (1 + | t |2)−N .But it cannot decay exponentially fast as t→∞. Moreover, Meyer wavelethas linear phase since it is symmetric.

The centers, radii and area of the time-window, frequency-window andtime-frequency window of this Meyer wavelet are listed in Table 4.2. Theorder of its vanishing moment is 0.

-1

-0.5

0

0.5

1

1.5

-10 -8 -6 -4 -2 0 2 4 6 8 100

0.050.1

0.150.2

0.250.3

0.350.4

0 1 2 3 4 5 6 7 8 9 10

(a) Time domain (b) Frequency domain

Fig. 4.6 Meyer wavelet and its frequency spectrum.

Time Window Freq. Window Time-freq.

Wavelet Center Radius Center Radius Area

Meyer 0.5 0.6774 2.369 1.81349 4.9140

Table 4.2 The centers, radii and area of time window, frequency window and time-frequency window of the Meyer wavelet

Page 181: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

162 Some Typical Wavelet Bases

4.1.4 Battle-Lemare-spline Wavelet

The Battle-Lemare spline wavelet is based on central B-splines, which arepolynomial spline functions with equally distance simple knots. For m ∈ N,the scaling function φ is defined by

φ(x) :=

χ[− 1

2 ,12 ] ∗ · · · ∗ χ[− 1

2 ,12 ]︸ ︷︷ ︸

m

(x), if m is even;

χ[− 12 ,

12 ] ∗ · · · ∗ χ[− 1

2 ,12 ]︸ ︷︷ ︸

m

(x− 12 ), if m is odd, (4.10)

where χ[− 12 ,

12 ](x) is the characteristic function of [− 1

2 ,12 ] defined by

χ[− 12 ,

12 ](x) =

1 x ∈ [− 1

2 ,12 ]

0 otherwise

and ’∗’ is the convolution operation. It is easy to see that

φ(x) :=Nm(x+ 1

2m) if m is even;Nm(x+ 1

2 (m− 1)) if m is odd,

where Nm(x) is the spline function of order m defined by (2.15). Thus,φ(x) is a spline function of order m with integer knots. It is a polynomialon interval [n, n+ 1] for any n ∈ N and φ ∈ Cm−2(R). The support of φ is[−m2 , m2 ] if m is even and [−m2 + 1

2 ,m2 + 1

2 ] if m is odd. A simple calculationyields that

φ(ξ) :=

(2ξ sin ξ

2 )m if m is even;

e−iξ2 (2ξ sin ξ

2 )m if m is odd.

Hence the filter function is

m0(ξ) =

(cos ξ2 )m if m is even;e−i

ξ2 (cos ξ2 )m if m is odd.

Since (cos

ξ

2

)m=

(ei

ξ2 + e−i

ξ2

2

)m= ei

m2 ξ

(1 + e−iξ

2

)m,

Page 182: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Orthonormal Wavelet Bases 163

we get

m0(ξ) =

eim2 ξ

(1+e−iξ

2

)mif m is even;

eim−1

2 ξ(

1+e−iξ

2

)mif m is odd.

= ei[m2 ]ξ

(1 + e−iξ

2

)mwhere [m2 ] is the largest integer not larger than m

2 .It is easy to see that

|m0(ξ)|2 + |m0(ξ + π)|2 = | cosξ

2|2m + | sin ξ

2|2m.

Since

| cosξ

2|2m + | sin ξ

2|2m

= | cos ξ2 |2 + | sin ξ

2 |2 = 1 if m = 1;< | cos ξ2 |2 + | sin ξ

2 |2 = 1 if m > 1,

we have that ∀ξ ∈ [−π, π], |m0(ξ)|2 + |m0(ξ + π)|2 = 1 if m = 1;0 < |m0(ξ)|2 + |m0(ξ + π)|2 < 1 if m > 1.

Therefore, if m = 1, φ, which is defined by (4.10), i.e.,

φ(x) = χ[− 12 ,

12 ](x −

12)

=

1 x ∈ [0, 1]0 otherwise

generates an orthonormal MRA. Let

ψ(t) = φ(2t)− φ(2t− 1),

we get the well-known Haar wavelet basis ψj,k(x), which was discussedin (4.1.1).

And if m > 1, φ, which is defined by (4.10), can not generate an or-thonoraml MRA. However, ∀ξ ∈ [−π, π], it is easily to see that

Φ(ξ) :=∞∑

k=−∞|φ(ξ + 2kπ)|2

=∣∣∣∣2 sin

ξ

2

∣∣∣∣2m ∞∑k=−∞

1|ξ + 2kπ|2m

Page 183: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

164 Some Typical Wavelet Bases

=∣∣∣∣2 sin

ξ

2

∣∣∣∣2m[

1|ξ|2m +

∞∑k=1

1|ξ + 2kπ|2m +

∞∑k=1

1|ξ − 2kπ|2m

],

and ∑∞k=1

1|ξ+2kπ|2m ,

∑∞k=1

1|ξ−2kπ|2m ≤

(1π

)2m∑∞k=1

1(2k−1)2m ,(

)2m ≤ 1|ξ|2m

∣∣∣2 sin ξ2

∣∣∣2m ≤ 1,∣∣∣2 sin ξ2

∣∣∣2m ≤ 22m,

therefore, (2π

)2m

≤ Φ(ξ) ≤ 1 + 22m+1

(1π

)2m ∞∑k=1

1(2k − 1)2m

.

This inequality implies that φ(x) can generate a nonorthonormal MRA,i.e., φ(x− k)|k ∈ Z is a Riesz basis of

V0 := spanφ(x− k)|k ∈ Z,

and Vj := f(2jx)|f ∈ V0 (j ∈ Z) constitues a MRA.To construct an orthonormal MRA, let

φ (ξ) :=φ(ξ)√Φ(ξ)

and

m 0(ξ) := m0(ξ)

√Φ(ξ)Φ(2ξ)

.

Then, by Theorem 4.2, φ generates an orthonormal MRA of L2(R). Thecorresponding scaling function and filter function are φ (ξ) and m

0(ξ) re-spectively.

Let

ψ (ξ) := e−iξ2m

0(ξ

2+ π)φ (

ξ

2).

Then, by Theorem 4.1, ψ generates an orthonormal wavelet basis of L2(R),which is the well-known Battle-Lemare-spline wavelet basis or B-splinewavelet basis of order m− 1.

Page 184: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Orthonormal Wavelet Bases 165

-1

-0.5

0

0.5

1

1.5

2

-6 -4 -2 0 2 4 60

0.050.1

0.150.2

0.250.3

0.350.4

0 10 20 30 40 50 60 70 80 90 100

(a) Time domain (b) Frequency domain

Fig. 4.7 B-spline wavelet of order 1 and its frequency spectrum.

-1.5

-1

-0.5

0

0.5

1

1.5

-6 -4 -2 0 2 4 60

0.050.1

0.150.2

0.250.3

0.350.4

0 5 10 15 20 25

(a) Time domain (b) Frequency domain

Fig. 4.8 B-spline wavelet of order 2 and its frequency spectrum.

B-spline wavelet has no analytical expression. Fig. 4.7-4.10 show B-spline wavelets of orders 1 ∼ 4 and their frequency properties, respectively.

The centers, radii and areas of the time windows, frequency windowsand time-frequency windows of the B-splines wavelets of orders 1∼10 areshown in Table 4.3.

According to these figures and the table, we easily see that B-splinewavelets are symmetric, with − 1

2 as the symmetric center. We also ob-serve that the B-spline wavelet of order 2 has the smallest time-frequencylocalization property. Also, B-spline wavelets are orthonormal and decayexponentially. Table 4.3 shows the relationship between the order numberof B-spline wavelets and their time-frequency localization properties. Thetime-frequency localization property becomes bad with increasing ordernumber except the quadratic spline wavelet.

It can be proven that Battle-Lemare-spline wavelet decreases exponen-tially at infinty. Reader are refered to [Daubechies, 1992] for details.

Page 185: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

166 Some Typical Wavelet Bases

-1

-0.5

0

0.5

1

1.5

-6 -4 -2 0 2 4 60

0.050.1

0.150.2

0.250.3

0.350.4

0 5 10 15 20 25

(a) Time domain (b) Frequency domain

Fig. 4.9 B-spline wavelet of order 3 and its frequency spectrum.

-1.5

-1

-0.5

0

0.5

1

1.5

-6 -4 -2 0 2 4 60

0.050.1

0.150.2

0.250.3

0.350.4

0 5 10 15 20 25

(a) Time domain (b) Frequency domain

Fig. 4.10 B-spline wavelet of order 4 and its frequency spectrum.

4.1.5 Daubechies’ Compactly Supported Orthonormal Wavelets

In the above discussion, except Haar wavelet, all presented orthonormalwavelets, though decay exponentially fast at infinity, do not compactly sup-ported. The compactly supported orthonormal wavelets play an importantrole in wavelet decomposition of signals and data compression. In practice,the computation with compactly supported orthonormal wavelets need notto be truncated, has higher speed and precision.

Daubechies’ compactly supported orthonormal wavelets are constructedby letting the filter function as follows according to Theorem 3.8:

m0(ξ) = (1 + e−iξ

2)LM0(ξ)

To ensure the orthogonality of the wavelet basis, m0 is constructed so that

|m0(ξ)|2 + |m0(ξ + π)|2 = 1, (∀ξ ∈ [−π, π]). (4.11)

Page 186: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Orthonormal Wavelet Bases 167

Time Window Freq. Window Time-Freq.

B-spline Center Radius Center Radius Area

1 -0.5 0.3941 2.5177 2.3504 3.70514

2 -0.5 0.4818 2.4104 1.9093 3.67968

3 -0.5 0.5519 2.3857 1.8476 4.07853

4 -0.5 0.5626 2.3772 1.8252 4.10739

5 -0.5 0.6693 2.3896 1.8127 4.85290

6 -0.5 0.7151 2.3607 1.8028 5.15675

7 -0.5 0.7502 2.3524 1.9910 5.39881

8 -0.5 0.7961 2.3377 1.7980 5.72522

9 -0.5 0.8144 2.3087 1.7999 5.86324

10 -0.5 0.8234 2.3940 1.7916 5.9008

Table 4.3 The centers, radii and area of time window, frequency window and time-frequency window of B-spline wavelets of orders 1 ∼ 10

It is clear that

|m0(ξ)|2 =∣∣∣∣1 + e−iξ

2

∣∣∣∣2L |M0(ξ)|2

=∣∣∣∣cos

ξ

2

∣∣∣∣2L |M0(ξ)|2

=(

1− sin2 ξ

2

)L|M0(ξ)|2.

On the other hand, to ensure that φ and ψ are real-valued functions, welet M0(ξ) be real-valued functions on e−iξ, then

|M0(ξ)|2 = M0(ξ)M0(ξ) = M0(ξ)M0(−ξ),

which concludes that |M0(ξ)|2 is an even function on ξ, or equivalently, afunction on cos ξ and therefore on sin2 ξ

2 since

cos ξ = 1− 2 sin2 ξ

2.

Page 187: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

168 Some Typical Wavelet Bases

Let us denote

|M0(ξ)|2 = P (sin2 ξ

2) = P (y), y = y(ξ) = sin2 ξ

2.

Then

|m0(ξ)|2 =(

1− sin2 ξ

2

)LP (y) = (1 − y)LP (y).

Note that

y(ξ + π) = sin2 ξ + π

2= cos2

ξ

2= 1− sin2 ξ

2= 1− y(ξ) = 1− y,

by (4.11), P (y) should satisfy

(1− y)LP (y) + yLP (1− y) = 1. (4.12)

The general solution of Equation (4.12) is as follows (see [Daubechies, 1992,Chapter 6]):

P (y) = PL(y) + yLR(12− y),

where R(x) is an odd polynomial on x and

PL(y) :=L−1∑k=0

(L+ k − 1

k

)yk.

Particularly, letting R(x) ≡ 0 we have P (y) = PL(y), therefore

|M0(ξ)|2 = P (sin2 ξ

2) = PL(sin2 ξ

2) =

L−1∑k=0

(L+ k − 1

k

)sin2k ξ

2. (4.13)

In general, there can not be more than one real-valued polynomial M0(ξ)satisfying (4.13). Riesz lemma (see [Daubechies, 1992, Chapter 6]) ensuresthe existence of such an M0(ξ): it is a real-valued polynomial of orderL− 1 on eiξ. Since |M0(ξ)|2 = |M0(−ξ)|2, replcing ξ by −ξ we get anothersolution, which we denote by:

M0(ξ) =L−1∑n=0

bne−inξ, bn ∈ R.

Page 188: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Orthonormal Wavelet Bases 169

-1.5

-1

-0.5

0

0.5

1

1.5

2

-1 -0.5 0 0.5 1 1.5 20

0.05

0.1

0.15

0.2

0.25

0.3

0.35

0 5 10 15 20 25 30 35 40

(a) ψ(t) (b) The FT of ψ(t)

-0.4-0.2

00.20.40.60.8

11.21.4

0 0.5 1 1.5 2 2.5 30

0.050.1

0.150.2

0.250.3

0.350.4

0 5 10 15 20 25 30 35 40

(c) φ(t) (d) The FT of φ(t)

Fig. 4.11 The first type Daubechies orthonormal wavelet and its scaling function (L=2).

Therefore,

m0(ξ) =(

1 + e−iξ

2

)LM0(ξ) =

(1 + e−iξ

2

)L L−1∑n=0

bne−inξ

satisfies (4.11). It is easy to see that m0(ξ) can be rewritten as follows:

m0(ξ) =2L−1∑n=0

hne−inξ. (4.14)

A family of m0(ξ) is constructed by I. Daubechies [Daubechies, 1988] bychoosing M0(ξ) satisfying (4.13) (L ≥ 2) so that the corresponding ψ is acompactly supported wavelet with extremal phase and the highest numberof vanishing moments compatible with its support width. The corresponde-ing wavelet bases are called Daubechies’ wavelet bases. They are orthonor-mal, compactly supported and regular wavelet bases. It can be proven thatψ(t) is compactly supported on [−L + 1, L] and φ(t), ψ(t) ∈ CµN , whereµ = log 3

2 log 2 ≈ 0.2075. The filter coefficients hn of (4.14) are listed inTable 4.4 for L = 1 ∼ 10.

Page 189: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

170 Some Typical Wavelet Bases

n hn (L=1)

0 0.5000000000001 0.500000000000

n hn (L=2)

0 0.3415063509461 0.5915063509462 0.1584936490543 -0.091506350946

n hn (L=3)

0 0.2352336038921 0.5705584579162 0.3251825002633 -0.0954672077844 -0.0604161041555 0.024908749866

n hn (L=4)

0 0.1629017140261 0.5054728575462 0.4461000691233 -0.0197875131184 -0.1322535836845 0.0218081502376 0.0232518005367 -0.007493494665

n hn (L=5)

0 0.1132094912921 0.4269717713522 0.5121634721303 0.0978834806744 -0.1713283576915 -0.0228005659426 0.0548513293217 -0.0044134000548 -0.0088959350519 0.002358713969

n hn (L=6)

0 0.0788712160011 0.3497519070372 0.5311318799413 0.222915661465

4 -0.1599932994465 -0.0917590320306 0.0689440464877 0.0194616048548 -0.0223318741659 0.00039162557610 0.00337803118211 -0.000761766903

n hn (L=7)

0 0.0550497153731 0.2803956418132 0.5155742458313 0.3321862411054 -0.1017569112325 -0.1584175056406 0.0504232325057 0.0570017225808 -0.0268912262959 -0.01171997078210 0.00887489619011 0.00030375749812 -0.00127395235913 0.000250113427

n hn (L=8)

0 0.0384778110541 0.2212336235762 0.4777430752143 0.4139082662114 -0.0111928676675 -0.2008293163916 0.0003340970467 0.0910381784238 -0.0122819505239 -0.03117510332510 0.00988607964811 0.00618442241012 -0.00344385962813 -0.00027700227414 0.00047761485515 -0.000083068631

n hn (L=9)

0 0.0269251747951 0.1724171519072 0.4276745321803 0.4647728571834 0.0941847747535 -0.2073758809016 -0.0684767745127 0.1050341711398 0.0217263377309 -0.04782363206010 0.00017744640711 0.01581208292612 -0.00333981011313 -0.00302748028714 0.00130648364015 0.00016290733616 -0.00017816488017 0.000027822757

n hn (L=10)

0 0.0188585787961 0.1330610913972 0.3727875357433 0.4868140553674 0.1988188708855 -0.1766681008976 -0.1385549393607 0.0900637242678 0.0658014935519 -0.05048328559810 -0.02082962404411 0.02348490704812 0.00255021848413 -0.00758950116814 0.00098666268215 0.00140884329516 -0.00048497392017 -0.00008235450318 0.00006617718319 -0.000009379208

Table 4.4 The filter coefficients hn for compactly supported wavelet with extremalphase and the highest number of vanishing moments compatible with their supportwidth. The hn are normalized so that

∑n hn = m0(0) = 1

Page 190: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Orthonormal Wavelet Bases 171

The centers, radii and area of time window, frequency window andtime-frequency window of the first type Daubechies wavelets are listed inTable 4.5, whose compactly supported lengths are 3, 5, 7, 9, 11, 13, 15,17, 19, respectively. The centers, radii and area of time window, frequencywindow and time-frequency window of the second Daubechies wavelets areshown in Table 4.6, whose compactly supported lengths are 7, 9, 11, 13, 15,17, 19, respectively.

Time Window Freq. Window Time-Freq.

Daub. I Center Radius Center Radius Area

1 0.4353 0.3308 1.3559 3.0720 4.0650

2 0.4793 0.3486 1.3755 3.1644 4.4122

3 0.4748 0.4243 1.2911 3.5206 4.2774

4 0.4682 0.5000 1.2502 2.2042 4.4080

5 0.4597 0.5754 1.2241 2.0580 4.7368

6 0.4585 0.6511 1.2218 2.0000 5.2092

7 0.4512 0.7237 1.2121 1.9440 5.6274

8 0.4446 0.7960 1.2071 1.9330 6.1548

9 0.4378 0.8666 1.2038 1.9212 6.6542

Table 4.5 The centers, radii and area of time window, frequency window and time-frequency window of the first type Daubechies wavelets, whose compactly supportedlengths are 3, 5, 7, 9, 11, 13, 15, 17, 19, respectively

It is easy to observe that Daubechies’ wavelets ψ are asymmetric. It canbe shown that any compactly supported, orthonormal and regular waveletis always asymmetric. For “least asymmetric”, Daubechies chooses anotherfamily of M0(ξ). The corresponding wavelets are called the second typeof Daubechies orthonormal wavelets here to differ from those disscussedabove, the first type. The corresponding filter coefficients hn are listedin Table 4.7. For details, readers are refered to [Daubechies, 1992]. Figs.4.11-4.19 and 4.20-4.26 show the scaling functions and the wavelet functionsof these two types of Daubechies wavelets, as well as the Fourier spectra ofthe scaling functions and the frequency properties of the wavelet functions,respectively.

Page 191: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

172 Some Typical Wavelet Bases

-1.5

-1

-0.5

0

0.5

1

1.5

2

-2 -1.5 -1 -0.5 0 0.5 1 1.5 2 2.5 30

0.050.1

0.150.2

0.250.3

0.350.4

0 5 10 15 20 25 30 35 40

(a) ψ(t) (b) The FT of ψ(t)

-0.4-0.2

00.20.40.60.8

11.21.4

0 0.5 1 1.5 2 2.5 3 3.5 4 4.5 50

0.050.1

0.150.2

0.250.3

0.350.4

0 5 10 15 20 25 30 35 40

(c) φ(t) (d) The FT of φ(t)

Fig. 4.12 The first type Daubechies orthonormal wavelet and its scaling function (L=3).

-1

-0.5

0

0.5

1

1.5

-3 -2 -1 0 1 2 3 40

0.050.1

0.150.2

0.250.3

0.350.4

0 5 10 15 20 25 30 35 40

(a) ψ(t) (b) The FT of ψ(t)

-0.4-0.2

00.20.40.60.8

11.2

0 1 2 3 4 5 6 70

0.050.1

0.150.2

0.250.3

0.350.4

0 5 10 15 20 25 30 35 40

(c) φ(t) (d) The FT of φ(t)

Fig. 4.13 The first type Daubechies orthonormal wavelet and its scaling function (L=4).

Page 192: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Orthonormal Wavelet Bases 173

-1.5

-1

-0.5

0

0.5

1

1.5

-4 -3 -2 -1 0 1 2 3 4 50

0.050.1

0.150.2

0.250.3

0.350.4

0 5 10 15 20 25 30 35 40

(a) ψ(t) (b) The FT of ψ(t)

-0.4-0.2

00.20.40.60.8

11.2

0 1 2 3 4 5 6 7 8 90

0.050.1

0.150.2

0.250.3

0.350.4

0 5 10 15 20 25 30 35 40

(c) φ(t) (d) The FT of φ(t)

Fig. 4.14 The first type Daubechies orthonormal wavelet and its scaling function (L=5).

-1.5

-1

-0.5

0

0.5

1

1.5

-6 -4 -2 0 2 4 60

0.050.1

0.150.2

0.250.3

0.350.4

0 5 10 15 20 25 30 35 40

(a) ψ(t) (b) The FT of ψ(t)

-0.6-0.4-0.2

00.20.40.60.8

11.2

0 2 4 6 8 10 120

0.050.1

0.150.2

0.250.3

0.350.4

0 5 10 15 20 25 30 35 40

(c) φ(t) (d) The FT of φ(t)

Fig. 4.15 The first type Daubechies orthonormal wavelet and its scaling function (L=6).

Page 193: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

174 Some Typical Wavelet Bases

-1.5

-1

-0.5

0

0.5

1

1.5

-6 -4 -2 0 2 4 6 80

0.050.1

0.150.2

0.250.3

0.350.4

0 5 10 15 20 25 30 35 40

(a) ψ(t) (b) The FT of ψ(t)

-0.6-0.4-0.2

00.20.40.60.8

11.2

0 2 4 6 8 10 12 140

0.050.1

0.150.2

0.250.3

0.350.4

0 5 10 15 20 25 30 35 40

(c) φ(t) (d) The FT of φ(t)

Fig. 4.16 The first type Daubechies orthonormal wavelet and its scaling function (L=7).

-1.5

-1

-0.5

0

0.5

1

-8 -6 -4 -2 0 2 4 6 80

0.050.1

0.150.2

0.250.3

0.350.4

0 5 10 15 20 25 30 35 40

(a) ψ(t) (b) The FT of ψ(t)

-0.6-0.4-0.2

00.20.40.60.8

11.2

0 2 4 6 8 10 12 14 160

0.050.1

0.150.2

0.250.3

0.350.4

0 5 10 15 20 25 30 35 40

(c) φ(t) (d) The FT of φ(t)

Fig. 4.17 The first type Daubechies orthonormal wavelet and its scaling function (L=8).

Page 194: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Orthonormal Wavelet Bases 175

-1.2-1

-0.8-0.6-0.4-0.2

00.20.40.60.8

1

-8 -6 -4 -2 0 2 4 6 8 100

0.050.1

0.150.2

0.250.3

0.350.4

0 5 10 15 20 25 30 35 40

(a) ψ(t) (b) The FT of ψ(t)

-0.6-0.4-0.2

00.20.40.60.8

1

0 2 4 6 8 10 12 14 16 180

0.050.1

0.150.2

0.250.3

0.350.4

0 5 10 15 20 25 30 35 40

(c) φ(t) (d) The FT of φ(t)

Fig. 4.18 The first type Daubechies orthonormal wavelet and its scaling function (L=9).

-1.2-1

-0.8-0.6-0.4-0.2

00.20.40.60.8

1

-10 -8 -6 -4 -2 0 2 4 6 8 100

0.050.1

0.150.2

0.250.3

0.350.4

0 5 10 15 20 25 30 35 40

(a) ψ(t) (b) The FT of ψ(t)

-0.6-0.4-0.2

00.20.40.60.8

1

0 2 4 6 8 10 12 14 16 18 200

0.050.1

0.150.2

0.250.3

0.350.4

0.45

0 5 10 15 20 25 30 35 40

(c) φ(t) (d) The FT of φ(t)

Fig. 4.19 The first type Daubechies orthonormal wavelet and its scaling function(L=10).

Page 195: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

176 Some Typical Wavelet Bases

Time Window Freq. Window Time-Freq.

Daub.II Center Radius Center Radius Area

1 0.4077 0.3956 1.2486 2.2000 3.4813

2 0.3809 0.4519 1.1238 2.0537 3.7124

3 0.3417 0.4394 1.2202 2.0038 3.5217

4 0.2727 0.4722 1.2105 1.9462 3.6756

5 0.2542 0.4786 1.2073 1.9335 3.7022

6 0.2226 0.5189 1.2068 1.9333 4.0153

7 0.2110 0.5135 1.1941 1.8898 3.9820

Table 4.6 The centers, radii and area of time window, frequency window and time-frequency window of the second Daubechies wavelets, whose compactly supported lengthsare 7, 9, 11, 13, 15, 17, 19, respectively

-2

-1.5

-1

-0.5

0

0.5

1

1.5

-3 -2 -1 0 1 2 3 40

0.050.1

0.150.2

0.250.3

0.350.4

0 5 10 15 20 25 30 35 40

(a) ψ(t) (b) The FT of ψ(t)

-0.20

0.20.40.60.8

11.21.4

0 1 2 3 4 5 6 70

0.050.1

0.150.2

0.250.3

0.350.4

0 5 10 15 20 25 30 35 40

(c) φ(t) (d) The FT of φ(t)

Fig. 4.20 The 2nd type Daubechies orthonormal wavelet and its scaling function (L=4).

Page 196: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Orthonormal Wavelet Bases 177

n hn (L=4)

0 -0.0535744507091 -0.0209554825622 0.3518695343283 0.5683291217044 0.2106172671025 -0.0701588120906 -0.0089123507217 0.022785172948

n hn (L=5)

0 0.0193273979781 0.0208734322112 -0.0276720930583 0.1409953484274 0.5115264834475 0.4482908241906 0.0117394615687 -0.1239756813078 -0.0149212499349 0.013816076479

n hn (L=6)

0 0.0108923501641 0.0024683061862 -0.0834316077063 -0.0341615607944 0.3472289864795 0.5569463919636 0.2389521856677 -0.0513624849318 -0.0148918756509 0.03162528133010 0.00124996104711 -0.005515933754

n hn (L=7)

0 0.001896329267

1 -0.0007406129582 -0.0089352158253 0.0215777262914 0.0480073839685 -0.0350391456116 0.0123328297457 0.3790813009828 0.5428913549079 0.20409196986310 -0.09902835340311 -0.07623193594812 0.00283567134313 0.007260697381

n hn (L=8)

0 0.0013363966961 -0.0002141971502 -0.0105728432643 0.0026931943774 0.0347452329555 -0.0192467606326 -0.0367312543807 0.2576993351878 0.5495533152699 0.34037267359510 -0.04332680770311 -0.10132432764312 0.00537930587513 0.02241181152114 -0.00038334544815 -0.002391729256

n hn (L=9)

0 0.0007562436541 -0.0003345707542 -0.0072577892763 0.006264448121

4 0.0438956257775 -0.0128932229656 -0.1354468917517 0.0249414154808 0.4365242036759 0.50762989541610 0.16882946180111 -0.03858608054812 0.00041257046513 0.02137221680114 -0.00815167561315 -0.00938469841816 0.00043825127017 0.000990596868

n hn (L=10)

0 0.0005445852231 0.0000676225102 -0.0061103213153 -0.0010361819624 0.0324754622895 0.0082094347136 -0.1127794861177 -0.0501201075168 0.3335356690779 0.54412576525010 0.27140650560611 -0.02512827004612 -0.02262038610913 0.03535178377514 0.00407640840015 -0.01439311596316 -0.00056876765717 0.00324786418718 0.00004033060219 -0.000324794948

Table 4.7 The filter coefficients hn for the “least asymmetric” wavelet basis, thesecond Daubechies’ wavelet basis. The hn are normalized so that

∑n hn = m0(0) = 1

Page 197: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

178 Some Typical Wavelet Bases

-1.5

-1

-0.5

0

0.5

1

1.5

-4 -3 -2 -1 0 1 2 3 4 50

0.050.1

0.150.2

0.250.3

0.350.4

0 5 10 15 20 25 30 35 40

(a) ψ(t) (b) The FT of ψ(t)

-0.4-0.2

00.20.40.60.8

11.2

0 1 2 3 4 5 6 7 8 90

0.050.1

0.150.2

0.250.3

0.350.4

0 5 10 15 20 25 30 35 40

(c) φ(t) (d) The FT of φ(t)

Fig. 4.21 The 2nd type Daubechies orthonormal wavelet and its scaling function (L=5).

4.1.6 Coiflet

In the applications of wavelet to the fast computation of singular integrals,A high vanishing moment of the wavelet applied is very important. Toquicken the computaion, R. Coifman suggested in the spring of 1989 that itmight be worthwhile to constuct orthonormal wavelet bases with vanishingmoments not only for ψ, but also for φ. That is, we hope to find ψ and φ

such that ∫R

xlψ(x)dx = 0, (l = 0, · · · , L− 1), (4.15)

and ∫R

φ(x)dx = 0,∫

R

xlφ(x)dx = 0, (l = 1, · · · , L− 1), (4.16)

Daubechies studied the construction of such wavelets [Daubechies, 1988;Daubechies, 1992], which are called “coiflet” because they were first re-quested by Coifman and the order is then called the order of coiflet.

To construct compactly supported orthonormal wavelet bases satisfying(4.15) and (4.16), it can be proven that m0 has the form (see [Daubechies,

Page 198: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Orthonormal Wavelet Bases 179

-1

-0.5

0

0.5

1

1.5

-6 -4 -2 0 2 4 60

0.050.1

0.150.2

0.250.3

0.350.4

0 5 10 15 20 25 30 35 40

(a) ψ(t) (b) The FT of ψ(t)

-0.4-0.2

00.20.40.60.8

11.2

0 2 4 6 8 10 120

0.050.1

0.150.2

0.250.3

0.350.4

0 5 10 15 20 25 30 35 40

(c) φ(t) (d) The FT of φ(t)

Fig. 4.22 The 2nd type Daubechies orthonormal wavelet and its scaling function (L=6).

1992]:

m0(ξ) = (1 + e−iξ

2)LM0(ξ)

=∑n∈Z

hne−inξ,

where L = 2K is a positive even integer,

M0(ξ) :=K−1∑k=0

(K − 1 + k

k

)(sin2 ξ

2

)k+(

sin2 ξ

2

)Kf(ξ),

and f(ξ) :=∑2K−1

n=0 fne−inξ is a trigonometric polynomial such that

|m0(ξ)|2 + |m0(ξ + π)|2 = 1 (∀ξ ∈ R).

Coiflet of order L is a compactly supported orthonormal wavelet basiswith support width 3L − 1. It has vanishing moment of order L − 1 andthe corresponding scaling function φ satisfies (4.16). Table 4.8 shows thelocalization property of coiflets. Figs. 4.27 ∼ 4.31 show the scaling functionand its frequency property, as well as the wavelet function and its frequency

Page 199: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

180 Some Typical Wavelet Bases

-1.5

-1

-0.5

0

0.5

1

1.5

-6 -4 -2 0 2 4 6 80

0.050.1

0.150.2

0.250.3

0.350.4

0 5 10 15 20 25 30 35 40

(a) ψ(t) (b) The FT of ψ(t)

-0.4-0.2

00.20.40.60.8

11.2

0 2 4 6 8 10 12 140

0.050.1

0.150.2

0.250.3

0.350.4

0 5 10 15 20 25 30 35 40

(c) φ(t) (d) The FT of φ(t)

Fig. 4.23 The 2nd type Daubechies orthonormal wavelet and its scaling function (L=7).

property. The filter coefficients of the coiflets of orders L = 2, 4, 6, 8, 10 arelisted in Table 4.9.

Time Window Freq. Window Time-Freq.

Coifman Center Radius Center Radius Area

1 0.4050 0.3808 1.3559 3.0720 4.6972

2 0.3756 0.3981 1.2458 2.1827 3.4759

3 0.3135 0.4430 1.2155 1.9945 3.5340

4 0.3761 0.4740 1.2080 1.9682 3.7314

5 0.3767 0.5050 1.2005 1.9419 4.2020

Table 4.8 The centers, radii and area of time window, frequency window and time-frequency window of R. Coifman wavelets, whose compactly supported lengths are 5, 11,17, 23, 29, respectively

Page 200: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Nonorthonormal Wavelet Bases 181

-1

-0.5

0

0.5

1

1.5

-8 -6 -4 -2 0 2 4 6 80

0.050.1

0.150.2

0.250.3

0.350.4

0 5 10 15 20 25 30 35 40

(a) ψ(t) (b) The FT of ψ(t)

-0.4-0.2

00.20.40.60.8

11.2

0 2 4 6 8 10 12 14 160

0.050.1

0.150.2

0.250.3

0.350.4

0 5 10 15 20 25 30 35 40

(c) φ(t) (d) The FT of φ(t)

Fig. 4.24 The 2nd type Daubechies orthonormal wavelet and its scaling function (L=8).

4.2 Nonorthonormal Wavelet Bases

4.2.1 Cardinal Spline Wavelet

In this sub-section, we aim at constructing interpolatory spline waveletsbased on B-splines, that is, fundamental cardinal splines, and discussingtheir properties.

For m ≥ 1, the B-spline of order m Nm(x) is defined by

Nm(x) = N1 ∗ · · · ∗N1︸ ︷︷ ︸m

(x), (4.17)

where

N1(x) = χ[0,1)(x) =

1 x ∈ [0, 1);0 otherwise.

Then it can be deduced that that

Nm(ξ) =(

2ξe−iξ/2 sin

ξ

2

)m.

Page 201: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

182 Some Typical Wavelet Bases

-1

-0.5

0

0.5

1

1.5

-8 -6 -4 -2 0 2 4 6 8 100

0.050.1

0.150.2

0.250.3

0.350.4

0 5 10 15 20 25 30 35 40

(a) ψ(t) (b) The FT of ψ(t)

-0.4-0.2

00.20.40.60.8

11.2

0 2 4 6 8 10 12 14 16 180

0.050.1

0.150.2

0.250.3

0.350.4

0 5 10 15 20 25 30 35 40

(c) φ(t) (d) The FT of φ(t)

Fig. 4.25 The 2nd type Daubechies orthonormal wavelet and its scaling function (L=9).

Therfore, Nm(x) satisfies the following two-scale equation:

Nm(ξ) =(

1 + e−iξ/2

2

)mNm(ξ/2).

By the expression of Nm(ξ), we can conclude that

Φm(ξ) :=∑k∈Z

|Nm(ξ + 2kπ)|2

satisfies that(2π

)2m

≤ Φm(ξ) ≤ 1 + 22m+1

(2π

)2m ∞∑k=1

1(2k − 1)2m

(4.18)

for m > 1, and Φm(ξ) ≡ 1 for m = 1. Hence, Nm(x− k)|k ∈ Z is a Rieszbasis of

V m0 := spanNm(x − k)|k ∈ Z (4.19)

and

V mj := f(2jx)|f(x) ∈ V m0 , (j ∈ Z),

Page 202: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Nonorthonormal Wavelet Bases 183

-1

-0.5

0

0.5

1

1.5

-10 -8 -6 -4 -2 0 2 4 6 8 100

0.050.1

0.150.2

0.250.3

0.350.4

0 5 10 15 20 25 30 35 40

(a) ψ(t) (b) The FT of ψ(t)

-0.4-0.2

00.20.40.60.8

11.2

0 2 4 6 8 10 12 14 16 18 200

0.050.1

0.150.2

0.250.3

0.350.4

0 5 10 15 20 25 30 35 40

(c) φ(t) (d) The FT of φ(t)

Fig. 4.26 The 2nd type Daubechies orthonormal wavelet and its scaling function(L=10).

constitutes a MRA (nonorthonormal except for the case of m = 1) of L2(R).To estimate the bounds of Φm(ξ) in (4.18) more exactly, we use Pois-

sion’s summation formula to deduce that (see [Chui, 1992, p.48, p.89])

Φm(ξ) =∑k∈Z

(∫R

Nm(t+ k)Nm(t)dt)e−ikξ

=m−1∑

k=−m+1

N2m(m+ k)e−ikξ.

Note that Φm(ξ) andNm(ξ) are always nonpositive, we get the upper boundof Φm(ξ), i.e.,

Φm(ξ) ≤m−1∑

k=−m+1

N2m(m+ k) = 1.

The estimation of the lower bound of Φm(ξ) is more complicated though.

Page 203: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

184 Some Typical Wavelet Bases

n hn (L=2)

-2 -0.051429728471-1 0.2389297284710 0.6028594569421 0.2721405430582 -0.0514299728473 -0.011070271529

n hn (L=4)

-4 0.011587596739-3 -0.029320137980-2 -0.047639590310-1 0.2730210465350 0.5746823938571 0.2948671936962 -0.0540856070923 -0.0420264804614 0.0167444101635 0.0039678836136 -0.0012892033567 -0.000509505399

n hn (L=6)

-6 -0.002682418671-5 0.005503126709-4 0.016583560479-3 -0.046507764479-2 -0.043220763560-1 0.2865033352740 0.5612852568701 0.3029835717732 -0.0507701407553 -0.0581962507624 0.024434094321

5 0.0112292409626 -0.0063696010117 -0.0018204589168 0.0007902051019 0.00032966517410 -0.00005019277511 -0.000024465734

n hn (L=8)

-8 0.000630961046-7 -0.001152224852-6 -0.005194524026-5 0.011362459244-4 0.018867235378-3 -0.057464234429-2 -0.039652648517-1 0.2936673908950 0.5531264525621 0.3071573261982 -0.0471127388653 -0.0680381270514 0.0278136401535 0.0177358374386 -0.0107563185177 -0.0040010128868 0.0026526659469 0.00089559452910 -0.00041650057111 -0.00018382976912 0.00004408035413 0.00002208285714 -0.00000230494215 -0.000001262175

n hn (L=10)

-10 -0.0001499638-9 0.0002535612-8 0.0015402457-7 -0.0029411108-6 -0.0071637819-5 0.0165520664-4 0.0199178043-3 -0.0649972628-2 -0.0368000736-1 0.29809232350 0.54750542941 0.30970684902 -0.4386605083 -0.07465223894 0.02919587955 0.02311077706 -0.01397368797 -0.00648009008 0.00478300149 0.001720654710 -0.001175822211 -0.000451227012 0.000213729813 0.000099377614 -0.000029232115 -0.000015072016 0.000002640817 0.000001459318 -0.000000118419 -0.0000000673

Table 4.9 The coefficients hn for coiflets of orders L = 2, 4, 6, 8, 10. They are nor-malized so that

∑n hn = 1

Let

E2m−1(z) := (2m− 1)!zm−1m−1∑

k=−m+1

N2m(m+ k)zk (4.20)

be the Euler-Frobenius polynomials of order 2m − 1, which is in fact a

Page 204: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Nonorthonormal Wavelet Bases 185

-0.2

-0.1

0

0.1

0.2

0.3

0.4

-2 -1.5 -1 -0.5 0 0.5 1 1.5 2 2.5 30

0.05

0.1

0.15

0.2

0.25

0.3

0.35

0 5 10 15 20 25 30 35 40

(a) ψ(t) (b) The FT of ψ(t)

-0.1-0.05

00.05

0.10.15

0.20.25

0.3

-2 -1.5 -1 -0.5 0 0.5 1 1.5 2 2.5 30

0.050.1

0.150.2

0.250.3

0.350.4

0 5 10 15 20 25 30 35 40

(c) φ(t) (d) The FT of φ(t)

Fig. 4.27 Coiflet of order L = 2 and the corresponding scaling function.

polynomial on z of degree 2m− 2. It can be shown that (see [Chui, 1992,Chapter 6] for details) the 2m − 2 roots, λ1, · · · , λ2m−2, of E2m−1(z) aresimple, real and negative, and furthmore, when they are arranged in adecreasing order, say,

0 > λ1 > · > λ2m−2,

they satisfy

λ1λ2m−2 = · · · = λm−1λm = 1.

Hence we have

Φm(ξ) =m−1∑

k=−m+1

N2m(m+ k)e−ikξ

=1

(2m− 1)!ei(m−1)ξE2m−1(e−iξ).

It is easy to see that the coefficient of z2m−2 in E2m−1(z) is

(2m− 1)!N2m(2m− 1) = 1.

Page 205: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

186 Some Typical Wavelet Bases

-0.2-0.15

-0.1-0.05

00.05

0.10.15

0.20.25

0.3

-6 -4 -2 0 2 4 60

0.050.1

0.150.2

0.250.3

0.350.4

0 5 10 15 20 25 30 35 40

(a) ψ(t) (b) The FT of ψ(t)

-0.05

0

0.05

0.1

0.15

0.2

0.25

-4 -2 0 2 4 6 80

0.050.1

0.150.2

0.250.3

0.350.4

0 5 10 15 20 25 30 35 40

(c) φ(t) (d) The FT of φ(t)

Fig. 4.28 Coiflet of order L = 4 and the corresponding scaling function.

Therefore,

E2m−1(z) =2m−2∏k=1

(z − λk),

consequently,

Φm(ξ) =1

(2m− 1)!ei(m−1)ξ

2m−2∏k=1

(e−iξ − λk)

=1

(2m− 1)!

2m−2∏k=1

|e−iξ − λk|

=1

(2m− 1)!

[m−1∏k=1

|e−iξ − λk|][

2m−2∏k=m

|e−iξ − λk|]

=1

(2m− 1)!

[m−1∏k=1

|e−iξ − λk|][

m−1∏k=1

|e−iξ − λ2m−1−k|]

Page 206: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Nonorthonormal Wavelet Bases 187

-0.2-0.15

-0.1-0.05

00.05

0.10.15

0.20.25

0.3

-8 -6 -4 -2 0 2 4 6 8 100

0.050.1

0.150.2

0.250.3

0.350.4

0 5 10 15 20 25 30 35 40

(a) ψ(t) (b) The FT of ψ(t)

-0.05

0

0.05

0.1

0.15

0.2

0.25

-6 -4 -2 0 2 4 6 8 10 120

0.050.1

0.150.2

0.250.3

0.350.4

0 5 10 15 20 25 30 35 40

(c) φ(t) (d) The FT of φ(t)

Fig. 4.29 Coiflet of order L = 6 and the corresponding scaling function.

=1

(2m− 1)!

m−1∏k=1

[|e−iξ − λk||e−iξ − 1

λk|]

=1

(2m− 1)!

m−1∏k=1

|(e−iξ − λk)(λke−iξ − 1)||λk|

=1

(2m− 1)!

m−1∏k=1

1− 2λk cos ξ + λ2k

|λk|

≥ 1(2m− 1)!

m−1∏k=1

1 + 2λk + λ2k

|λk|= Φm(π).

Hence, Φm(π) and Φm(0) = 1 are the lower and upper bounds of Φm(ξ),respectively, and these bounds are the best possible obviously.

The idea behind the construction of Battle-Lemarie wavelet basis is to

Page 207: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

188 Some Typical Wavelet Bases

-0.2-0.15

-0.1-0.05

00.05

0.10.15

0.20.25

-15 -10 -5 0 5 10 150

0.050.1

0.150.2

0.250.3

0.350.4

0 5 10 15 20 25 30 35 40

(a) ψ(t) (b) The FT of ψ(t)

-0.05

0

0.05

0.1

0.15

0.2

-10 -5 0 5 10 150

0.050.1

0.150.2

0.250.3

0.350.4

0 5 10 15 20 25 30 35 40

(c) φ(t) (d) The FT of φ(t)

Fig. 4.30 Coiflet of order L = 8 and the corresponding scaling function.

orthonormalize the nonorthonormal Riesz basis by letting

φ (ξ) :=Nm(ξ)√Φm(ξ)

.

A drawback of such construction is that φ (ξ) can neither be expressed ex-plicitly nor be supported compactly as Nm(ξ). To overcome this drawback,we keep V mj as above and let Wm

j be the orthogonal complement of Vmj+1

and V mj , i.e.,

V mj+1 = V mj ⊕Wmj . (4.21)

Now our task is to construct a wavelet ψ such that

ψj,k(x) := 2j/2ψ(2jx− k), (∀j, k ∈ Z).

constitutes a Riesz basis of Wj for any j ∈ Z.Let the mth “fundamental cardinal spline function” Lm(x) be defined

Page 208: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Nonorthonormal Wavelet Bases 189

-0.05

0

0.05

0.1

0.15

0.2

-10 -5 0 5 10 15 200

0.050.1

0.150.2

0.250.3

0.350.4

0 5 10 15 20 25 30 35 40

(a) ψ(t) (b) The FT of ψ(t)

-0.2

0

0.2

0.4

0.6

0.8

1

1.2

-12-10 -8 -6 -4 -2 0 2 4 6 8 100

0.050.1

0.150.2

0.250.3

0.350.4

0 5 10 15 20 25 30 35 40

(c) φ(t) (d) The FT of φ(t)

Fig. 4.31 Coiflet of order L = 10 and the corresponding scaling function.

by

Lm(x) :=∞∑

k=−∞c(m)k Nm(x +

m

2− k), (4.22)

where, c(m)k is obtained by sovling the following bi-infinite system:

∞∑k=−∞

c(m)k Nm(j +

m

2− k) = δj,0. (4.23)

We observe that (4.23) is equivalent to the following equation:( ∞∑k=−∞

c(m)k zk

)( ∞∑k=−∞

Nm(m

2+ k)zk

)= 1. (4.24)

Since

Nm(z) :=∞∑

k=−∞Nm(

m

2+ k)zk

Page 209: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

190 Some Typical Wavelet Bases

is a Laurent polynomial, which does not vanish on the unit circle |z| = 1(see [Chui, 1992, p.111] for details), there exist r,R : r < 1 < R such that

∞∑k=−∞

c(m)k zk =

1Nm(z)

is analytic on r < |z| < R. Choose z0 : 1 < |z0| < R, then the conver-gence of

∑∞k=−∞ c

(m)k zk0 implies limk→∞ c

(m)k zk0 = 0. Therefore, |c(m)

k | =

O(|z0|−k), k → ∞, i.e., c(m)k decays to zero exponentially fast as k → ∞.

Similarly, we have that c(m)k decays to zero exponentially fast as k → −∞.

Morever, it should be pointed out that c(m)k is not finit for m ≥ 3. In

fact, it is easy to see that

Nm(z) =1

z[ m−12 ]

2[ m−12 ]∑

k=0

Nm(m

2− [

m− 12

] + k)zk,

where [x] denotes the largest integer not exceeding x. If c(m)k is finit, by

denoting

∞∑k=−∞

c(m)k zk0 =

1zp

(a0 + a1z + · · ·+ aqzq),

where a0 = 0 and p, q are negative integers and using (4.24), we have

1zp

(a0 + a1z + · · ·+ aqzq)

1

z[ m−12 ]

2[ m−12 ]∑

k=0

Nm(m

2− [

m− 12

] + k)zk = 1,

i.e.,

(a0 + a1z + · · ·+ aqzq)

2[ m−12 ]∑

k=0

Nm(m

2− [

m− 12

] + k)zk = zp+[ m−12 ]. (4.25)

On one hand, the constant item of the left side of (4.25) is a0Nm(m2 −[m−12 ]),

which does not vanish; on the other hand, the constant item of the rightside of (4.25) is obviously 0 since [m−1

2 ] ≥ 1, provided that m ≥ 3. Thecontradiction proves that c(m)

k must be infinit.It is now easy to see that Lm satisfies the following interpolation proverty:

Lm(j) = δj,0.

Page 210: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Nonorthonormal Wavelet Bases 191

Therefore, for any series f(k) with at most polynomial growth, if wedefine an interpolation spline operator as follows:

Jmf(x) :=∞∑

k=−∞f(k)Lm(x− k), (4.26)

then, the right side of (4.26) certainly converges at every x ∈ R due tothe growth limit of f(k), and Jm satisfies the following interpolationproperty:

(Jmf)(j) = f(j), (∀j ∈ Z).

It can be proven that the coefficient sequence c(m)k is not finite for each

m ≥ 3, so that the fundamental cardinal spline Lm(x) does not vanishidentically outside a compact set. even though it certainly decays to zeroexponentially fast as x→∞(see [Chui, 1992]). The following theorem givesa construction of the so-called fundamental cardinal spline wavelets.

Theorem 4.3 Let m be any positive integer, and define

ψI,m(x) := L(m)2m (2x− 1),

where L2m(x) is the (2m)th order fundamental cardinal spline. Then

ψI,m(x− k)|k ∈ Zconstitues a Riesz basis of Wm

0 . Consequently,

2j/2ψI,m(2jx− k)|j, k ∈ Zconstitues a (Riesz) wavelet basis of L2(R).

For details of the proof, readers are refered to [Chui, 1992, pp. 142–145,178–181] and are mentioned to notice that Wi ⊥Wj (∀i = j).

The wavelet ψI,m(x) constructed by Theorem 4.3 has an explicit ex-pression. It can be deduced that

ψI,m(x) =∞∑

n=−∞qnNm(2x− n), (4.27)

with

qn :=m∑l=0

(−1)l(m

l

)c(2m)m+n−1−l,

Page 211: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

192 Some Typical Wavelet Bases

which decays to zero exponentially fast as k → ±∞ as c(m)k does.

Denote

Q(z) :=∞∑

n=−∞qnz

n.

It is easy to deduce that

Q(z) = z1−m(1− z)m∞∑

n=−∞c(2m)n zn.

Therefore, to calculate qn equals to calculate c(2m)n . We introduce

Fm(z) :=m−1∑

k=−m+1

N2m(m+ k)zk =∞∑

k=−∞N2m(m+ k)zk.

Since

Fm(z)∞∑

n=−∞c(2m)n zn =

∞∑k=−∞

∞∑n=−∞

c(2m)n N2m(m+ k)zn+k

=∞∑

n=−∞

∞∑k=−∞

c(2m)n N2m(m+ k − n)zk

=∞∑

k=−∞[

∞∑n=−∞

c(2m)n N2m(m+ k − n)]zk

=∞∑

k=−∞L2m(k)zk

= 1,

we have

∞∑n=−∞

c(2m)n zn =

1Fm(z)

.

Consequently,

Q(z) = z1−m(1− z)m 1Fm(z)

= (2m− 1)!(1− z)mE2m−1(z)

,

Page 212: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Nonorthonormal Wavelet Bases 193

where

E2m−1(z) := (2m− 1)!zm−1Fm(z)

= (2m− 1)!zm−1m−1∑

k=−m+1

N2m(m+ k)zk

is the Euler-Frobenius polynomial of order 2m− 1 defind by (4.20). Gen-erally, the modified Euler-Frobenius polynomial of order n is defined by

En(z) := n!n−1∑k=0

Nn+1(k + 1)zk.

In particular, Table 4.10 lists 9 modified Euler - Frobenius polynomials.Although ψI,m(x) can be expressed analytically, it is however not sup-

n En(z)1 12 1 + z

3 1 + 4z + z2

4 1 + 11z + 11z2 + z3

5 1 + 26z + 66z2 + 26z3 + z4

6 1 + 57z + 302z2 + 302z3 + 57z4 + z5

7 1 + 120z + 1191z2 + 2416z3 + 1191z4 + 120z5 + z6

8 1 + 247z + 4293z2 + 15619z3 + 15619z4 + 4293z5 + 247z6 + z7

9 1 + 502z + 14608z2 + 88234z3 + 156190z4 + 88234z5 + 14608z6

+502z7 + z8

Table 4.10 Modified Euler-Frobenius polynomials

prorted compactly for m ≥ 2. The reason is as follows: c2mn is not finitefor m ≥ 2, therefore L2m cannot be supported compactly, finally, neither isψI,m(x) for m ≥ 2.

For m = 1, by

Q(z) =1− zE1(z)

= 1− z,

we get

ψI,1(x) = N1(2x)−N1(2x− 1),

Page 213: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

194 Some Typical Wavelet Bases

which is the well-known Haar wavelet.For m = 2, by

Q(z) = 6(1− z)2E3(z)

= 6(1− z)2

1 + 4z + z2,

and

11 + 4z + z2

= − 12√

3

(1

z + 2 +√

3− 1z + 2−√3

)=

12√

3

(1z· 11 + (2 −√3)z−1

− 12 +√

3· 11 + z(2 +

√3)−1

)=

12√

3

[1z

∞∑k=0

(√

3− 2)kz−k +∞∑k=0

(√

3 + 2)−(k+1)zk

]

=1

2√

3

[ ∞∑k=0

(√

3− 2)kz−(k+1) +∞∑k=0

(√

3− 2)k+1zk

]

=1

2√

3

∞∑k=−∞

(√

3− 2)|k+1|zk

we get

Q(z) = 6(1 − z)21

2√

3

∞∑k=−∞

(√

3 − 2)|k+1|zk

=√

3(1 − 2z + z2)

∞∑k=−∞

(√

3 − 2)|k+1|zk

=√

3

[ ∞∑k=−∞

(√

3 − 2)|k+1|zk − 2∞∑

k=−∞(√

3 − 2)|k+1|zk+1

+∞∑

k=−∞(√

3 − 2)|k+1|zk+2

]

=√

3

[ ∞∑k=−∞

(√

3 − 2)|k+1|zk

−2∞∑

k=−∞(√

3 − 2)|k|zk +∞∑

k=−∞(√

3 − 2)|k−1|zk

]

Page 214: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Nonorthonormal Wavelet Bases 195

-2

-1.5

-1

-0.5

0

0.5

1

-6 -4 -2 0 2 4 60

0.050.1

0.150.2

0.250.3

0.350.4

0.45

0 5 10 15 20 25

(a) Time domain (b) Frequency domain

Fig. 4.32 C-spline wavelet ψI,2 of order 2 and its frequency spectrum.

=√

3∞∑

k=−∞[(√

3 − 2)|k+1| − 2(√

3 − 2)|k| + (√

3 − 2)|k−1|]zk.

It can be deduced that

q0 =√

3 [(√

3− 2)− 2 + (√

3− 2)] = 6(1−√

3);

and for k = 0,

qk =√

3[(√

3− 2)|k+1| − 2(√

3− 2)|k| + (√

3− 2)|k−1|]

=√

3(√

3− 2)|k|[(√

3− 2)|k+1|−|k| − 2 + (√

3− 2)|k−1|−|k|]

=√

3(√

3− 2)|k|[(√

3− 2)− 2 + (√

3− 2)−1]

=√

3(√

3− 2)|k|[(√

3− 2)− 2− (√

3 + 2)]

=√

3(√

3− 2)|k|[(√

3− 2)− 2− (√

3 + 2)]

= −6√

3(√

3− 2)|k|.

Therefore,

ψI,2(x) = −6√

3∞∑

k=−∞(√

3− 2)|k|N2(2x− k).

C-spline wavelets ψI,2, ψI,4 of orders 2, 4 and their frequency properties,are illustrated in Figs. 4.32 and 4.33, respectively.

The centers, radii and areas of the time windows, frequency windowsand time-frequency windows of the orders 2 ∼ 10 C-splines wavelets aregiven in Table 4.11.

Page 215: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

196 Some Typical Wavelet Bases

-1

-0.5

0

0.5

1

1.5

-6 -4 -2 0 2 4 60

0.050.1

0.150.2

0.250.3

0.350.4

0.450.5

0 5 10 15 20 25

(a) Time domain (b) Frequency domain

Fig. 4.33 C-spline wavelet ψI,4 of order 4 and its frequency spectrum.

Time Window Freq. Window Time-Freq.

C-spline Center Radius Center Radius Area

2 0.5 0.4156 2.7547 2.4243 4.03025

3 0.5 0.4944 2.6757 2.0549 4.06344

4 0.5 0.5675 2.6767 2.0084 4.55896

5 0.5 0.6352 2.6854 1.9960 5.07147

6 0.5 0.6977 2.6930 1.9903 5.55437

7 0.5 0.7539 2.6969 1.9858 5.98852

8 0.5 0.8048 2.6979 1.9814 6.37891

9 0.5 0.8483 2.6946 1.9757 6.70379

10 0.5 0.8892 2.6885 1.9691 7.00385

Table 4.11 The centers, radii and area of time window, frequency window and time-frequency window of C-spline wavelets of orders 2 ∼ 10

4.2.2 Compactly Supported Spline Wavelet

As discussed in the above subsection, ψI,m is not supported compactly. Toimprove this property, another kind of spline wavelet, which is supportedcompactly, will be introducd in this sub-section.

Let

ψm(x) := 2∞∑

n=−∞qnNm(2x− n), (4.28)

Page 216: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Nonorthonormal Wavelet Bases 197

with

qn :=(−1)n

2m

m∑l=0

(m

l

)N2m(n+ 1− l)

=

(−1)n

2m

∑ml=0

(m

l

)N2m(n+ 1− l), n = 0, 1, · · · , 3m− 2,

0, otherwise.

Our main result in this sub-section is as follows:

Theorem 4.4 Let m be a positive integer and Nm(x) the mth order car-dinal B-spline defined by (4.17). Then ψm(x), which is defined by (4.28),is a Riesz basis of Wm

0 defined by (4.21) and

suppψm = [0, 2m− 1].

Consequently,

2j/2ψm(2jx− k)|j, k ∈ Zconstitues a (Riesz) wavelet basis of L2(R).

Furthermore, the dual wavelet ψm of ψm can be expressed as follows:

ψm(x) =(−1)m+1

2m−1

∞∑k=−∞

c(2m)k ψI,m(x+m+ 1− k),

where ψI,m is the wavelet deined by (4.27) and c(2m)k is determinded by

bi-infinite-system (4.23). On the symmetricity of the wavelets, we can provethe following theorem.

Theorem 4.5 Wavelets ψm, ψm and ψI,m are all symmetric for evenm and antisymmetric for odd m. Consequently, they all have generalizedlinear phases.

The details of the proof for the theorems are omitted here, readers arerefered to [Chui, 1992, pp.183–184].

Figs. 4.34, 4.35 and 4.36 show the compactly supported spline waveletsψm of orders 2, 4, 5 and their frequency properties, respectively. Thecenters, radii and areas of the time windows, frequency windows and time-frequency windows of ψm, the compactly surpported splines wavelets oforders 2 ∼ 10, are given in Table 4.12.

Page 217: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

198 Some Typical Wavelet Bases

-1

-0.5

0

0.5

1

1.5

2

0 0.5 1 1.5 2 2.5 30

0.020.040.060.08

0.10.120.140.160.18

0.2

0 5 10 15 20 25

(a) Time domain (b) Frequency domain

Fig. 4.34 Compactly supported spline wavelet ψ2 of order 2 and its frequency spectrum.

-1.5

-1

-0.5

0

0.5

1

0 1 2 3 4 5 6 70

0.010.020.030.040.050.060.070.080.09

0.1

0 5 10 15 20 25

(a) Time domain (b) Frequency domain

Fig. 4.35 Compactly supported spline wavelet ψ4 of order 4 and its frequency spectrum.

Figs. 4.37, 4.38 and 4.39 show the dual wavelets ψm of ψm (m = 2, 4, 5)and their frequency property, respectively. The centers, radii and areas ofthe time windows, frequency windows and time-frequency windows of thedual wavelet ψm of orders 2 ∼ 10 are tabulated in Table 4.13.

Page 218: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Nonorthonormal Wavelet Bases 199

-1.5

-1

-0.5

0

0.5

1

1.5

0 1 2 3 4 5 6 7 8 90

0.01

0.02

0.03

0.04

0.05

0.06

0.07

0 5 10 15 20 25

(a) Time domain (b) Frequency domain

Fig. 4.36 Compactly supported spline wavelet ψ5 of order 5 and its frequency spectrum.

Time Window Freq. Window Time-Freq.

CS-spline Center Radius Center Radius Area

2 1.5 0.3897 2.6788 2.3717 3.6968

3 2.5 0.4728 2.5907 2.0004 3.7835

4 3.5 0.5419 2.5821 1.9410 4.2075

5 4.5 0.6030 2.5975 1.9162 4.6221

6 5.5 0.6585 2.5780 1.9004 5.0059

7 6.5 0.7097 2.5769 1.8891 5.3628

8 7.5 0.7575 2.5762 1.8805 5.6977

9 8.5 0.8024 2.5756 1.8738 6.0141

10 9.5 0.8449 2.5751 1.8684 6.3146

Table 4.12 The centers, radii and area of time window, frequency window and time-frequency window of CS-spline wavelets of orders 2 to 10

-1

-0.5

0

0.5

1

1.5

2

-6 -5 -4 -3 -2 -1 0 10

0.050.1

0.150.2

0.250.3

0.350.4

0.45

0 5 10 15 20 25 30 35 40 45 50

(a) Time domain (b) Frequency domain

Fig. 4.37 The dual spline wavelet ψ2 of Order 2 and its frequency spectrum.

Page 219: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

200 Some Typical Wavelet Bases

-1.5

-1

-0.5

0

0.5

1

-12 -10 -8 -6 -4 -2 0 2 40

0.050.1

0.150.2

0.250.3

0.350.4

0.45

0 5 10 15 20 25

(a) Time domain (b) Frequency domain

Fig. 4.38 The dual spline wavelet ψ4 of order 4 and its frequency spectrum.

-1.5

-1

-0.5

0

0.5

1

1.5

-12 -10 -8 -6 -4 -2 0 2 40

0.050.1

0.150.2

0.250.3

0.350.4

0.45

0 5 10 15 20 25

(a) Time domain (b) Frequency domain

Fig. 4.39 The dual spline wavelet ψ5 of order 5 and its frequency spectrum.

Time Window Freq. Window Time-Freq.

D-spline Center Radius Center Radius Area

2 -2.5 0.4554 2.3528 2.1734 3.9590

3 -3.5 0.5258 2.3073 2.1734 3.9202

4 -4.5 0.6164 2.3138 1.8301 4.5124

5 -5.5 0.7088 2.3235 1.8239 5.1709

6 -6.5 0.7981 2.3326 1.8829 6.0112

7 -7.5 0.8816 2.3409 1.8230 6.4281

8 -8.5 0.9583 2.3487 1.8233 6.9890

9 -9.5 1.0220 2.3553 1.8224 7.4498

10 -10.5 1.0900 2.3609 1.8207 7.9382

Table 4.13 The centers, radii and area of time window, frequency window and time-frequency window of D-spline wavelets of orders 2 ∼ 10

Page 220: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Chapter 5

Step-Edge Detection by WaveletTransform

As mentioned in the previous chapters, in pattern recognition, an entiretask can be divided into four phases, namely, data acquisition, data pre-processing, feature extraction and classification. In the first phase, thedata acquisition, analog data from the physical world are acquired througha transducer, and further digitized to discrete format suitable for computerprocessing. The physical variables, in the data acquisition phase, are con-verted into a set of measured data, which are then as the input to thenext phase, i.e. the data preprocessing phase. A major function of thedata preprocessing phase is to modify the measured data obtained fromthe data acquisition phase so that those data are more suitable for the fur-ther processing in the third phase (feature extraction). Many modificationsare made in the data preprocessing phase, For example, some of them arelisted below:

• Gray-level histogram modification;• Smoothing and noise elimination;• Edge sharpening;• Boundary detection and contour tracing;• Thinning;• Segmentation;• Morphological processing;• Texture and object extraction from textural background;• Approximation of curves and surfaces.

In the above modifications, many items, such as noise, edges, boundaries,surfaces, textures, curves, etc., are of singularities in different patterns.

201

Page 221: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

202 Step-Edge Detection by Wavelet Transform

Wavelet theory will play an important role to analyze and process suchsingularities. This chapter will give an example to show how the wavelettheory can be used to treat some singularities. Specially, we will study theapplications of wavelet transform to edge detection.

5.1 Edge Detection with Local Maximal Modulus of WaveletTransform

What is the edge of a signal? Intuitively, it is the transient component ofthe signal. In an one-dimensional signal, for example, the speech signal, theedge corresponds to the abrupt change of the tune which creates a harshnessnoise to the ears of human. In a two-dimensional signal, for example, animage, the edge refers to the sharp variation in color or gray. Actually,a signal is equivalent to a function, thus, the edge of the signal can beviewed as such a component, whose value varies suddenly. In mathematics,it can be represented by a larger derivative on that point. Consequently,the extraction of the edge eventuates in finding the pixels with the largederivative.

In numerical application, for instance, in pattern recognition, becausethe signal is in discrete form, the derivative can not be calculated accurately.As an alternation, thus, the difference quotient can be used to approximateit. In this way, many effective and classical edge detection operators wereestablished based on the difference quotient, for example, Robert operator,Sobel operator, Laplace operator and so on. Unfortunately, all of thesemethods have a poor capability to reduce the noise due to the property ofthe noise itself, namely, it also is a catastrophe point and has a large valueof amplitude in the signals.

As we have known, the noise always distributes randomly. From thepoint of view of the statistics, the average value of noise is nearly a constantin a certain area. In general, we can suppose the value of this constant iszero, and, take a weighted mean to the signal in this area, This action canbe regarded as a low-pass filtering. In this way, the noise will be eliminatedconsiderably. In mathematics, this method corresponds to the smoothing ofa function. The scheme of the edge detection is a combination of the filteringand the derivation, in which the signal performs the filtering followed bythe derivation. This idea was developed in 70s and 80s. Thereafter, Marrpointed out that the best smoothing operator is the convolution of the

Page 222: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Edge Detection with Local Maximal Modulus of Wavelet Transform 203

original signal with Gaussian function. Essentially, the edge detection basedon the wavelets developed in 1990s is a extension of this method.

If we focus the detection on the location of the edge but the width, thenonly the local maximal point needs to be found out, without counting otherlarge derivative points in this area. It corresponds to the skeleton of theedge and is effective to the isolated points (in two-dimensional one, theyare isolated in one direction). This is the basic idea of the edge detectionwith local maximal modulus of wavelet transform.

One-dimensional signalLet f(x) be an original signal, and θ(x) be a smoothing operator. Denote

θs(x) :=1sθ(x

s),

where s > 0 indicates the smoothing scale. To smooth f(x), we take theconvolution for f(x):

f ∗ θs(x) =∫

R

f(x− t)θs(t)dt

The purpose of smoothing f(x) is to reduce the noise, but the edge.For this reason, θ(x) should be localized, such that f ∗ θs(x) ∼ f(x) whens is small enough. This implicates that the smoothed signal, which wasprocessed by a little scale, is almost the same as the original one. Thisconclusion can be easily proved mathematically, when θ(x) is localized and∫

Rθ(x)dx = 1 (assume that the original signal is continues).In fact, the edge detection always conflicts with the noise reduction.

The more the edge information is extracted, the more the noise will bebrought out, and vice versa. In other words, the smoothing should notbe too strong, although it is necessary to smooth the original signal. Anexample of such smoothing function is shown in Fig. 5.1, which meets theabove requirement.

Suppose f(x) is smoothed with θ(x) at first. Its derivative is now com-puted as follows:

d

dx(f ∗ θs)(x) =

∫R

f(x− t)(θs)′(t)dt =∫

R

f(x− t)(θs)′(t)dt, (5.1)

The edge pixel can be obtained by detecting the point, which possessesthe local maximum of the absolute derivative.

Page 223: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

204 Step-Edge Detection by Wavelet Transform

−5 −4 −3 −2 −1 0 1 2 3 4 5−0.5

0

0.5

1

1.5

Fig. 5.1 A example of the smoothing function: Gaussian function.

Since ∫R

θ′(x)dx = θ(+∞)− θ(−∞) = 0,

Thus, θ′(x) is a wavelet function, and the right hand side of Eq. (5.1) is 1s

times of its corresponding wavelet transform.Let ψ(x) = θ′(x), we have

Wψs f(x) =

∫R

f(x− t)ψs(t)dt = sd

dx(f ∗ θs)(x).

This method is referred to as edge detection with local maximal modulusof wavelet transform.

It is known that the senses of audition and vision of human are limited.Hence, it is not necessary to extract all edge pixels, because some are tooweak, so that they can not reach the senses of human beings. In practice,a threshold T > 0 is used to decide which point will be extract as an edgepixel, that must fulfill the following two conditions:

(1) Wψs f(x0) ≥ T ;

Page 224: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Edge Detection with Local Maximal Modulus of Wavelet Transform 205

(2) |Wψs f(x)| take the local maximum at x0.

To extract the edges of a signal f(x), it is required to compute its wavelettransform Wψ

s f(x). A discrete input signal f(0), f(1), · · ·, f(n) canbe viewed as the result of the A/D transformation from an analog signal.When applying wavelet transform to a digital signal, the discrete signalshould be changed to a continues analog signal by a suitable interpolation.Thereafter, its wavelet transform can be calculated by the following formula

Wψs f(x) =

∫R

f(x− t)ψs(t)dt.

After sampling the transform result, we can obtain the discrete data

Wψs f(0),Wψ

s f(1), · · · ,Wψs f(n).

Generally, different results will be achieved by different fitting methods.It should be mentioned that the well-known zero-crossing technique for

edge detection is almost the same as that with local maximal modulus ofwavelet transform in principle. The former refers to the calculation of thezero-points of the 2-order derivative of the smoothing function f ∗ θs(x),whereas, the later focus on the computation of the points, which possesslocal maxima of 1-order derivative of f ∗ θs(x). In mathematics, a pointwith local maximum of 1-order derivative must be the zero-point of 2-orderderivative. For this reason, these two methods are the same in most ofcases. We should note that a zero-point of 2-order derivative might not bethe local maximal point of 1-order derivative, and it maybe refers to theminimal point of 1-order derivative of f ∗ θs(x) in some cases. It impliesthat the pixels extracted by the zero-crossing method are probably of thefalse-edge. From this point, the edge detection method with local maximalmodulus of wavelet transform is better than that of the zero-crossing one.In addition, the 1-order derivative of the smoothing function f ∗ θs(x) canalso be obtained by the method with local maximal modulus of wavelettransform. It has been discussed in details by Canny [Canny, 1986].

As the discrete value of wavelet transform, Wψs f(0), Wψ

s f(1), · · ·,Wψs f(n), has been achieved, the next step is to compute the local maximal

modulus of the wavelet transform. In practice, x = m is a point with localmaximal modulus, if it meets the following two conditions:

(1) |Wψs f(m)| ≥ |Wψ

s f(m− 1)|, |Wψs f(m)| ≥ |Wψ

s f(m+ 1)|;(2) |Wψ

s f(m)| > |Wψs f(m− 1)| or |Wψ

s f(m)| > |Wψs f(m+ 1)|.

Page 225: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

206 Step-Edge Detection by Wavelet Transform

The algorithm of finding the local maximal modulus of the wavelettransform involves the following steps:

Algorithm 5.1 Given an input discrete signal f(0), f(1), · · · , f(n),

Step 1 To compute its wavelet transform Wψs f(0),Wψ

s f(1), · · ·,Wψs f(n);

Step 2 To take a threshold T > 0, for m = 0, 1, · · · , n, if the followingconditions safisfy

(1) |Wψs f(m)| ≥ T ,

(2) |Wψs f(m)| ≥ |Wψ

s f(m− 1)|, |Wψs f(m)| ≥ |Wψ

s f(m+ 1)|,(3) |Wψ

s f(m)| > |Wψs f(m− 1)| |Wψ

s f(m)| > |Wψs f(m+ 1)|,

then, x = m is an edge pixel.

An example of the edge detection with the local maximal modulus ofwavelet transform is graphically illustrated in Fig. 5.2.

Fig. 5.2 Upper part: the original image; Lower part: the result of wavelet transform.

Two-Dimensional signalWe continue our discussion and extend our effort to 2-D signals. For a

2-D signal, for example, an image, its analysis by the wavelet theory and

Page 226: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Edge Detection with Local Maximal Modulus of Wavelet Transform 207

the algorithm can be established in a similar way to that of 1-D one. In 2-Dsignal, the input image f(x, y) and smoothing function θ(x, y) are 2-variablefunctions. Meanwhile, θ(x, y) should has good locality and satisfies∫

R

∫R

θ(x, y)dxdy = 1.

Now, function f(x, y) can be smoothed, and we shall describe this bywriting (f ∗ θs)(x, y):

(f ∗ θs)(x, y) :=∫

R

∫R

f(x− u, y − v)θs(u, v)dudv,

where, θx(u, v) := 1s2 θ(

us ,

vs ), and s > 0 stands for a smoothing scale.

When we calculate the derivative of a 2-D function, its orientation hasto be considered. At each edge pixel, it reaches local maximum along thegradient direction, and can be represented by

grad(f ∗ θs)(x, y) = i∂

∂x(f ∗ θs)(x, y) + j

∂y(f ∗ θs)(x, y),

where i and j correspond to x−axis and y−axis respectively.Now, we concentrate our discussion on the basic steps, in which, the

edge detection with local maximal modulus of wavelet transform can beobtained, namely: first of all, the pixels will be extracted, such that thefollowing modulus will reach its local maximum along the gradient direction

|grad(f ∗ θs)(x, y)| =√∣∣∣∣ ∂∂x (f ∗ θs)(x, y)

∣∣∣∣2 +∣∣∣∣ ∂∂y (f ∗ θs)(x, y)

∣∣∣∣2,and these pixels will become the components of the edge.

We can write

ψ1(x, y) :=∂θ

∂x(x, y), ψ2(x, y) :=

∂θ

∂y(x, y).

When θ(x, y) has good locality, i.e. it necessarily satisfy the conditions∫R

∫R

ψ1(x, y)dxdy =∫

R

[θ(+∞, y)− θ(−∞, y)]dy = 0,∫R

∫R

ψ2(x, y)dxdy =∫

R

[θ(x,+∞)− θ(x,−∞)]dx = 0,

then, ψ1(x, y) and ψ2(x, y) become 2-D wavelets.

Page 227: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

208 Step-Edge Detection by Wavelet Transform

It is easy to know that

|grad(f ∗ θs)(x, y)| =1s

√|f ∗ ψ1

s)(x, y)|2 + |f ∗ ψ2s)(x, y)|2

=1s

√|Wψ1

s f(x, y)|2 + |Wψ2

s f(x, y)|2,

where

Wψi

s f(x, y) := (f ∗ψi)(x, y) =∫

R

∫R

f(x−u, y−v)ψis(u, v)dudv (i = 1, 2).

stand for the corresponding wavelet transforms of ψ1, and ψ2 respectively.The modulus of wavelet transform of f(x, y) can be defined by

Msf(x, y) :=√|Wψ1

s f(x, y)|2 + |Wψ2

s f(x, y)|2.It is clear that

|grad(f ∗ θs)(x, y)| = 1sMsf(x, y).

Consequently, the calculation of the local maximal modulus of the deriva-tive of a smoothing function along the gradient direction is equivalent tothe computation of the local maximal modulus of wavelet transform.

Similar to the case of 1-D, many methods can be used to compute thewavelet transform of a 2-D discrete signal. The next task is to determinethe gradient direction of a digital signal as well as its local maximum alongthis direction.

The gradient direction of a function can be accurately counted in math-ematics. However, by contrast, it is difficult to express exactly if it is indiscrete form. Fortunately, for the data obtained by equi-spaced sampling,only eight adjacent pixels are around a point. Hence, only the nearest eightpoints will be taken into account. It is said that the discrete image has eightgradient directions. Therefore, a plane can be divided into eight sectors. Agradient direction is defined by

αs := arctan(∂(f ∗ θs)(x, y)

∂y

/∂(f ∗ θs)(x, y)

∂x

), s = 1, 2, ..., 8,

When α falls into a sector, it will be quantified to a certain vector,which is represented by a center line of that sector. This can be found inFig. 5.3, where, the arrow shows a vector, which indicates a direction of thegradient.

Page 228: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Edge Detection with Local Maximal Modulus of Wavelet Transform 209

o

o

o

o

oo

o

o

22.5

67.5112.5

157.5

-157.5

-112.5 -67.5

-22.5

Fig. 5.3 The eight gradient directions (arrows), and the sectors divided by dashed lines.

Along this direction, a local maximal modulus can achieve. The effectof any opposite gradient directions is the same. Thus, only 4 codes areneeded to represent the gradient directions. For example, numbers 0, 1,2, 3 can be used to code these 4 different directions. The tangent of eachdirection, tanαs, falls i nto one of the following intervals:

[−1−√

2, 1−√

2), [1−√

2,√

2− 1),

[√

2− 1,√

2 + 1), [√

2 + 1,+∞) ∪ (−∞,−1−√

2).

We shall describe it by writing

Asf(x, y) := tanαs =∂(f ∗ θs)(x, y)

∂y

/∂(f ∗ θs)(x, y)

∂x.

When Asf(x, y) falls into the above intervals, it will be coded by 0, 1, 2,3 respectively, They can be viewed as the functions of values 0, 1, 2, 3, andsymbolized by CodeAsf(x, y). Similar to the 1-D signals, the algorithm ofthe edge detection with local maximal modulus of wavelet transform is nowestablished below:

Algorithm 5.2 Given an input digital signal f(k, l)|k = 0, 1, · · · ,K; l =0, 1, · · · , L,

Page 229: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

210 Step-Edge Detection by Wavelet Transform

Step 1 To calculate the modulo of its wavelet transform

Msf(k, l)|k = 0, 1, · · · ,K; l = 0, 1, · · · , L

as well as the codes

CodeAsf(k, l)|k = 0, 1, · · · ,K; l = 0, 1, · · · , L

along the gradient directions;Step 2 To take a threshold T > 0, for k = 0, 1, · · · ,K; l = 0, 1, · · · , L, if

(1) |Msf(k, l)| ≥ T ;(2) |Msf(k, l)| reaches its local maximum along the gradient di-

rection represented by CodeAsf(k, l),

then, (k, l) is an edge pixel.

An example is given in Fig. 5.4, where a spline function is utilized as thesmoothing function:

θ(x, y) :=

8(x2 + y2)(

√x2 + y2 − 1) + 4

3 0 ≤ x2 + y2 ≤ 14

− 83 (√x2 + y2 − 1)3 1

4 < x2 + y2 ≤ 10 x2 + y2 > 1,

The graphical illustration of this smoothing function θ(x, y) is shown inFig. 5.5.

Fig. 5.4 Left: The original image, medial: the edge extracted in s = 2, right: the edge

extracted in s = 4.

Page 230: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Calculation of Wsf(x) and Wsf(x, y) 211

−1.5−1

−0.50

0.51

1.5

−1.5

−1

−0.5

0

0.5

1

1.50

0.5

1

1.5

2

Fig. 5.5 The graphical description of smoothing function θ(x, y).

5.2 Calculation of Wsf(x) and Wsf(x, y)

Calculation of the wavelet transform is a key process in applications. Thefast algorithm of computing Wsf(x) for detecting edges and reconstruct-ing the signal can be found in [Mallat and Hwang, 1992] when ψ(x) is adyadic wavelet defined in that article. However, for some applicatios suchas edge detection, the reconstruction of signals is not required. Therefore,the choice of the wavelet function will not be restricted in the conditionswhich were presented in [Mallat and Hwang, 1992]. Many wavelets otherthan dyadic ones can be utilized. In fact, almost all the general integralwavelets satisfy this particular application. It makes much freedom to se-lect the best wavelet ψ for our task. In practice, we should digitize thewavelet transform again by the equi-spaced sampling, and represented byWψ

s f(0),Wψs f(1), · · · ,Wψ

s f(n). In general, different results are producedfrom the different fitting models. The simplest models are step-function fit-ting and line-function fitting. They are graphically displayed in Figs. 5.6,5.7 and 5.8. In the following sub-sections, the wavelet transform will becomputed using the step-function fitting.

Of course, the different fitting models and basic wavelets can producemany total different representations of a wavelet transform. The detailswill be omitted in this book.

Instead of the algorithm stated in [Mallat and Hwang, 1992], we cal-

Page 231: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

212 Step-Edge Detection by Wavelet Transform

0 10 20 30 40 50 60−2

−1.5

−1

−0.5

0

0.5

1

Fig. 5.6 Discrete signal.

0 1000 2000 3000 4000 5000 6000−2

−1.5

−1

−0.5

0

0.5

1

Fig. 5.7 The result fitted by step-function.

culate the corresponding wavelet transforms by the well-known trapezoidalformula of numerical integrals.

Page 232: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Calculation of Wsf(x) and Wsf(x, y) 213

0 1000 2000 3000 4000 5000 6000−2

−1.5

−1

−0.5

0

0.5

1

Fig. 5.8 The result from line-function fitting.

5.2.1 Calculation of Wsf(x)

The wavelet transform of a one-dimensional signal f(t) can be calculatedbelow:

Wsf(k) =∫ ∞

−∞f(t)ψs(k − t)dt

=∑l∈Z

∫ l

l−1

f(l)ψs(k − t)dt

=∑l∈Z

f(l)

[∫ l

−∞ψs(k − t)dt−

∫ l−1

−∞ψs(k − t)dt

]

=∑l∈Z

f(l)

[∫ ∞

(k−l)s−1ψ(t)dt−

∫ ∞

(k−l+1)s−1ψ(t)dt

]

=∑l∈Z

f(l)∫ ∞

(k−l)s−1ψ(t)dt−

∑l∈Z

f(l + 1)∫ ∞

(k−l)s−1ψ(t)dt

=∑l∈Z

[f(l)− f(l + 1)]ψsk−l, (5.2)

where

ψsk :=∫ ∞

k/s

ψ(t)dt.

Page 233: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

214 Step-Edge Detection by Wavelet Transform

As an example, let ψ(x) be the quadric spline wavelet which is an oddfunction. For x ≥ 0, it can be defined by

ψ(x) =

8(3x2 − 2x) x ∈ [0, 1/2]−8(x− 1)2 x ∈ [1/2, 1]0 x ≥ 1

Since ψ(x) is an odd function, we have

ψs−k =∫ k/s

−k/sψ(t)dt +

∫ ∞

k/s

ψ(t)dt = ψsk.

Hence, it is enough to calculate ψsk for all non-negative integer k.(1) If k ≥ s, it is obvious that ψsk = 0.(2) If s

2 ≤ k < s, ψsk becomes

ψsk =∫ 1

k/s

ψ(t)dt

= −8∫ 1

k/s

(t− 1)2dt

=83

(k

s− 1

)3

.

(3) If 0 ≤ k < s2 , the following holds

ψsk =∫ 1

k/s

ψ(t)dt

= 8∫ 1/2

k/s

(3x2 − 2x)dx− 8∫ 1

1/2

(x− 1)2dx

= 8(k

s

)2 (1− k

s

)− 1− 8

3

(12− 1

)3

=13

+ 8(k

s

)2 (1− k

s

).

The conclusions can be obtained in accordance with the above discus-sion, namely

Page 234: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Calculation of Wsf(x) and Wsf(x, y) 215

ψsk =

83 (ks − 1)3 s

2 ≤ k < s

13 + 8(ks )

2(1 − ks ) 0 ≤ k < s

2

0 otherwise

The filtering coefficients ψsk in Eq. 5.2 can be calculated when ψ isgiven. If ψ is compactly supported, only finite nonzero items ψsk will beobtained. Hence, the complexity of this algorithm to compute Wsf(k)Nk=0

is O(N).In the practical application, it is enough to take s = 2j , j = 1, 2, 3. The

algorithm presented in this chapter is L∞-stable, since

‖Wsf‖L∞(R) ≤ ‖f‖L∞(R)‖ψ‖L1(R),

where

• L1(R) denotes the space of all the Lebesgue integrable functions onR and

‖ψ‖L1(R) :=∫ ∞

−∞|ψ(x)|dx

• L∞ indicates the space of all the essential bounded functions on R

and (see [Rudin, 1973])

‖f‖L∞(R) := inf|E|=0

supx∈R\E

|f(x)|

The corresponding filtering coefficients ψsk in Eq. 5.2 for j = 1, 2, 3are shown in Table 5.1.

5.2.2 Calculation of Wsf(x, y)

In two-dimensional signals, the calculation of W i2jf(x, y) is more compli-

cated than that of one-dimensional ones. In similar way, we have

W 1s f(n,m) =

∫ ∞

−∞

∫ ∞

−∞f(u, v)ψ1

s(n− u,m− v)dudv

=∑k,l

f(k, l)∫ ∫

[k,k+1]×[l,l+1]

ψ1s(n− u,m− v)dudv

Page 235: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

216 Step-Edge Detection by Wavelet Transform

k j=1 j=2 j=30 -1.3333333731 -1.3333333731 -1.33333337311 -0.3333333433 -0.9583333135 -1.22395837312 -0.3333333433 -0.95833331353 -0.0416666679 -0.63020831354 -0.33333334335 -0.14062500006 -0.04166666797 -0.0052083335

Table 5.1 Filtering coefficients ψ2j

k and ψ2j ,1k,l if ψ is a quadic spline wavelet

=∑k,l

f(k, l)∫ ∫

[n−k−1,n−k]×[m−l−1,m−l]ψ1s(u, v)dudv

=∑k,l

f(n− 1− k,m− 1− l)ψs,1k,l , (5.3)

where

ψs,1k,l =∫ ∫

[k,k+1]×[l,l+1]

ψ1s(u, v)dv

=∫ (k+1)

s

ks

du

∫ (l+1)s

ls

ψ1(u, v)dv.

The problem is, now, to lead to calculation of ψs,1k,l in Eq. 5.3. Notethat ψ1(u, v) is odd on u and even on v, we have

ψs,1−k,l =∫ ∫

[−k,−k+1]×[l,l+1]

ψ1s(u, v)dudv

=∫ k

k−1

du

∫ l+1

l

ψ1s(u, v)dudv

= −ψs,1k−1,l.

Similarly, we can deduce that

ψs,1k,−l = ψs,1k,l−1, ψs,1−k,−l = −ψs,1k−1,l−1.

Therefore, we need to calculate ψs,1k,l only for all k, l ≥ 0.

Page 236: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Calculation of Wsf(x) and Wsf(x, y) 217

Let ψ(r) be a odd function, and

ψ1(u, v) = ψ(r) cos θ,

where

r =√u2 + v2, θ = arctg vu .

Let φ(x) be

φ(x) =∫ x

−∞ψ(r)dr.

Then φ(x) is an even function, since ψ(x) is an odd function. It is easy tofind that

∂uφ(√u2 + v2) = φ′(r)

u

r= ψ1(u, v),

∂vφ(√u2 + v2) = φ′(r)

v

r= ψ2(u, v).

Hence

ψs,1k,l =∫ (k+1)

s

ks

du

∫ (l+1)s

ls

∂uφ(√

u2 + v2)dv

=∫ (l+1)

s

ls

φ√

v2 +(k + 1s

)2− φ

√v2 +

(k

s

)2 dv

= φsl,k+1 − φsl+1,k+1 − φsl,k + φsl+1,k,

where

φsl,k =∫ ∞

ls

φ

√v2 +

(k

s

)2 dv.

As for the calculation of W 2s f(n,m), similarly, we have

W 2s f(n,m) =

∑k,l

f(n− 1− k,m− 1− l)ψs,2k,l ,

where

ψs,2k,l =∫ (k+1)

s

ks

du

∫ (l+1)s

ls

ψ2(u, v)dv

Page 237: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

218 Step-Edge Detection by Wavelet Transform

=∫ (k+1)

s

ks

φ√(

l + 1s

)2

+ u2

− φ√(

l

s

)2

+ u2

du= φsk,l+1 − φsk+1,l+1 − φsk,l + φsk+1,l

= ψs,1l,k .

Based on the above discussion, we can calculate the filtering coefficientsφsk,l only for all k, l ≥ 0.

In this chapter, the quadratic spline function will be served as ψ, then

φ(x) =

8(x3 − x2) + 4

3 0 ≤ x ≤ 1/2;− 8

3 (x − 1)3 1/2 < x ≤ 1;0 x > 1.

(1) If k2 + l2 ≥ s2, we have φsk,l = 0.

(2) If s2 ≥ k2 + l2 ≥ (s2

)2, we have

φsk,l = −83

∫ √1−( l

s )2

ks

√u2 +(l

s

)2

− 1

3

du.

(3) If k2 + l2 ≤ (s2

)2, then

φsk,l =∫ √ 1

4−( ls )2

ks

8

(u2 +(l

s

)2) 3

2

−(u2 +

(l

s

)2)+

43

du

−83

√1−( l

s )2∫√

14−( l

s)2

√u2 +

(l

s

)2

− 1

3

du. (5.4)

In order to simplify the calculation, the following replacements will be done:

k

s=⇒ a,√

14− (

l

s)2 =⇒ b,√

14−(l

s

)2

=⇒ c,

Page 238: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Calculation of Wsf(x) and Wsf(x, y) 219

√1−

(l

s

)2

=⇒ d,

l

s=⇒ t.

Thus, Eq. 5.4 becomes

φsk,l =∫ b

a

[8(u2 + t2)(√u2 + t2 − 1) +

43]du − 8

3

∫ d

c

(√u2 + t2 − 1)3du.

We denote

I(t, a, b) =∫ b

a

[8(u2 + t2)(

√u2 + t2 − 1) +

43

]du,

J(t, c, d) = −83

∫ d

c

(√u2 + t2 − 1)3du. (5.5)

To avoid the complicated calculation, a software called Mathematca is uti-lized to solve Eq. 5.5, and the following results can be achieved:

I(t, a, b) =83(a3 − b3)− 4

3(a− b) [1− 6t2

]−√a2 + t2

[2a3 + 5at2

]+√b2 + t2(2b3 + 5bt2)

−3t4 loga+√a2 + t2

b +√b2 + t2

,

J(t, c, d) = −83(c− d)(c2 + d2 + cd+ 3t2 + 1)

+13

[c(2c2 + 5t2 + 12)

√c2 + t2 − d(2d2 + 5t2 + 12)

√d2 + t2

]+t2(4 + t2) log

c+√c2 + t2

d+√d2 + t2

.

Hence, for ∀k, l ≥ 0, we have

φsk,l =

0 if k2 + l2 ≥ s2;J

(ls ,

ks ,

√1− (

ls

)2)if s2 ≥ k2 + l2 ≥ 1

4s2;

I

(ls ,

ks ,

√14 −

(ls

)2)+J

(ls ,

√14 −

(ls

)2,

√1− (

ls

)2)if k2 + l2 ≤ 1

4s2.

(5.6)

Page 239: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

220 Step-Edge Detection by Wavelet Transform

For s = 2j, j = 1, 2, 3, the corresponding filtering coefficients ψs,1k,l inEq. 5.3 are shown in Tables 5.2-5.4. For the given scale s, the complexityof computing W i

sf(n,m)Nn,m=0 is O(N2).

l\k k=0 k=1l=0 -0.3485791385 -0.0351441652l=1 -0.1097541898 -0.0085225009

Table 5.2 Filtering coefficients ψ2j ,1k,l , (j = 1) if ψ(r) is a quadic spline wavelet

l\k k=0 k=1l=0 -0.0838140026 -0.0472041145l=1 -0.1416904181 -0.0958706033l=2 -0.0651057437 -0.0327749476l=3 -0.0088690016 -0.0030044997l\k k=2 k=3l=0 -0.0129809398 -0.0012592132l=1 -0.0196341425 -0.0012698699l=2 -0.0063385521 -0.0000750836l=3 -0.0001088651

Table 5.3 Filtering coefficients ψ2j ,1k,l , (j = 2) if ψ(r) is a quadic spline wavelet

5.3 Wavelet Transform for Contour Extraction and Back-ground Removal

In this section, the singularities will be studied by Lipschitz exponent. Ac-cording to the mathematical analysis of the different geometric structuresof the singularities using Lipschitz exponent. The singularities can be cate-gorized into three basic geometric structures, namely, step-structure, roof-structure, and Dirac-structure. The characterization of these structureswith wavelet transform is also studied in this section. A significant prop-erty will be derived, i.e. the wavelet transform of the step-structure ofsingularity is a non-zero constant which is independent on both the gradi-ent direction and the scale of the wavelet transform. This property leads

Page 240: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Wavelet Transform for Contour Extraction and Background Removal 221

l\k k=0 k=1l=0 -0.0130508747 -0.0107604843l=1 -0.0322880745 -0.0277145673l=2 -0.0400620662 -0.0347912423l=3 -0.0361453630 -0.0306917503l=4 -0.0233931188 -0.0196621399l=5 -0.0120095834 -0.0100409016l=6 -0.0043909089 -0.0034857604l=7 -0.0006066251 -0.0003857070l\k k=2 k=3l=0 -0.0080117621 -0.0051634177l=1 -0.0208740719 -0.0181548643l=2 -0.0258209687 -0.0154902851l=3 -0.0216873437 -0.0128720086l=4 -0.0139309634 -0.0082158195l=5 -0.0069123111 -0.0037158530l=6 -0.0020833646 -0.0007867273l=7 -0.0001258312 -0.0000085766

l\k k=4 k=5l=0 -0.0025986142 -0.0010915556l=1 -0.0065528429 -0.0027379275l=2 -0.0097385549 -0.0031414898l=3 -0.0063897478 -0.0023643500l=4 -0.0037783380 -0.0010769776l=5 -0.0013164375 -0.0001667994l=6 -0.0001085378 -0.0000003273l=7l\k k=4 k=7l=0 -0.0003376677 -0.0000403965l=1 -0.0008041780 -0.0000769711l=2 -0.0008010443 -0.0000415404l=3 -0.0004234327 -0.0000038524l=4 -0.0000748098l=5 -0.0000002738l=6l=7

Table 5.4 Filtering coefficients ψ2j ,1k,l , (j = 3) if ψ(r) is a quadic spline wavelet

Page 241: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

222 Step-Edge Detection by Wavelet Transform

to provide a simple and direct strategy for detecting this specific struc-ture of singularities, including contours of the patterns. Thereafter, a novelalgorithm which is referred to as scale-independent algorithm will be devel-oped, and the modular-angle-separated (MAS) wavelet transform will beapplied. As the applications of this new method, many examples will bepresented, which deal with the data preprocessing in the recognition of thetwo-dimensional object and document processing.

Edges are typical singularities in images, meanwhile, contour is a spe-cific edge, which belongs to the step-structure. Extraction of singularities,specifically, extraction of contours, plays an important role in the datapreprocessing phase of pattern recognition including document processing.Research on extracting the contours is one of the most significant topics inthis discipline. Many methods have been developed to analyze the proper-ties of contours and detect them from various images. For example, someworks can be found in [Chen and Yang, 1995; Deng and Lyengar, 1996;Law et al., 1996; Matalas et al., 1997; Tang et al., 1997a; Tang et al., 1997c;Thune et al., 1997].

The subjects of Lipschitz exponents and wavelet transform are remark-able mathematical tools to analyze the singularities including the edges, andfurther, to detect them effectively. A significant study related to these re-search topics has been done by Mallat, Hwang and Zhong, and published inIEEE Trans. on Information Theory [Mallat and Hwang, 1992], and IEEETrans. on Pattern Analysis and Machine Intelligence [Mallat and Zhong,1992]. Many important contributions have been made in these papers. Ithas be shown that the local maxima of the wavelet transform modulus canprovide enough information for analyzing the singularities, and can detectall singularities. However, it may not identify different structures of sin-gularities. This chapter will present a new method which can handle thisproblem. Now, we look at an example. We consider an image which isshown in Fig. 5.9(a). Two classes of singularities are embedded in thisimage: (i) a contour of the aircraft which belongs to the step-structure sin-gularities, and (ii) some lines and texts which belong to the Dirac-structuresingularities. Such an image is referred to as multi-structure-singularitiesimage. A particular task is that we are required to extract the contour ofthe aircraft, and to remove all lines and texts. What result will arrive whenthe local maxima of the wavelet transform modulus is applied?

Look at the following experiments: Fig. 5.9(b) displays the modulusimage, where the black pixels indicate zero values and the write ones cor-

Page 242: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Wavelet Transform for Contour Extraction and Background Removal 223

(a) (b)

(c) (d)

Fig. 5.9 Result of edge detection using the wavelet transform modulus maxima in datapreprocessing phase of pattern recognition.

respond to the highest values. Fig. 5.9(c) gives the angle image, in whichthe angle values range from 0 (black) to 2π (white). Fig. 5.9(d) shows themodulus maxima. It is clear, from this result, that the method of the modu-lus maxima has detected all singularities without recognizing two differentstructures of singularities. Thus, the resulting image contains lines andtexts which are required to be deleted from the image. Another examplecan be found in Figs. 5.10 and 5.11. A mailing address which was writtenon a paper with guide lines is shown in Fig. 5.10(a). In order to automat-ically process it by computers, a preprocessing is to remove the guide lines

Page 243: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

224 Step-Edge Detection by Wavelet Transform

(d)

(b)

(a)

(e)

(c)

Fig. 5.10 Wavelet transform of a page of document with different scales (s = 2, 4).

and extract the contours of the handwriting English letters. Figs. 5.10(b)and (c) display the modulus images with scales of s = 2, 4 of the wavelettransform respectively. Figs. 5.10(d) and (e) state the angle images withtransform scales of s = 2, 4 respectively. Obviously, it is still the sameproblem when different scales of the wavelet transforms are used, and theresults are given in Figs. 5.11(a) and (b).

In order to improve the method proposed in [Mallat and Hwang, 1992;Mallat and Zhong, 1992], so that it can be used to detect the contour ofan object which is a typical step-structure singularity and eliminate others,this section will carefully study the wavelet transform with respect to threebasic geometric structures of singularities. A very important property willbe proven that the wavelet transform of a step singularity is a non-zeroconstant which is independent on the scale of the wavelet transform. Based

Page 244: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Wavelet Transform for Contour Extraction and Background Removal 225

(a) (b)

Fig. 5.11 Result of edge detection using the wavelet transform modulus maxima indocument processing, (a) s = 2, (b) s = 4.

on this result, a scale-independent wavelet algorithm will be developed.This novel method can detect step-structure singularities from the multi-structure-singularity images.

This section is organized into the following sub-sections:

(1) Basic Edge Structures(2) Analysis of the Basic Edge Structures with Wavelet Transform(3) Scale-Independent Algorithm(4) Experiments

5.3.1 Basic Edge Structures

The edge is one class of singularities in the one- and two-dimensional sig-nals. Lipschitz exponent is a remarkable mathematical tool to analyze thesingularities including the edges. According to the analysis with Lipschitzexponents, the edges can be categorized into three basic geometric struc-tures [Tang et al., 1998e].

Let 0 ≤ α ≤ 1, function f(x) is called uniformly Lipschitz α over (a, b)if there exists a constant K such that ∀x1, x2 ∈ (a, b), we have

|f(x1)− f(x2)| ≤ K|x1 − x2|α, |x1 − x2| → 0. (5.7)

where, α denotes the regularity exponent. The value of α plays a key role inanalyzing the singularity or regularity of a signal. We are interested in thecase of 0 ≤ α ≤ 1, which corresponds to the different geometric structures ofedges. The geometric structures of the edges can be analyzed by the valueof α. The smaller the α is, the weaker is the regularity (i.e., smoothness),or the smaller the α, the stronger the singularity. Lipschitz exponent αcan be extended to the range of −1 ≤ α < 0. f(x) is called uniformly

Page 245: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

226 Step-Edge Detection by Wavelet Transform

Lipschitz α if its primitive function is uniformly Lipschitz α+ 1(−1 ≤ α <0). This extension permits f(x) to be a distribution (i.e., a generalizedfunction). For instance, when α = −1, the well-known Dirac function δ(x)is a uniformly Lipschitz −1 in any interval containing 0. The theory ofdistribution can be referred to [Rudin, 1973]. In summary, three specialvalues of α will be considered in the concrete applications, namely,

(1) α = 0: This corresponds to the edges with step-structure;(2) α = 1: It corresponds to the edges with roof-structure.(3) α = −1: It corresponds to the edges with Dirac-structure.

Any of the three structures of edges can be regarded as a superpositionof an ideal edge e(x), and a additional signal f0(x):

f(x) = e(x) + f0(x).

It will be proved in the next subsection that the later is not importantin this study. We, thus, will pay the attention to the former, ideal versions,which can be formulated below:

(1). Ideal step edge

e(x) =

1 x ≥ x0;0 x < x0.

(2). Ideal roof edge

e(x) =

m(x− x0) + c0 x0 − h1 < x ≤ x0;n(x− x0) + c0 x0 < x < x0 + h2.

(3). Ideal Dirac edge

e(x) = ∞ x = x0;

0 x = x0.

Similarly, the Lipschitz exponent of regularity for the two-dimensionalimages can be defined below:

Definition 5.1 Let 0 ≤ α ≤ 1, function f(u, v) is called uniformly Lip-schitz α on the interval of (a, b)× (c, d), if there exists a constant K, suchthat, ∀(u1, v1) ∈ (a, b)× (c, d), and

|f(u1, v1)− f(u2, v2)| ≤ K(|u1 − u2|2 + |v1 − v2|2)α/2, (5.8)

Page 246: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Wavelet Transform for Contour Extraction and Background Removal 227

|u1 − u2| → 0, |v1 − v2| → 0.

In 2-D signal, Lipschitz exponent α can be generalized to −1 ≤ α < 0 sim-ilarly to 1-D case. Tempered distribution f(x, y) is an example in this gen-eralization. Thus, f(x, y) is called uniformly Lipschitz α over (a, b)× (c, d),if the primitive function of the distribution f(x, y) is uniform Lipschitzα+ 1 (−1 ≤ α < 0) on (a, b)× (c, d).

The graphic descriptions of the basic structures of the edges are illus-trated in Figs. 5.12, 5.13 and 5.14 respectively.

(a) (b)

Fig. 5.12 Graphic description of the step-structure edge

(a) (b)

Fig. 5.13 Graphic description of the roof-structure edge

Page 247: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

228 Step-Edge Detection by Wavelet Transform

(a) (b)

Fig. 5.14 Graphic description of the Dirac-structure edge

5.3.2 Analysis of the Basic Edge Structures with Wavelet

Transform

A remarkable property of the wavelet transform is its ability to characterizethe local regularity of functions. After characterizing the singularities withLipschitz exponents and classifying the edges into the basic structures, theanalysis of these structures with wavelet transform will be presented in thissubsection.

Let L2(R) be a Hilbert space of all the square integrable functions onR, and ψ ∈ L2(R) be a wavelet function, i.e., ψ(x) decreases fast when x

goes to infinity and satisfies ∫R

ψ(x)dx = 0.

In the edge detection, the speed of the decrease of ψ(x) effects the result oflocal detection. Usually, the faster of the speed is, the better is the result.In this chapter, a compactly supported wavelet function is chosen as ψ(x).∀f(x) ∈ L2(R) and s > 0, the wavelet transform of f(x) with the scale s isdefined as follows:

Wsf(x) := (f ∗ ψs)(x) =∫

R

f(t)1sψ

(x− ts

)dt,

where ∗ denotes the convolution operation, and ψs(x) := 1sψ

(xs

). Particu-

larly, W2jf(x), (j ∈ Z) is called dyadic wavelet transform, where Z standsfor the set of all integers.

The local Lipschitz singularity can be characterized with wavelet trans-form by the following Theorem [Meyer, 1990]:

Page 248: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Wavelet Transform for Contour Extraction and Background Removal 229

Theorem 5.1 Let α be a real number, α ≥ −1, function f(x) is said tobe uniformly Lipschitz α, if and only if there exists a constant K such that

|Wsf(x)| ≤ Ksα, ∀x ∈ (a, b). (5.9)

This theorem is a theoretical basis for wavelet-based approach to theedge detection. Unfortunately, it gives only an inequality, meanwhile theconstant K is unknown. Hence, it is difficult to apply this result to detectedges directly in practice. To contest such a deficiency, we will discuss theproperties of wavelet transform with respect to the three basic structuresof edges, thereafter, find a solution to handle some specific edges. Afterapplying wavelet transform to these edges, the following main results canbe obtained:

Theorem 5.2 Let ψ(x) be an odd wavelet function, which is supportedon [−δ, δ], satisfying

∫∞0 ψ(x)dx = 0, and x0 be the coordinate of an ideal

edge.

(1). The wavelet transform of a step edge is described by

Wse(x) =∫ −|x−x0|s−1

−∞ψ(t)dt. (5.10)

(2). The wavelet transform of a Dirac edge can be obtained as follows:

Wse(x) =1sψ

(x− x0

s

). (5.11)

(3). If |x − x0| + sδ ≤ h, the wavelet transform of a roof edge can becomputed in the following cases:

(i). if |x− x0| ≤ sδ, then

Wse(x) = (x− x0)(m− n)∫ ∞

|x−x0|s−1ψ(t)dt

−s(m+ n)∫ ∞

|x−x0|s−1tψ(t)dt

−s∫ |x−x0|s−1

−|x−x0|s−1tψ(t)dt ·

n if x ≥ x0;m if x < x0.

(5.12)

Page 249: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

230 Step-Edge Detection by Wavelet Transform

(ii). if x− x0 > sδ, then

Wse(x) = −2ns∫ ∞

0

tψ(t)dt. (5.13)

(iii). if x− x0 > −sδ, then

Wse(x) = −2ms∫ ∞

0

tψ(t)dt. (5.14)

Particularly, at point x0, the wavelet transforms of these basic edgestructures become

Wse(x0) =

− ∫∞

0ψ(t)dt if x0 is a step edge;

0 if x0 is a Dirac edge;− s(m+ n)

∫∞0 tψ(t)dt if x0 is a roof edge.

(5.15)

Proof. (1). If x0 is the coordinate of a step edge, the wavelet transformbecomes

Wsf(x) =∫f(t)ψs(x− t)dt

=∫ ∞

x0

ψs(x− t)dt

=∫ (x−x0)s

−1

−∞ψ(t)dt

=∫ −|x−x0|s−1

−∞ψ(t)dt+

∫ (x−x0)s−1

−|x−x0|s−1ψ(t)dt

=∫ −|x−x0|s−1

−∞ψ(t)dt.

(2). If x0 is the coordinate of a Dirac edge, the wavelet transform can beproduced by

Wsf(x) = (f ∗ ψs)(x)= ψs(x− x0)

=1sψ

(x− x0

s

).

(3). If x0 is the coordinate of a roof edge, it is easy to find that x − st ∈[x0 − h, x0 + h] for ∀x : |x − x0| ≤ h − sδ. Therefore, we have (i). If

Page 250: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Wavelet Transform for Contour Extraction and Background Removal 231

|x−x0| ≤ δs, i.e. −δ ≤ (x−x0)s−1 ≤ δ, the wavelet transform is computedbelow:

Wse(x) =∫ ∞

−∞e(x− t)ψs(t)dt

=∫ (x−x0)s

−1

−δe(x− st)ψ(t)dt +

∫ δ

(x−x0)s−1e(x− st)ψ(t)dt

=∫ (x−x0)s

−1

−δ[n(x− x0 − st) + c0]ψ(t)dt

+∫ δ

(x−x0)s−1[m(x− x0 − st) + c0]ψ(t)dt

= n(x− x0)∫ (x−x0)s

−1

−δψ(t)dt− ns

∫ (x−x0)s−1

−δtψ(t)dt

+m(x− x0)∫ δ

(x−x0)s−1ψ(t)dt−ms

∫ δ

(x−x0)s−1tψ(t)dt

= (m− n)(x− x0)∫ δ

(x−x0)s−1ψ(t)dt − ns

∫ −|x−x0|s−1

−δtψ(t)dt

−ns∫ (x−x0)s

−1

−|x−x0|s−1tψ(t)dt−ms

∫ |x−x0|s−1

(x−x0)s−1tψ(t)dt

−ms∫ δ

|x−x0|s−1tψ(t)dt

= (m− n)(x− x0)∫ δ

|x−x0|s−1ψ(t)dt− (m+ n)s

∫ δ

|x−x0|s−1tψ(t)dt

−s(∫ |x−x0|s−1

−|x−x0|s−1tψ(t)dt

n if x ≥ x0

m if x < x0

= (m− n)(x− x0)∫ ∞

|x−x0|s−1ψ(t)dt− (m+ n)s

∫ ∞

|x−x0|s−1tψ(t)dt

−s(∫ |x−x0|s−1

−|x−x0|s−1tψ(t)dt

n if x ≥ x0;m if x < x0.

(ii). If x− x0 > sδ, then

Wse(x) =∫ δ

−δe(x− st)ψ(t)dt

Page 251: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

232 Step-Edge Detection by Wavelet Transform

=∫ δ

−δ[n(x− st− x0) + c0]ψ(t)dt

= −ns∫ δ

−δtψ(t)dt

= −2ns∫ ∞

0

tψ(t)dt.

(iii). If x− x0 < sδ, then

Wse(x) =∫ δ

−δe(x− st)ψ(t)dt

=∫ δ

−δ[m(x− st− x0) + c0]ψ(t)dt

= −2ms∫ ∞

0

tψ(t)dt.

It is easy to understand the following facts from Eq. 5.15 and the aboveanalyses:

• The wavelet transform Wse(x0) of the step-structure edge is anonzero constant which is independent on the scale of the wavelettransform. It is sign-preserving at the both sides of the neighbor-hood of x0 and the extremum is reached at x0.• For the Dirac-structure edge x0, its wavelet transform becomesWse(x0) = 0 and Wse(x) has the opposite signs when x belongsto the left or right side of the neighborhood of x0. Moreover, theextrema are located at both sides of the neighborhood of x0. Whenthe local extremum is used to detect the Dirac edge, the ambiguitymay appear, since two extrema are obtained.• With respect to the roof-structure edge x0, if m = −n, it can be

concluded that

Wse(x0) = 0,

Wse(x) ≈ 2m(x− x0)∫ ∞

s−1|x−x0|ψ(t)dt.

According to the above results, one can deduce that the sign ofWse(x) at the left side of the neighborhood of x0 is opposite to

Page 252: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Wavelet Transform for Contour Extraction and Background Removal 233

that at the right side. It can easily be found that if m = −n,

Wse(x0) = −s(m+ n)∫ ∞

0

tψ(t)dt,

which is dependent on the scale s.

From the above theorem, the following conclusion will be achieved,

Corollary 5.1 x0 is the coordinate of a step edge, if and only if thewavelet transform of e(x), Wse(x0), is a nonzero constant which is inde-pendent on the scale of the wavelet transform.

This significant property will be utilized to extract the step-structure edgesfrom a signal with multi-structure edges. The details will be presented inthe next subsection.

Similarly, for the two-dimensional images, the characterization of thebasic geometric structures of the edges with wavelet transform can also beestablished. However, it is more complicated to do so, because the two-dimensional image has multi-directions and therefore two wavelet functionshave to be applied. In this chapter, let us consider a special class of waveletfunctions, ψ1(u, v) and ψ2(u, v), whose moduli and angles can be separated,such that

ψ1(u, v) = ψ(r)k1(θ), ψ2(u, v) = ψ(r)k2(θ),

where ψ(r) stands for the function with respect to the modulus r =√u2 + v2; and k1(θ) and k2(θ) denote the functions with respect to the an-

gle θ = arctan( vu ). They are referred to as modulus-angle-separated wavelets(MASW).

In the remainder of this subsection, we will prove that the modulus-angle-separated wavelets possess two significant properties, namely,

• The wavelet transforms of the edges are independent on the gradi-ent directions of edges;• The wavelet transform of the step-structure edge is independent on

the scales of the transform.

The first characteristic provides an ability to detect edges in different di-rections, while the second one can be devoted to identify the step-structureedges from others. These are important in the concrete applications.

Page 253: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

234 Step-Edge Detection by Wavelet Transform

The two-dimensional MASW transform is defined as follows.

W isf(x, y) =

∫ ∫f(x− u, y − v)ψis(u, v)dudv, (i = 1, 2),

where

ψis(u, v) =1s2ψi

(us,v

s

)(i = 1, 2).

Particularly, if s = 2j (j ∈ Z), they are called the dyadic wavelets.It is easy to show that both ψ1 and ψ2 are two-dimensional wavelets, if∫ 2π

0k1(θ)dθ =

∫ 2π

0k2(θ)dθ = 0. To simplify the derivation without losing

the generality, a special case will be applied in this study. In this way, k1(θ)and k2(θ) now become

k1(θ) = cos θ, k2(θ) = sin θ.

Let

∇Wsf(x, y) :=(W 1s f(x, y)

W 2s f(x, y)

),

and

|∇Wsf(x, y)| :=√|W 1

s f(x, y)|2 + |W 2s f(x, y)|2,

Similarly, Theorem 5.1 can be extendedto the two-dimensional images[Mallat and Hwang, 1992], and presented below.

Theorem 5.3 Let α be a real number, 0 < α < 1, then function f(x, y)is uniformly Lipschitz α over (a, b) × (c, d), if and only if there exists aconstant K such that, ∀(x, y) ∈ (a, b)× (c, d), we have

|∇Wsf(x)| ≤ Ksα. (5.16)

For two-dimensional images, the geometric structures of edges are muchmore complicated than that of the one-dimensional signals. Nevertheless,the step- and Dirac-structures of edges, in practice, are considered as con-tours in images. Thus, we will emphasize to discuss these two structures inthis subsection. The edge shown in Fig. 5.15(a) is said to be an ideal step-structure edge, and contours of patterns are typical examples of it. Theedge illustrated in Fig. 5.15(b) is called an ideal curve-Dirac edge whichconsists of many impulses at the gradient direction. The drawing lines in

Page 254: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Wavelet Transform for Contour Extraction and Background Removal 235

the image are the examples of this edge. Another type of Dirac edge isshown in Fig. 5.15(c) which is called an ideal single-point-Dirac edge, andit possesses an impulse at any direction. It is a special case of the curve-Dirac edges, and write noise belongs to this edge. The edge can be regarded

(b)

(c)(a)

(x , y )00

k2

f(x,y)

(x, y)

0

(x , y )0 0

θ

1

θ

f(x,y)

k

f(x,y)

Fig. 5.15 Two dimensional ideal edges

as a polygonal function, which consists of many segments. Suppose θ is anangle between any two adjacent segments as shown in Fig. 5.15(a). If angleθ = π, these two segments become a straight line on the edge. The mainresult in this subsection is as follows:

Theorem 5.4 Let ψ(r) be a compactly supported function on the intervalof [0,∞). Then ψ1(u, v) and ψ2(u, v) are two 2-D MASW with the form of

ψ1(u, v) = ψ(r) cos θ, ψ2(u, v) = ψ(r) sin θ, (5.17)

where r =√u2 + v2, and θ = arctan vu . Furthermore, we have

(1) if (x0, y0) is the coordinate of a point on the ideal step edge with

Page 255: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

236 Step-Edge Detection by Wavelet Transform

angle θ, 0 < θ < 2π, then

|∇Wse(x0, y0)| = 2∣∣∣∣sin θ2

∣∣∣∣ · ∣∣∣∣∫ ∞

0

rψ(r)dr∣∣∣∣ . (5.18)

(2) if (x0, y0) is the coordinate of a point on the Dirac edge, then

|∇Wse(x0, y0)| = 0. (5.19)

(3) if (x0, y0) is the coordinate of a point on the roof edge, then

|∇Wse(x0, y0)| → 0, (s→ 0). (5.20)

Proof. (1) First, the step-structure edges are considered. Suppose thattwo polygonal lines shown in Fig. 5.15(a) are met at the coordinate (x0, y0).Let θ be the angle between these two lines, k1 and k2 be the slopes of them,and θ0 be the angle between x-axis and one side. It can be computed that

W 1s f(x0, y0) =

∫ ∫v≤k1u and v≤k2u

ψ1s(u, v)dudv

=∫ ∞

0

rdr

∫ θ0+θ

θ0

1s2ψ(rs

)cosαdα

=∫ ∞

0

rdr

∫ θ0+θ

θ0

ψ(r) cosαdα

=(∫ ∞

0

rψ(r)dr)

[sin(θ0 + θ)− sin θ0]

=(∫ ∞

0

rψ(r)dr)

2 cos(θ0 +

θ

2

)sin

θ

2.

Similarly,

W 2s f(x0, y0) =

∫ ∫v≤k1u,v≤k2u

ψ2s(u, v)dudv

=(∫ ∞

0

rψ(r)dr)

2 sin(θ0 +

θ

2

)sin

θ

2.

Hence, we obtain

|∇Wse(x0, y0)| = 2∣∣∣∣sin θ2

∣∣∣∣ ∣∣∣∣∫ ∞

0

rψ(r)dr∣∣∣∣ .

Page 256: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Wavelet Transform for Contour Extraction and Background Removal 237

(2) A curve-Dirac edge can be approximated by a sequence of segmentswhich are straight lines, if the curve is smooth. We can only considerthe straight lines when the wavelet ψ is compactly supported. Let theparameter equation of a straight line be the form of

u = x0 − at;t ∈ (−∞,∞)

v = y0 − bt.Then

W 1s el(x0, y0) =

∫ ∞

−∞ψ1s(at, bt)dt

=∫ ∞

−∞ψ(√a2 + b2

s|t|) at√

a2 + b2dt

= 0.

We can also deduce that

W 2s el(x0, y0) = 0.

Therefore, we have

|∇Wse(x0, y0)| = 0.

Similarly, the result for the single-point-Dirac edges can be obtained.(3) For the roof-structure edges, since α = 1, we have

|∇Wse(x0, y0)| ≤ Ks. (5.21)

It is clear that when s→ 0, then Ks→ 0. Thus, |∇Wse(x0, y0)| → 0.It is easily seen that the modulus |∇Wse(x0, y0)| of the MASW trans-

form with respect to a ideal step-structure edge is a nonzero constant whichis independent on both the gradient direction of the edge and the scale of thetransform, if

∫∞0 rψ(r)dr = 0. Based on this property, the step-structure

edges with various orientations can be detected effectively. The modulus|∇Wse(x0, y0)| reaches the maxima, if θ = π. Therefore, the closer to π theangle is, the more effective the detection will be.

In practice, signals are usually much more complicated than the idealones. They can be regarded as the overlaying of the ideal edges and abackground which is a smooth function, or a function with less singularity.

Page 257: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

238 Step-Edge Detection by Wavelet Transform

Thus, a practical signal f(x) can be written as

f(x) = f0(x) +∑i

ei(x),

where ei(x) denotes an ideal edge and f0(x) is a smooth signal which hasless singularity or even no any singularity.

By applying wavelet transform to f0(x) +∑

i ei(x), we have

Wsf(x) = Wsf0(x) +∑i

Wsei(x).

Thus,

|Wsf(x)−∑i

Wsei(x)| = |Wsf0(x)|.

Theorem 5.1 shows that |Wsf0(x)| at the edge x0 is usually much smallerthan |Wsei(x)|, since f0(x) has smaller singularity. Hence, the followingimportant conclusion can be obtained:

Wsf(x) ≈∑i

Wsei(x).

Consequently, all results derived from the ideal case in this subsection canbe utilized in the practical signals.

Consider a signal with a noisy function n(x) which is a real, wide sensestationary white noise of variance σ2. Thus, its correlation function is

E(n(u)n(υ)) = σ2δ(u − υ) =δ2, for u = υ;0, otherwise.

Since

|Wsn(x)|2 = Wsn(x)W sn(x)

=∫ ∫

n(u)n(υ)ψs(x− u)ψs(x− υ)dudυ,

we have

E|Wsn(x)|2 =∫ ∫

σ2δ(u− υ)ψs(x− u)ψs(x − υ)dudυ

= σ2

∫|ψs(x − u)|2du

= σ2 1s

∫|ψu|2du

Page 258: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Wavelet Transform for Contour Extraction and Background Removal 239

=1sσ2‖ψ‖2.

which shows that the variance of the wavelet transform of the noise isdependent on the scale. The larger the scale is, the less is the variance ofthe wavelet transform of the noise. Therefore, we can synthesize severalscales to detect edges and to remove the noise.

5.3.3 Scale-Independent Algorithm

Based on the above analyses, the concrete algorithm can be developed. Thisalgorithm possesses two objectives: (1) to extract the step-structure edgesfor one- and two-dimensional signals, (2) to eliminate other edges such asdrawing lines, noise, texts, etc.

In view of Corollary 5.1, this implies that the wavelet transform of thestep-structure edge is a nonzero constant without considering the scaless. In other words, for different values of scales s1, s2, ..., sJ , their wavelettransforms with respect to the step-structure edges, Ws1f(x), Ws2f(x), ...,WsJ f(x), are nonzero constants, and are equal each to each. At the pointson the step-structure edge, it is clear that

Wsjf(x)Wsl

f(x)= 1, (j, l = 1, 2, ...J). (5.22)

In practice, the sign of equality in Eq. (5.22) may not be satisfied due tothe following reasons:

• The edge is not an ideal one as mentioned in the previous subsec-tion;• The image to be processed is distorted by noise;• The background of the image may bring a small error in the calcu-

lation of the wavelet transforms;• Other factors may influence the result, for example, the accuracy

of the computer system may has an effect on the computation.

Therefore, Wsif(x), i = 1, 2, ..., J may not keep the same value for differentscales. Consequently, the equality sign in Eq. (5.22) should be replaced bythe approximate sign, and Eq. (5.22) now becomes

Wsjf(x)Wsl

f(x)≈ 1, (j, l = 1, 2, ...J). (5.23)

Page 259: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

240 Step-Edge Detection by Wavelet Transform

As a matter of fact, the points which satisfy Eq. (5.23) are considered beinga step-structure edge.

However, the approximate sign makes uncertainty of extracting edgepoints. In order to avoid this uncertainty, and to facilitate the design ofalgorithm detecting the step-structure edges, we utilize a real number R,instead of the integer number 1. Let R be very close to 1 and greater than1. In replacing sign “≈” by sign “≤”, Eq. (5.23) is equivalent to

Wsjf(x)Wsl

f(x)≤ R, and

Wslf(x)

Wsjf(x)≤ R, (j, l = 1, 2, ...J). (5.24)

The closer to 1 the real number R is, the closer to 1 isWsj

f(x)

Wslf(x) , i.e.

R→ 1 ⇐⇒ Wsjf(x)Wsl

f(x)→ 1.

Moreover, both Wsjf(x) and Wslf(x) are positive values or negative ones

at the same time. In other words, the following is held:

Wsjf(x)Wsl

f(x)> 0, and

Wslf(x)

Wsjf(x)> 0, (j, l = 1, 2, ...J). (5.25)

Combining Eqs. (5.24) and (5.25) produces

0 <Wsjf(x)Wsl

f(x)≤ R, and 0 <

Wslf(x)

Wsjf(x)≤ R, (j, l = 1, 2, ...J), (5.26)

which is equivalent to

1R≤ Wsjf(x)Wsl

f(x)≤ R, (j, l = 1, 2, ...J), (5.27)

in the view of mathematics. The real number R in Eq. (5.27) is referred toas Proportional Threshold.

Because the edges are high frequency signals, the wavelet transform ofthem may have large values, thus only the points, which have large valuesare considered being edges. Therefore, a threshold, T , is established, suchthat if the points satisfy

|Wsjf(x)| ≥ T, (5.28)

they are on the edge. Number T in Eq. (5.28) is referred to as Peak Thresh-old.

Page 260: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Wavelet Transform for Contour Extraction and Background Removal 241

Finally, we can summarize that the points on the step-structure edgeshave to satisfy

|Wsjf(x)| ≥ T, and1R≤ Wsjf(x)Wsl

f(x)≤ R, (j, l = 1, 2, ...J). (5.29)

In view of the discussion in the above, the algorithm can be designedbelow. Since the wavelet transform of the step-structure edges is scale-independent, this algorithm is referred to as Scale-Independent Algorithm.

Algorithm 5.3 Detecting step-structure edges

(1) Given one-dimensional signal f(x):

Step 1: Take different scales s1, ..., sJ , and calculate Wsjf(x), (1 ≤ j ≤ J)based on Eq. (5.2) in the previous subsection.

Step 2: Select peak-threshold T , such that

|Wsjf(x)| ≥ T.

Step 3: Select proportional threshold R, such that

1R≤ Wsjf(x)Wsl

f(x)≤ R, (1 ≤ j ≤ J).

Then x is detected as a pixel of the step edge.(2) For two-dimensional signal f(x, y):

Step 1: Take different scales s1, ..., sJ , and calculate Wsjf(x, y), (1 ≤ j ≤J) based on Eq. (5.3) in the previous subsection.

Step 2: Select peak-threshold T , such that

|∇Wsj f(x, y)| ≥ T.

Step 3: Select proportional threshold R, such that

1R≤ |∇Wsjf(x, y)||∇Wsl

f(x, y)| ≤ R, (1 ≤ j ≤ J).

Then (x, y) is detected as a pixel of the step edge.It should be pointed out that there is no deviation when the step edges

are detected by the above schemes.

Page 261: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

242 Step-Edge Detection by Wavelet Transform

5.3.4 Experiments

We focus this subsection on the verification of the effectiveness of the pro-posed novel wavelet-based method by experiments. Three types of theexperiments have been done, namely, (1) extraction of contours of 2-Dobjects, (2) removal of background in images, and (3) preprocessing in doc-ument analysis and recognition. Seven examples will be presented in thissubsection.

In these experiments, Eqs. (5.3) and (5.6) have been applied to computethe filtering coefficients ψs,1k,l in the MASW transform. These coefficientshave been used in the following examples.

First, the experiments of detecting boundaries of 2-D objects are pre-sented. Let us look back at Fig. 5.9. The particular task is that we arerequired to extract the contour of the aircraft, and to remove all lines andtexts. Unfortunately, the algorithm based on the modulus maxima of thewavelet transform [Mallat and Hwang, 1992; Mallat and Zhong, 1992] hasdetected all edges without identifying different structures of edges. Thus,the resulting image contains lines and texts which are required to be deletedfrom the image. The new method developed in this subsection possessesan important property, i.e. the wavelet transform of a step-structure edgeis scale-independent. It can improve the method of the modulus maxima,and new result can be found in Fig. 5.16. The original image is shownin Fig. 5.16(a) containing a planner object, aircraft, with several drawinglines and texts. Figs. 5.16(b), and (e) display the modulus and angle im-ages undergone by the MASW transform with scale of s = 2 respectively.Figs. 5.16(c) and (f) give the modulus and angle images by the MASWtransform with scale of s = 4 respectively. Figs. 5.16(d) and (g) providethe modulus and angle ones with scale of s = 8 respectively. After applyingEq. (5.29) to these images, the resulting image is obtained, and shown inFig. 5.16(h). It is clear that only the contour of the aircraft has been ex-tracted, while all other edges including drawing lines and texts have beeneliminated.

The second example of extracting the contour of the planner objects isillustrated in Fig. 5.17. The original image is given in Fig. 5.17(a). We takes = 2, 4, 8, thereafter, the modulus images are obtained in Figs. 5.17(b)-(d),the angle ones are produced in Figs. 5.17(e)-(g). The result is presented inFig. 5.17(h), where the contour of the 2-D object has been detected, whilethe others have been removed.

Page 262: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Wavelet Transform for Contour Extraction and Background Removal 243

1

(f)

(a)

W

2

W

(b)

3

(c)

Ws

(g)(e)

ss

(d)

(h)

Fig. 5.16 Example 1: the contour of the aircraft is detected using the proposed algo-rithm.

Page 263: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

244 Step-Edge Detection by Wavelet Transform

(f)

(c)(b)

(g)

(a)

(e)(d)

(h)

Fig. 5.17 Example 2: the contour of the aircraft is detected using the proposed algo-rithm.

Now, we turn to other examples shown in Figs. 5.18 and 5.19. We arerequired to extract the boundaries of the characters, for example, Englishprinted character “A” and Chinese handwriting “book”, and to delete thedrawing lines and noise. The same problem was arisen when different scales,for example, s = 2, 4, 8 were used in the modulus maxima of the wavelettransform. To contest this deficiency, the scale-independent wavelet methodis applied to these examples. For the English printed character, the originalimage is shown in Fig. 5.18(a) containing a character, English letter “A”,

Page 264: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Wavelet Transform for Contour Extraction and Background Removal 245

with several drawing lines and white noise. Figs. 5.18(b)-(d) display themodulus images of the MASW transforms with scales s = 2, 4, 8 respec-tively. Figs. 5.18(e)-(g) show the angle images of the MASW transformsof s = 2, 4, 8 respectively. After applying Eq. (5.29) to these images, theresulting image is obtained, and shown in Fig. 5.18(h). Only the boundaryof the character has been extracted, and all other edges including drawinglines and noise have been eliminated.

Detection of the contour from a Chinese handwriting using the scale-independent algorithm can be found in Fig. 5.19, where, the original imageis depicted in Fig. 5.19(a), and the resulting one is illustrated in Fig. 5.19(h).

The proposed method can be applied to document processing. An ex-ample is depicted in Fig. 5.20, which is an improvement of the results (seeFigs. 5.10 and 5.11) produced by the modulus maxima. The original im-age is shown in Fig. 5.20(a). It is a mailing address that is written on apaper with guide lines. In order to automatically process it by comput-ers, a preprocessing is to remove the guide lines and extract the contoursof the handwriting English letters. Figs. 5.20(b)-(c) indicate the modu-lus images of MASW transform with scales s = 2 and s = 4 respectively.Figs. 5.20(d)-(e) display the angle images with wavelet transform of scaless = 2 and s = 4 respectively. Using the algorithm mentioned in previoussubsection produces an image in Fig. 5.20(f), that is what we need.

The sixth example is shown in Fig. 5.21, where a Chinese article iswritten on a paper with guide-mesh. Fig. 5.21(a) gives the original image.Figs. 5.21(b) and (c) display the modulus and angle images undergone bythe MASW transform with scale of s = 2 respectively. Figs. 5.21(d) and (e)give the modulus and angle images by the MASW transform with scale ofs = 4 respectively. After applying Eq. (5.29) to these images, the resultingimage is obtained, and depicted in Fig. 5.21(h).

The seventh example is depicted in Fig. 5.22. The original image isillustrated in Fig. 5.22(a), and the resulting ones in accordance with themodulus maxima are depicted in Figs. 5.22(f) and (g), which are not thedesired images, since they include not only the Chinese handwriting, butthe guide lines as well. Applying our method produces a good result andis displayed in Fig. 5.22(h), in which, only Chinese handwritten charactersare kept, and others are removed.

Page 265: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

246 Step-Edge Detection by Wavelet Transform

(a)

(e)

(d)(b) (c)

1Ws

(f)

3Ws

(g)

2Ws

(h)

Fig. 5.18 Example 3: The boundary of English letter “A” is extracted using the pro-posed algorithm.

Page 266: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Wavelet Transform for Contour Extraction and Background Removal 247

(h)

(e) (g)(f)

(b)

1Ws

(c)

3Ws

(d)

2Ws

(a)

Fig. 5.19 Example 4: The contours of Chinese handwriting “book” are extracted usingthe proposed algorithm.

Page 267: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

248 Step-Edge Detection by Wavelet Transform

(f)

(e)

(b)

(c)

(a)

(d)

Fig. 5.20 Example 5: The boundaries of English letters are extracted using the proposedalgorithm.

Page 268: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Wavelet Transform for Contour Extraction and Background Removal 249

(a) (b)

(c) (d)

(e) (f)

Fig. 5.21 Example 6: The contours of handwriting Chinese characters are extractedusing the proposed algorithm.

Page 269: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

250 Step-Edge Detection by Wavelet Transform

(a) (b)

(c) (d)

(e) (f)

(g) (h)

Fig. 5.22 Example 7: The boundaries of handwriting Chinese characters are extractedusing the proposed algorithm.

Page 270: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Chapter 6

Characterization of Dirac-Edges withQuadratic Spline Wavelet Transform

This chapter aims at studying the characterization of Dirac-structure edgeswith wavelet transform, and selecting the suitable wavelet functions to de-tect them. Three significant characteristics of the local maximum modulusof the wavelet transform with respect to the Dirac-structure edges are pre-sented, namely: (1) slope invariant: the local maximum modulus of thewavelet transform of a Dirac-structure edge is independent on the slopeof the edge. (2) grey-level invariant: the local maximum modulus of thewavelet transform with respect to a Dirac-structure edge takes place atthe same points when the images with different grey-levels are processed.(3) width light-dependent: for various widths of the Dirac-structure edgeimages, the location of maximum modulus of the wavelet transform varieslightly under the certain circumscription that the scale of the wavelet trans-form is larger than the width of the Dirac-structure edges. It is important,in practice, to select the suitable wavelet functions, according to the struc-tures of edges. For example, Haar wavelet is better to represent brick-likeimages than other wavelets. A mapping technique is applied in this chapterto construct such a wavelet function. In this way, a low-pass function ismapped onto a wavelet function by a derivation operation. In this chapter,the quadratic spline wavelet is utilized to characterize the Dirac-structureedges and an algorithm to extract the Dirac-structure edges by wavelettransform is also developed.

A mathematical characterization of three basic geometric structures ofedges (i.e. step-structure, roof-structure, and Dirac-structure) with Lip-schitz exponents has been presented in Chapter 5. A significant propertyhas been proved that the modulus of wavelet transform at each point of

251

Page 271: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

252 Characterization of Dirac-Edges with Quadratic Spline Wavelet Transform

the step edge is a non-zero constant which is independent on both thegradient direction and the scale of the wavelet transform. This prop-erty led to provide a simple and direct strategy for detecting a specificstructure of edges, the step-structure edges. Thus, an algorithm calledscale-independent algorithm has been developed. The method developedin Chapter 5 possesses an important property, i.e. the wavelet transformof a step-structure edge is scale-independent. It can improve the methodproposed in [Mallat and Hwang, 1992; Mallat and Zhong, 1992], and theresult can be found in Fig. 5.17 of Chapter 5, where the modulus-angle-separated-wavelet (MASW) has been used. The precise definition of theMASW can be found in Chapter 5 and [Tang et al., 1998c]. The originalimage is shown in Fig. 5.17(a) containing a planner object, aircraft, withseveral drawing lines and texts. Figs. 5.17(b) and (c) display the modulusand angle images undergone by the MASW transform with scale of s = 2respectively. Figs. 5.17(d) and (e) give the modulus and angle images bythe MASW transform with scale of s = 4 respectively. Figs. 5.17(f) and(g) provide the modulus and angle images with scale of s = 8 respectively.After applying the scale-independent algorithm to these images, the result-ing image is obtained, and shown in Fig. 5.17(h). It is clear that only thecontour of the aircraft has been extracted, while all other edges includingdrawing lines and texts have been eliminated.

On the other hand, as a complement of Chapter 5, the purpose of thischapter is to develop a method which can identify different structures ofedges, thereafter, detect the Dirac-structure edges such as the drawing linesand texts in Figs. 5.17(a) and eliminate the step-structure edges such asthe contour of the aircraft in Figs. 5.17(a).

6.1 Selection of Wavelet Functions by Derivation

In practice, the selection of a suitable wavelet function in accordance withthe structure of the edges is an important topic in the application of wavelettransform to image processing and pattern recognition. In this section,a method of selection of wavelet function by derivation of the low-passfunction will be presented.

Page 272: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Selection of Wavelet Functions by Derivation 253

6.1.1 Scale Wavelet Transform

Let L2(R2) be the Hilbert space of all the square-integrable 2-D functionson plane R2, ψ ∈ L2(R2) is called a wavelet function, if∫

R

∫R

ψ(x, y)dxdy = 0, (6.1)

For f ∈ L2(R2) and scale s > 0, the scale wavelet transform of f(x, y) isdefined by

Wsf(x, y) := (f ∗ ψs)(x, y)=

∫R

∫R

f(u, v)1s2ψ(x− us

,y − vs

)dudv, (6.2)

where * denotes the convolution operator, and

ψs(u, v) := ψ(u

s,v

s).

The theory dealing with the scale wavelet transform can be found in manyarticles, such as [Chui, 1992; Daubechies, 1992]. In practice, the wavelettransform can be calculated discretely using the following formula:

Wsf(n,m) =∫ ∫

f(u, v)ψs(n− u,m− v)dudv

=∑k,l

f(k, l)∫ k+1

k

∫ l+1

l

ψs(n− u,m− v)dudv

=∑k,l

f(k, l)∫ n−k

n−k−1

∫ m−l

m−l−1

ψs(u, v)dudv

=∑k,l

f(n− k − 1,m− l − 1)ψsk,l,

where

ψsk,l =∫ k+1

k

∫ l+1

l

ψs(u, v)dudv =∫ (k+1)/s

k/s

∫ (l+1)/s

l/s

ψ(u, v)dudv.

Obviously, the scale wavelet transform described in Eq. (6.2) is a filterin essence. We can conclude that its Fourier transform defined by

ψ(ξ, η) :=∫R

∫R

ψ(x, y)e−i(ξx+ηy)dxdy

Page 273: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

254 Characterization of Dirac-Edges with Quadratic Spline Wavelet Transform

satisfies the condition of ψ ∈ L2(R2), since ψ ∈ L2(R2). Thus, both func-tions ψ and ψ decrease at infinity. Usually, ψ is chosen to meet the followingtwo conditions at least: First, ψ ∈ L2(R2) has to be held; Second, both ψ

and ψ decrease with exponents at infinity. According to Eq. (6.1) we can seethat ψ(0, 0) = 0, which implies that the scale wavelet transform Wsf(x, y)corresponds to a band-pass filter essentially. Moreover, Wsf(x, y) char-acterizes the local properties of f(x, y) on both the time and frequencydomains, namely:

• On the time domain, it is easy to see that

Wsf(x, y) := (f ∗ ψs)(x, y) =∫R

∫R

f(x− u, y − v)ψs(u, v)dudv

characterizes the local property of f around the point (x, y). Thesmaller the scale s, the more narrow the time-window is.• On the frequency domain, based on the basic properties of Fourier

transform, it can be conclude that

(Wsf)(x, y) =(

12π

)2 ∫R

∫R

(Wsf ) (ξ, η)ei(ξx+ηy)dξdη

=(

12π

)2 ∫R

∫R

f(ξ, η)(ψs )(ξ, η)ei(ξx+ηy)dξdη

=(

12π

)2 ∫R

∫R

f(ξ, η)ψ(sξ, sη)ei(ξx+ηy)dξdη.

Since ψ(sξ, sη)ei(ξx+ηy) decreases as ψ(sξ, sη) does, thus (Wsf)(x, y)characterizes the local property of f . The position of the localitydepends on the scale s and function ψ. And the larger the scale s,the narrow the frequency-window is.

The reduction of ψ and ψ at infinity plays an important role for characteriz-ing the local properties of f(x, y) on both the time and frequency domains.The faster the decrement of ψ and ψ, the better the characterization of thelocal properties will be. In other words, the shorter the support of ψ andψ, the higher the quality of the localization will be obtained.

Page 274: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Selection of Wavelet Functions by Derivation 255

6.1.2 Construction of Wavelet Function by Derivation of

the Low-Pass Function

The Dirac-structure edges such as curves are transient components withhigh frequencies in an image. They are highly localized in spatial positions.Such components do not resemble any of the wave basis functions, such asFourier basis function. This makes the Fourier and other wave transformsless than optimal representations for analyzing and processing the Dirac-structure edges in the images. To combat such a deficiency, wavelet analysiscan be utilized. Wavelet theory is a good mathematical tool primarily usedfor representing such transient components more efficiently. In fact, theDirac-structure edges can be characterized by the wavelet transforms.

However, one of the key factors which obstruct the application of wavelettransform to process these Dirac-structure edges is that it is still difficult,in practice, to select the suitable wavelet functions, which possess a perfectcharacteristic of localization.

Theoretically, the detection of the Dirac-structure edges by wavelettransforms can be regarded as a particular filtering operation. The deriva-tive function of a smooth low-pass function which decreases at infinite canbecome a candidate of the wavelet function. It can be considered to be amapping, i.e. a low-pass function can be mapped onto a wavelet functionby the operation of derivation, which can also be described by the following:

Low− Pass FunctionMapping

=⇒ Wavelet Function︸ ︷︷ ︸Derivation

(6.3)

According to Eq. (6.3), we can use such a method to produce a waveletfunction in the following steps: (1) selecting a low-pass function θ(x, y), (2)deriving this low-pass function to produce the wavelet functions ψ1(x, y)and ψ2(x, y).

Let θ(x, y) be a real function, and satisfies:

• θ(x, y) fast decreases at infinity;• θ(x, y) is even function on both x and y;• θ(0, 0) = 1.

Consider

ψ1(x, y) :=∂

∂xθ(x, y),

Page 275: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

256 Characterization of Dirac-Edges with Quadratic Spline Wavelet Transform

it is easy to see that∫ ∫

ψ1(x, y)dxdy = 0, which indicates that ψ1(x, y) isa 2-D wavelet. Then its scale wavelet transform is

W 1s f(x, y) = (f ∗ ψ1

s)(x, y)

= (f ∗ s ∂∂xθs)(x, y)

= s∂

∂x(f ∗ θs)(x, y)

where θs(x, y) := 1s2 θ(

xs ,

ys ). Based on this formula, it is clear that f ∗ θs

is a smooth operation with scale s, if θ is a smooth function with fastdecreasing at infinity and θ(0, 0) = 1. When a quadratic spline function isutilized as the primitive function θ(x, y), the graphical description of thederivative function of the function θ(x, y) with respect to the horizontalaxis x is illustrated in Fig. 6.1.

−1.5−1

−0.50

0.51

1.5

−1.5

−1

−0.5

0

0.5

1

1.5−2

−1.5

−1

−0.5

0

0.5

1

1.5

2

Fig. 6.1 The graphical description of derivative function ψ1(x, y) = ∂∂xθ(x, y).

Since W 1s f(x, y) is the derivative function of function θ(x, y) along the

horizontal axis, the characteristic of the local maxima modulus of the

Page 276: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Selection of Wavelet Functions by Derivation 257

wavelet transform mainly influences the transient components of an im-age along the horizontal axis.

Similarly, let

ψ2(x, y) :=∂

∂yθ(x, y).

It is also a 2-D wavelet, and its scale wavelet transform is

W 2s f(x, y) = (f ∗ ψ2

s)(x, y)

or

W 2s f(x, y) = s

∂y(f ∗ θs)(x, y)

which is the derivative function of function θ(x, y) along the vertical axis.Therefore, the characteristic of the local maxima modulus of the wavelettransform mainly influences the transient components of an image alongthe vertical axis. The graphical description of the derivative function of thefunction θ(x, y) with respect to the vertical axis y is illustrated in Fig. 6.2,where the primitive function is a quadratic spline function .

We denote the gradient direction and the amplitude of the wavelet trans-form respectively by

∇Wsf(x, y) :=(W 1s f(x, y)

W 2s f(x, y)

)(6.4)

and

|∇Wsf(x, y)| :=√|W 1

s f(x, y)|2 + |W 2s f(x, y)|2. (6.5)

Locating the local maxima of |∇Wsf(x, y)| along the direction of∇Wsf(x, y)can detect the Dirac-structure edges including the curves of images.

In this chapter, function θ(x, y) is defined by

θ(x, y) = φ(√x2 + y2), (6.6)

where φ is selected to be the quadratic spline function as follows:

φ(r) =

8r2(r − 1) + 4

3 0 ≤ r < 12

− 83 (r − 1)3 1

2 ≤ r < 10 r ≥ 1.

(6.7)

Page 277: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

258 Characterization of Dirac-Edges with Quadratic Spline Wavelet Transform

−1.5−1

−0.50

0.51

1.5

−1.5

−1

−0.5

0

0.5

1

1.5−2

−1.5

−1

−0.5

0

0.5

1

1.5

2

Fig. 6.2 The graphical description of derivative function ψ2(x, y) = ∂∂yθ(x, y).

Since

ψ1(x, y) =∂

∂xθ(x, y), ψ2(x, y) =

∂yθ(x, y), (6.8)

The wavelet function ψ1, ψ2, which are called the quadratic spline wavelets,can be obtained as follows:

ψ1(x, y) = φ′(√x2 + y2) x√

x2+y2

ψ2(x, y) = φ′(√x2 + y2) y√

x2+y2.

(6.9)

which can be represented graphically in Figs. 6.1 and 6.2.

6.2 Characterization of Dirac-Structure Edges by WaveletTransform

In this section, three significant characteristics of the local maximum mod-ulus of the wavelet transform with respect to the Dirac-structure edges in

Page 278: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Characterization of Dirac-Structure Edges by Wavelet Transform 259

the images will be presented, namely:

• Slope invariant: the local maximum modulus of the wavelet trans-form of a Dirac-structure edge is independent on the slope of theedge.• Grey-level invariant: the local maximum modulus of the wavelet

transforms with respect to a Dirac-structure edge takes place atthe same points when the images with different grey-levels are tobe processed.• Width light-dependent: for various widths of images of the Dirac-

structure edges, the location of maximum modulus of the wavelettransform varies lightly under the certain circumscription.

Curve is a display of the Dirac-structure edge in a two-dimensionalimage. To simplify the theoretical analysis, in this chapter, a segment ofthe curve will be considered. In the remainder of this book, we will notidentify the notations of the Dirac-structure edge, curve, and segment ofcurve.

Before mathematically analyzing the characterization of curves by wavelettransform, we look at an example as shown in Fig. 6.3. In practice, weshould consider the width of the curve, especially in the application of im-age processing. Fig. 6.3(a) gives a segment, which is marked by letter “A”,of a curve with certain width. Suppose the quadratic spline function isselected to construct the wavelet functions. The distribution of the modu-lus of wavelet transform is illustrated in Fig. 6.3(b). Thus, the maximummodulus of wavelet transform will occur on two parallel lines around thecurve image.

Now, we turn to the mathematical analysis. Suppose that the parameterequation of a curve ld can be written in form of

ld :u = u(t)v = v(t)

t ∈ [a, b], (6.10)

where, [a, b] denotes the interval of the curve. Let d be the width, and l

be the skeleton of the curve, i.e. the central line of the curve image. Agraphical description of such a curve is presented in Fig. 6.4. Note that,from the mathematical point of view, a curve does not have any widthwith it. Thus, we did not consider the width of the curve in Eq. (6.10).Therefore, we do not identify the notations of l and ld. In Fig. 6.4, thelines labeled by lλ are parallel lines, which are around the curve image, and

Page 279: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

260 Characterization of Dirac-Edges with Quadratic Spline Wavelet Transform

0

10

20

30

40

50

60

0

10

20

30

40

50

60

0

100

200

A

(a)

(b)

WT

Fig. 6.3 An example of the distribution of the modulus of wavelet transform (WT) withrespect to a curve.

the maximum modulus of the wavelet transform occurs on these lines. Thenormal unit vector of the curve ld is described by

VN =

(v′(t)√

u′(t)2 + v′(t)2,− u′(t)√

u′(t)2 + v′(t)2

).

Therefore, the equations of the parallel line lλ can be represented as follows:

lλ :

uλ(t) = u(t) + λv′(t)√

u′(t)2+v′(t)2

vλ(t) = v(t)− λu′(t)√u′(t)2+v′(t)2

t ∈ [a, b],

where |λ| is the distance between the parallel line lλ and the central line lof the curve ld, and the sign of λ determines which side of ld the parallelline lλ will be located. A curve image ld can be described by

fld(x, y) = cfχDld(x, y)

Page 280: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Characterization of Dirac-Structure Edges by Wavelet Transform 261

dl

l

d

|λ|

l λ

l λ

Dld

VN

( , )x ρ yρ

t0( )vt0u( ),

Fig. 6.4 Curve ld and its parallel line lλ.

where cf stands for the grey level of the curve and χDld(x, y) denotes the

characteristic function of the area Dld which is defined by

Dld := (uλ(t), vλ(t))|t ∈ [a, b], λ ∈ [−d/2, d/2].

∀g(x, y), we have∫R

∫R

fld(u, v)g(u, v)dudv = cf

∫ ∫Dld

g(u, v)dudv

= cf

∫ b

a

dt

∫ d/2

−d/2g(uλ(t), vλ(t))J(t, λ)dλ,

where J(t, λ) is the Jacobi determinant of the coordinate transformu = u(t, λ)v = v(t, λ)

,

i.e.

J(t, λ) =∣∣∣∣ ∂u∂t

∂u∂λ

∂v∂t

∂v∂λ

∣∣∣∣ = −√u′(t)2 + v′(t)2 − λu

′(t)v′′(t)− v′(t)u′′(t)u′(t)2 + v′(t)2

.

Page 281: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

262 Characterization of Dirac-Edges with Quadratic Spline Wavelet Transform

Hence ∫R

∫R

fld(u, v)g(u, v)dudv =

−cf∫ b

a

dt

∫ d/2

−d/2

[√u′(t)2 + v′(t)2 + λ

u′(t)v′′(t)− v′(t)u′′(t)u′(t)2 + v′(t)2

g

(u(t) +

λv′(t)√u′(t)2 + v′(t)2

, v(t)− λu′(t)√u′(t)2 + v′(t)2

)dλ.

Let g(u, v) = ψs(u, v), we have∫R

∫R

fld(u, v)ψs(u, v)dudv =

−cf∫ b

a

dt

∫ d/2

−d/2

[√u′(t)2 + v′(t)2 + λ

u′(t)v′′(t)− v′(t)u′′(t)u′(t)2 + v′(t)2

ψs

(u(t) +

λv′(t)√u′(t)2 + v′(t)2

, v(t)− λu′(t)√u′(t)2 + v′(t)2

)dλ.

When a segment of curve ld is short enough, it can be considered to be astraight line, thereafter, the the parameter equation of its central line canbe represented as follows:

l :u = u(t) + k1(t− t0)v = v(t) + k2(t− t0) t ∈ [a, b],

where k1, k2 denote the slope of l satisfying k21 +k2

2 = 1. Thus, the wavelettransform of this curve can be obtained

Wsfld(x, y) = −cf∫ b

a

dt

∫ d/2

−d/2ψs(x − u(t0)− k1(t− t0)−

λk2, y − v(t0)− k2(t− t0) + λk1)dλ.

∀(u(t0), v(t0)) ∈ l, we consider the point (xρ, yρ) in the normal line:xρ = u(t0) + k2ρ

yρ = v(t0) + k1ρ,

where ρ denotes a parameter such that its absolute value |ρ| is the just dis-tance between (xρ, yρ) and (u(t0), v(t0)), i.e. |λ| = |ρ|. The local maximummodulus of wavelet transform of the point (u(t0), v(t0)) in the curve takesplace at point (xρ, yρ) in the normal line. As the parameter ρ is determined,

Page 282: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Characterization of Dirac-Structure Edges by Wavelet Transform 263

the point (xρ, yρ) will be fund. Therefore, the calculation of parameter ρplays a key role in finding the location where the maximum modulus ofwavelet transform occurs. In this case, the wavelet transform becomes

Wsfld(x, y) = −cf∫ b

a

dt

∫ d/2

−d/2ψs(k2ρ− k1(t− t0)− λk2,

−k1ρ− k2(t− t0) + λk1)dλ

= −cf∫ b

a

dt

∫ d/2

−d/2ψs(−k1(t− t0)− k2(λ− ρ),

−k2(t− t0) + k1(λ− ρ)dλ

= −cf∫ t0−a

t0−bdt

∫ d/2−ρ

−d/2−ρψs(k1t− k2λ, k2t+ k1λ)dλ

= −cf∫ t0−a

t0−bdt

∫ ρ+d/2

ρ−d/2ψs(k1t+ k2λ, k2t− k1λ)dλ

= −cf∫ (t0−a)/s

(t0−b)/sdt

∫ (ρ+d/2)/s

(ρ−d/2)/sψ(k1t+ k2λ, k2t− k1λ)dλ.

6.2.1 Slope Invariant

In this sub-section, we will prove that the local maximum modulus of thewavelet transform of the curve are independent on the slope of that curve.

For the quadratic spline wavelets ψ1, ψ2, since

ψ1(x, y) =∂

∂xθ(x, y), ψ2(x, y) =

∂yθ(x, y),

where θ(x, y) = φ(√x2 + y2), and

φ(r) =

8r2(r − 1) + 4

3 0 ≤ r < 12

− 83 (r − 1)3 1

2 ≤ r < 10 r ≥ 1,

therefore, ψ1, ψ2 can be represented asψ1(x, y) = φ′(

√x2 + y2) x√

x2+y2

ψ2(x, y) = φ′(√x2 + y2) y√

x2+y2.

Page 283: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

264 Characterization of Dirac-Edges with Quadratic Spline Wavelet Transform

The wavelet transforms using the quadratic spline wavelets ψ1, ψ2 are

W 1s f(xρ, yρ) = −cf

∫ (t0−a)/s

(t0−b)/sdt

∫ (ρ+ d2 )/s

(ρ− d2 )/s

φ′(√t2 + λ2)

k1t+ k2λ√t2 + λ2

(6.11)

W 2s f(xρ, yρ) = −cf

∫ (t0−a)/s

(t0−b)/sdt

∫ (ρ+ d2 )/s

(ρ− d2 )/s

φ′(√t2 + λ2)

k2t− k1λ√t2 + λ2

dλ.

(6.12)It is easy to rewrite Eqs. (6.11) and (6.12) in following forms

W 1s f(xρ, yρ) = −cf(k1w1 + k2w2)

W 2s f(xρ, yρ) = −cf(k2w1 − k1w2),

by denoting

w1 =∫ (t0−a)/s

(t0−b)/sdt

∫ (ρ+ d2 )/s

(ρ− d2 )/s

φ′(√t2 + λ2)

t√t2 + λ2

w2 =∫ (t0−a)/s

(t0−b)/sdt

∫ (ρ+ d2 )/s

(ρ− d2 )/s

φ′(√t2 + λ2)

λ√t2 + λ2

dλ.

Hence, the second power of the amplitude of the wavelet transform can beobtained

|∇Wsfld(xρ, yρ)|2 = |W 1s fld(xρ, yρ)|2 + |W 2

s fld(xρ, yρ)|2= c2f [(k1w1 + k2w2)2 + (k2w1 − k1w2)2]

= c2f (w21 + w2

2).

Consequently, the amplitude of the wavelet transform becomes

|∇Wsfld(xρ, yρ)| =√c2f (w

21 + w2

2). (6.13)

In the final result of Eq. (6.13), the slope factors k1 and k2 disappear.That is, of course, the amplitude of the wavelet transform has the propertyof slope free. Consequently, the local maximum modulus of the wavelettransform also possesses this characteristic. Some graphical examples areillustrated in Fig. 6.5. Four curves, particularly, which are straight lines,with different orientations are analyzed. The original images are shownin Fig. 6.5(a). After applying the wavelet transforms to each one, thedistributions of their modulus of transformations are given in Fig. 6.5(b),

Page 284: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Characterization of Dirac-Structure Edges by Wavelet Transform 265

and the corresponding 3-D graphical displays are drawn in Fig. 6.5(d).From this figure, it is clear that the highest peaks of all distributions areremained in same values. In other words, the local maximum modulus ofthe wavelet transform of the curve is independent on the slope of that curve.Fig. 6.5(c) presents the maxima of wavelet modulus for these four curves.

(b) (c)(a)

(d)

Fig. 6.5 Graphical examples of the property of the slope-invariant.

6.2.2 Grey-Level Invariant

In this sub-section, the characterization of the grey-level invariant will beverified. That means, we will prove that the maximum modulus of thewavelet transforms with respect to the curves take place at the same points

Page 285: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

266 Characterization of Dirac-Edges with Quadratic Spline Wavelet Transform

when the images with different grey-levels will be processed.In fact, it is obviously to see that the wavelet transform ∇Wsf(x, y) is

a linear system. Then, if the input function f is scaled, the output is scaledthe same. That is,

|∇Ws(cf(x, y))| := |c||∇Wsf(x, y)|.

Therefore, the factor of the grey level c does not influence the location ofthe maximum modulus of the wavelet transform. This is the characteristicof grey-level invariant.

Some graphical examples are illustrated in Fig. 6.6. The left side ofFig. 6.6 contains two original images, which are circles. The grey-levels

Fig. 6.6 Graphical examples of the property of the grey-level-invariant.

of them differ from each other. The same wavelet transforms are appliedto these circles. The resulting maximum moduli of the wavelet transformswith respect to them are graphically displayed in the right side of Fig. 6.6.It is obvious that they are same, i.e. the double-line circles.

Page 286: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Characterization of Dirac-Structure Edges by Wavelet Transform 267

6.2.3 Width Light-Dependent

The property of the width light-dependent with respect to the local maxi-mum modulus of the wavelet transforms of curves will be presented in thissub-section. It will be proved that for various widths of curves, d’s, the lo-cation of maximum modulus of the wavelet transform varies lightly. Thatmeans parameter ρ retains the same value approximately when ρ > d.

Note that, the quadratic spline function φ(r) is compactly supported,moreover the support is very short, so that for the point t0, we have

w1 =∫ (t0−a)/s

(t0−b)/sdt

∫ (ρ+ d2 )/s

(ρ− d2 )/s

φ′(√t2 + λ2)

t√t2 + λ2

=∫ ∞

−∞dt

∫ (ρ+ d2 )/s

(ρ− d2 )/s

φ′(√t2 + λ2)

t√t2 + λ2

= 0. (6.14)

Substituting Eq. (6.14) into Eq. (6.13) yields

|∇Wsfld(xρ, yρ)| =√c2fw

22 = |cfw2|

= |cf |∣∣∣∣∣∫ ∞

−∞dt

∫ (ρ+ d2 )/s

(ρ− d2 )/s

φ′(√t2 + λ2)

λ√t2 + λ2

∣∣∣∣∣= 2|cf |

∣∣∣∣∣∣∫ ∞

0

dt

∫ (

√t2+(

ρ+d/2s )2

(

√t2+( ρ−d/2

s )2φ′(λ)dλ

∣∣∣∣∣∣ .Since φ′(λ) ≤ 0 (∀λ ≥ 0), we get

|∇Wsfld(xρ, yρ)| = −2|cf |∫ ∞

0

dt

∫ (

√t2+( ρ+d/2

s )2

(

√t2+( ρ−d/2

s )2φ′(λ)dλ

= −2|cf |∫ ∞

0

[φ(

√t2 + (

ρ+ d/2s

)2)

−φ(

√t2 + (

ρ− d/2s

)2)]dt.

To find the parameter ρ such that |∇Wsfld(xρ, yρ)| reaches the local max-imum, we consider the derivative on ρ:

Page 287: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

268 Characterization of Dirac-Edges with Quadratic Spline Wavelet Transform

d

dρ|∇Wsfld(xρ, yρ)| =

−2|cf |∫ ∞

0

[φ′(√

t2 + (ρ+ d/2

s)2)

(ρ+d/2s

)1s√

t2 +(ρ+d/2s

)2−

φ′(√

t2 + (ρ− d/2

s)2) (

ρ−d/2s

)1s√

t2 +(ρ−d/2s

)2]dt.

Let ddρ |∇Wsfld(xρ, yρ)| = 0, we get

(ρ+d

2)∫ ∞

0

φ′(√

t2 + (ρ+d/2s )2)

√t2 +

(ρ+d/2s

)2dt =

(ρ− d

2)∫ ∞

0

φ′(√

t2 + (ρ−d/2s )2)

√t2 +

(ρ−d/2s

)2dt. (6.15)

To facilitate solving parameter ρ, Eq. (6.15) can be rewritten by

G

(ρ+ d

2

s

)= G

(ρ− d

2

s

)(6.16)

according to

G(ξ) := ξ

∫ ∞

0

φ′(√t2 + ξ2)√t2 + ξ2

dt. (6.17)

Now, our question turns to find ρ, such that Eq. (6.16) will be held. Ingeneral, it is difficult and even impossible to solve ρ from Eq. (6.16) directly,for an arbitrary wavelet φ′, because of the complexity of (6.17). To simplifythe estimation of G(ξ) without losing its characterization for the Dirac-structure edges , we utilize the quadratic spline function (6.7). First of all,we calculate G(ξ), and the result is presented below:

Page 288: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Characterization of Dirac-Structure Edges by Wavelet Transform 269

(1). If ξ ≥ 1, it is easy to see that

G(ξ) = 0. (6.18)

(2). If 12 ≤ ξ < 1, G(ξ) is given by

G(ξ) = ξ

∫ √1−ξ2

0

φ′(√t2 + ξ2)√t2 + ξ2

dt

= −8ξ∫ √1−ξ2

0

(√t2 + ξ2 − 1)2√t2 + ξ2

dt

= −8ξ[−32

√1− ξ2 − 2 + ξ2

2log ξ +

2 + ξ2

2log(1 +

√1− ξ2)]

= −8ξ[−32

√1− ξ2 +

2 + ξ2

2log

1 +√

1− ξ2ξ

]. (6.19)

(3). If 0 ≤ ξ < 12 , we obtain

G(ξ) = ξ

∫ √ 14−ξ2

0

+∫ √1−ξ2

√14−ξ2

= 8ξ∫ √ 1

4−ξ2

0

3(t2 + ξ2)− 2√t2 + ξ2√

t2 + ξ2dt

−8ξ∫ √1−ξ2

√14−ξ2

(√t2 + ξ2 − 1)2√t2 + ξ2

dt

= 4ξ[−3√

1− 4ξ2 + 3√

1− ξ2 − 3ξ2 log ξ

+2 log1 +

√1− 4ξ2

2

+4ξ2 log1 +

√1− 4ξ2

2− 2 log(1 +

√1− ξ2)

−ξ2 log(1 +√

1− ξ2)]. (6.20)

The above mathematical formula are too complicated, so that it is dif-ficult to solve them. As an alternate, in this chapter, a graphic-solutionmethod will be developed.

The graphical description of G(ξ) on [0,∞) is illustrated in Fig. 6.7,based on Eqs. (6.18), (6.19) and (6.20). The value of the parameter ρ canbe solved from this figure approximately.

Page 289: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

270 Characterization of Dirac-Edges with Quadratic Spline Wavelet Transform

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1

−1.2

−1

−0.8

−0.6

−0.4

−0.2

0ξG( ) ξ

C

α β

Fig. 6.7 Using the graphical description of G(ξ) to find the value of the parameter ρapproximately.

By Fig. 6.7, it is easy to see that, for a constant C, 0 < C ≤ 1, thereexists a pair of numbers (α, β) satisfying 0 ≤ α < β ≤ 1, such that

β − α = C

G(α) = G(β).(6.21)

It is obvious that both α and β depend on only the constant C, that meansthey are functions on C. Therefore, α and β can be denoted as

α = α(C), β = β(C).

In the following, we will solve ρ satisfying Eq. (6.16). Comparing Eq. (6.16)with Eq. (6.21) yields

ρ+ d/2s

= β (6.22)

ρ− d/2s

= α. (6.23)

Adding Eq. (6.22) and Eq. (6.23), we obtain

ρ =s

2(α+ β). (6.24)

Page 290: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Characterization of Dirac-Structure Edges by Wavelet Transform 271

By subtracting Eq. (6.23) from Eq. (6.22), we have

β − α =d

s. (6.25)

Substituting Eq. (6.25) into Eq. (6.24) produces

ρ =s

2

[α(d

s) + β(

d

s)]

= ρ(s, d). (6.26)

Thus, ρ is dependent on s and d. That means ρ is a function on s and d.The relationship among ρ, s and d can be displayed graphically in Fig. 6.8.

2040

6080

100

50

100

150

2000

20

40

60

80

100

ρ

sd

Fig. 6.8 The graphical description of ρ = ρ(s, d).

From Fig. 6.8, it is easy to understand that the dependence of ρ on d

is very light under the condition of 0 < ds ≤ 1, i.e. s ≥ d > 0. The larger

the ratio of ds , the smaller the dependence of ρ on d is. When the scale s ofwavelet transform is large enough, the parameter ρ is independent on thewidth d of the curve image.

Fig. 6.9 displays the relationship between ρ and d exactly, when somespecific transform scales are given, for instance s = 4, 8, 12, 16.

Another way to view Eq. (6.26) and Fig. 6.8 can also be explained inFig. 6.10. From this figure, the following facts can be fund: For fixed d’s,

Page 291: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

272 Characterization of Dirac-Edges with Quadratic Spline Wavelet Transform

0 2 4 6 8 10 12 14 16 18 201

2

3

4

5

6

7

8

9

10

d

ρ

s=4

s=8

s=12

s=16

s=20

Fig. 6.9 The relationship between ρ and d, when some specific scales are given (s =4, 8, 12, 16).

the dependence of ρ on s is closed to the linear function, when the scale sof wavelet transform is large enough. That means the larger the scale s,the closer to the straight line the parameter ρ is. Therefor, the relationshipbetween ρ and d can be represented by a straight line, when the scale sof the wavelet transform has sufficient value. The equation of this straightline can approximately be fund in Fig. 6.7, i.e. the minimum of G(ξ). Thatis ρ ≈ 0.318s.

Some graphical examples are illustrated in Fig. 6.11. The left side ofFig. 6.11 contains two original images, which are circles. The width ofthem differ from each other. The same wavelet transforms are applied tothese circles. The resulting maximum moduli of the wavelet transformswith respect to them are graphically displayed in the right side of Fig. 6.11.It is obvious that the same images, i.e. the double-line circles, are obtained.

6.3 Experiments

Based on the theoretical analyses in the previous sections, an algorithm todetect the Dirac-structure edges such as curves from a multi-structure-edgeimage is designed as follows.

Algorithm 6.1 For a multi-structure-edge image containing the Dirac-

Page 292: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Experiments 273

0 2 4 6 8 10 12 14 16 18 200

1

2

3

4

5

6

7

d=1

d=5

d=4d=3

d=2

s

ρ

Fig. 6.10 The relationship between ρ and s, when some specific widths are given (d =1 − 5).

structure edges, such as curves, and the wavelet transform scale s > 0,the edges can be detected by the following steps:

step 1 Calculating all the wavelet transforms W 1s f(x, y), W 2

s f(x, y) un-der the quadratic spline wavelet .

step 2 Calculating the local maxima flocmax of |∇Wsf(x, y)| and the gra-dient direction fgradient.

step 3 For each point (x, y) with local maximum, searching the pointwhose distance from (x, y) to it is 0.6424s along the gradient direc-tion. If it is still a point with local maximum, the center point isdetected.

step 4 The curves are formed by all the points detected by the above steps.

In Fig. 6.12, four circles with various gray-levels and widths are testedusing this method. The original images are illustrated on the left columnof Fig. 6.12. After applying the steps 1 and 2 of the proposed wavelettransform algorithm to these circles, the local maximum modulus of thewavelet transform with respect to them can be computed and the resultsare given on the middle column in Fig. 6.12. Finally, the central lines ofthese circles are extracted using the steps 3 and 4 of the above algorithm,and presented on the right column in Fig. 6.12.

Page 293: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

274 Characterization of Dirac-Edges with Quadratic Spline Wavelet Transform

Fig. 6.11 Graphical examples of the property of the width light-invariant.

Let us look at Fig. 6.13. The particular task is that we are required toidentify different structures of edges, thereafter, detect the Dirac-structureedges such as drawing lines and texts in Fig. 6.13(a) and eliminate the step-structure edges such as the contour of the aircraft in Fig. 6.13(a). Unfortu-nately, the algorithm based on the method proposed in [Mallat and Hwang,1992; Mallat and Zhong, 1992] has detected all edges without identifyingdifferent structures of edges. Thus, the resulting image contains the step-structure edges such as the contours which are required to be deleted fromthe image. The method developed in this chapter possesses three significantcharacteristics, namely: (1) slope invariant: the local maximum modulus ofthe wavelet transform of a Dirac-structure edge is independent on the slopeof the edge; (2) grey-level invariant: the local maximum modulus of thewavelet transform with respect to a Dirac-structure edge takes place at thesame points when the images with different grey-levels will be processed;(3) width light-dependent: for various widths of the Dirac-structure edgeimages, the location of maximum modulus of the wavelet transform varieslightly under the certain circumscription. According to these characteris-tics and our early work [Tang et al., 1998c], we can recognize three basicstructures of edges, and further, extract the Dirac-structure ones. Afterapplying the above algorithm, new result can be found in Fig. 6.13(b). It

Page 294: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Experiments 275

Fig. 6.12 Detection of the central lines with various gray-levels and widths by proposedwavelet transform algorithm, (the scale of the wavelet transform: s=6). Left column:original images, i.e. four circles with various gray-levels and widths. Middle column: thelocal maximum modulus of the wavelet transform. Right column: the central lines ofthe circles are extracted.

extracts all lines and texts, and removes the contour of the aircraft.Now, turn to another example shown in Fig. 6.14. The original image

is illustrated in Fig. 6.14(a) which has two classes of structures of edges:(1) Dirac-structure edges, i.e. three circles with different gray-levels andwidths; (2) step-structure edge, that is a planner object, square, whichhas a contour. Upon utilizing the method proposed in this chapter, wecan produce a new image as shown in Fig. 6.14(b). It contains only threecircles which belong to the Dirac-structure edges, and the step-structureedge, contour of the square, is removed.

Page 295: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

276 Characterization of Dirac-Edges with Quadratic Spline Wavelet Transform

(a) (b)

Fig. 6.13 Result using the method proposed in this chapter. (a) Original image: twoclasses of edges are embedded in this image, i.e. a contour of the aircraft which belongsto the step-structure edge, and some lines and texts which belong to the Dirac-structureedges. (b) The result which is obtained from the new algorithm, all lines and texts areextracted, and the contour of the aircraft is removed.

(a) (b)

Fig. 6.14 Another result using the method proposed in this chapter (a) Original imagewhich has two classes of structures of edges, i.e. Dirac-structure edges (three circleswith different gray-levels and widths), and step-structure edge (a planner object, squarewhich has a contour). (b) Resulting image which has only three circles, and the contourof the square is removed.

The final experiment is presented in Fig. 6.15. Original image is theimage Lena plus several characters as illustrated in Fig. 6.15(a). It isa multi-structure-edge one, where several characters are embedded in it.Upon performing the steps 1 and 2 of the proposed wavelet transform al-gorithm to it, its local maximum modulus of the wavelet transform canbe computed and the result is given in Fig. 6.15(b). Next, the charac-

Page 296: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Experiments 277

ters which are embedded in the image are extracted by the steps 3 and 4of the above algorithm, and presented in Fig. 6.15(c). Finally, the noiseis removed and a fine image which contains only the characters “lena” isobtained and displays in Fig. 6.15(d).

c

a

d

b

Fig. 6.15 Lines extracted from image of Lena by proposed wavelet transform algorithm(the scale of the wavelet transform: s=6). (a) Original image which is the image Lenawith several characters. (b) Local maximum modulus of the wavelet transform of imageof Lena. (c) The characters which are embedded in Lena image are extracted.

Page 297: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

This page intentionally left blankThis page intentionally left blank

Page 298: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Chapter 7

Construction of New WaveletFunction and Application to Curve

Analysis

In Chapter 6, a very important characterization of the Dirac-structure edgesby wavelet transform was provided. Three significant characteristics ofthe local maximum modulus of the wavelet transform with respect to theDirac-structure edges were presented, namely: (1) slope invariant: the localmaximum modulus of the wavelet transform of a Dirac-structure edge is in-dependent on the slope of the edge. (2) grey-level invariant: the local max-imum modulus of the wavelet transform with respect to a Dirac-structureedge takes place at the same points when the images with different grey-levels are to be processed. (3) width light-dependent: for various widths ofthe Dirac-structure edge images, the location of maximum modulus of thewavelet transform varies slightly when the scale s of the wavelet transformis larger than the width d of the Dirac-structure edge images. Based onthe characteristics, an algorithm to detect the Dirac-structure edges froman image has been developed. An example of applying this algorithm todetect the Dirac-structure edge can be found in Fig. 7.1. The original imageshown in Fig. 7.1(a) is a multi-structure-edge one, which contains an imageof the Chinese traditional word ‘book’ where several drawing curves areembedded in it. Upon performing the algorithm proposed in Chapter 6, itslocal maximum modulus of the wavelet transform has been computed, andis shown in Fig. 7.1(b), and the result is presented in Fig. 7.1(c). Finally,the noise is removed and a fine image which contains only the drawingcurves is obtained and displayed in Fig. 7.1(d).

However, note the third property in Chapter 6, it says “width light-dependent”, does not say “width invariant”. This means that for variouswidths of the Dirac-structure edge images, the location of maximum mod-

279

Page 299: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

280 Construction of New Wavelet Function and Application to Curve Analysis

(b)

(c)(d)

(a)

Fig. 7.1 Lines extracted from an image by proposed algorithm in Chapter 6: (a) Orig-inal image; (b) Local maximum modulus of the wavelet transform of the original image;(c) The drawing Lines extracted by the algorithm; (d) The resulting image.

ulus of the wavelet transform may change (these changes are small). Whatwe want is that the location of maximum modulus does not change, i.e.the location of maximum modulus has the property of width invariant. Letus look at Fig. 7.2. The first row of Fig. 7.2 has three circles. The leftimage is the original one which contains a circle with various width. Themiddle one is the location of maximum modulus of the wavelet transformwith scale s = 6, which depends on the width of the circle in some way.Finally, by utilizing the algorithm proposed in Chapter 6, the skeleton ofthe circle is extracted and displayed on the right of Fig. 7.2. We can find

Page 300: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Construction of New Wavelet Function and Application to Curve Analysis 281

that the skeleton of the circle is broken. The second row of Fig. 7.2 hastrees, where the sizes of the branches vary, some are thick and some arethin. The left image is the original one. The middle one illustrates thelocation of maximum modulus of the wavelet transform with scale s = 6.It is clear that the location of maximum modulus of the different brancheshas slight changes. The right of Fig. 7.2 is the skeleton extracted utilizingthe algorithm proposed in Chapter 6. It is easy to see that some branchesof the tree are lost.

Fig. 7.2 Left: the original images; Middle: the location of maximum modulus of thewavelet transform with s = 6; Right: the skeleton images extracted by the algorithm ofChapter 6.

To overcome such a defect, a natural question is whether there exists amore suitable wavelet function such that the location of maximum modu-lus of the wavelet transform of a curve is width-invariant as well as slopeinvariant and grey-invariant.

In this chapter, we will present a development [Yang et al., 2003a], wherea novel wavelet is constructed, so that the above “width light-dependent”properties can be improved to “width invariant” without losing the “slopeinvariant” and “grey-level invariant”. Due to this improvement, the detec-tion of Dirac-structure edge is more accurate.

Page 301: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

282 Construction of New Wavelet Function and Application to Curve Analysis

7.1 Construction of New Wavelet Function Tang-YangWavelet

The scale wavelet transform described in Eq. (6.2) is a filter, and sinceψ ∈ L2(R2), its Fourier transform can be defined by

ψ(ξ, η) :=∫R

∫R

ψ(x, y)e−i(ξx+ηy)dxdy

which satisfies the condition of ψ ∈ L2(R2). Thus, both functions ψ and ψdecrease at infinity. Usually, we choose ψ ∈ L2(R2) such that both ψ andψ decrease at infinity with exponents at least. We know that ψ(0, 0) = 0from Eq. (6.1), which implies that the scale wavelet transform Wsf(x, y)corresponds to a band-pass filter essentially. Moreover, since ψ and ψ

decrease at infinity, Wsf(x, y) characterizes the local properties of f both onthe time-domain and frequency domain. In fact, two points are considered,namely:

• On one hand, due to the fast decrease of ψ at infinity, formula(6.2) characterizes the local property of f around point (x, y). Tounderstand this, one can consider that ψ vanishes outside [−1, 1].In this case, we have

ψ(x− us

,y − vs

) = 0

for every (u, v) satisfying:

−1 ≤ x− us≤ 1 or − 1 ≤ y − v

s≤ 1,

i.e.

x− s ≤ u ≤ x+ s or y − s ≤ v ≤ y + s.

This concludes that

Wsf(x, y) =∫R

∫R

f(u, v)1s2ψ(x− us

,y − vs

)dudv

=∫ x+s

x−s

∫ y+s

y−sf(u, v)

1s2ψ(x− us

,y − vs

)dudv,

which tells us that Wsf(x, y) characterizes the local properties of fon the interval [x− s, x+ s]× [y− s, y+ s] centering at (x, y). Thesmaller s is, the narrower the interval, i.e. the time-window, is.

Page 302: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Construction of New Wavelet Function Tang-Yang Wavelet 283

• On the other hand, based on the basic properties of Fourier trans-form, we can obtain

(Wsf)(x, y) =(

12π

)2 ∫R

∫R

(Wsf ) (ξ, η)ei(ξx+ηy)dξdη

=(

12π

)2 ∫R

∫R

f(ξ, η)(ψs )(ξ, η)ei(ξx+ηy)dξdη

=(

12π

)2 ∫R

∫R

f(ξ, η)ψ(sξ, sη)ei(ξx+ηy)dξdη.

Since ψ(sξ, sη)ei(ξx+ηy) decreases as ψ(sξ, sη) does at infinity, thus(Wsf)(x, y) characterizes the local property of f . The position ofthe locality depends on scale s and function ψ. The larger s is, thenarrower the frequency-window is. A detail analysis can be donesimilarly to the above.

Theoretically, Eq. (6.1), i.e. ψ(0, 0) = 0, implies that ψ(x, y) is a band-pass filter, but a high-pass one because of the decrease of its Fourier trans-form at infinity. It is easy to see that the partial derivatives of a low-passfunction can become the candidates of the wavelet functions. Here, weconsider such kind of wavelets, i.e.,

ψ1(x, y) :=∂

∂xθ(x, y) , ψ2(x, y) :=

∂yθ(x, y)

where θ(x, y) denotes a real function satisfying:

• θ(x, y) fast decreases at infinity;• θ(x, y) is an even function on both x and y.• θ(0, 0) = 1.

For wavelet ψ1(x, y) defined above, its scale wavelet transform is

W 1s f(x, y) = (f ∗ ψ1

s)(x, y)

= (f ∗ s ∂∂xθs)(x, y)

= s∂

∂x(f ∗ θs)(x, y)

where θs(x, y) := 1s2 θ(

xs ,

ys ).

This formula tells us that W 1s f(x, y) is essentially the derivative of the

smoothness function along the horizontal axis and then the local maxima

Page 303: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

284 Construction of New Wavelet Function and Application to Curve Analysis

of the derivative function correspond to the points of the smoothness imagewith sharp variation along the horizontal axis. It is equivalent to the clas-sical multi-scale edge detection [Canny, 1986; Marr and Hildreth, 1980], ifθ(x, y) is set to be a Gaussian , which is defined by

Gσ(x, y) =1

2πσ2exp(−x

2 + y2

2σ2). (7.1)

That is why θ(x, y) is assumed to satisfy θ(0, 0) = 1.A similar explanation for wavelet ψ2(x, y) defined above can be made.

However, the partial derivative is along the vertical direction instead of thehorizontal one.

Gaussian function has been employing in image processing. It possessessome excellent properties, such as, the locality in both the time domain andfrequency domain, the same widths in both the time-window and frequency-window, and so on. All these properties make it applied extensively anddeeply in the area of the filtering, and it already almost becomes the bestcandidate of low-pass filter in practice. Unfortunately, Gaussian functionis not always the best one for all applications. In fact, we have shown thatit is not the best candidate for characterizing a Dirac-structure edge [Tanget al., 2000]. Even the quadratic spline wavelet is better than it, although,the quadratic spline wavelet is still not a perfect one for such applications.In [Tang et al., 2000] it has been proved that the location of maximummodulus of the wavelet transform with respect to a Dirac-structure edge isnot width invariant. It still depends on the width of the edge even though itdepends lightly. To avoid such dissatisfaction, a new wavelet called Tang-Yang wavelet is constructed, and its definition is described below [Yanget al., 2003a].

Let

ψ1(x) = − 2

π (−8x ln 1+√

1−16x2

4x + 12x

√1− 16x2)

ψ2(x) = − 2π (8x ln 3+

√9−16x2

4x − 32x

√9− 16x2)

ψ3(x) = − 2π (−4x ln 1+

√1−x2

x + 4x

√1− x2)

Page 304: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Characterization of Curves through New Wavelet Transform 285

Then, the 1-D wavelet ψ(x) is an odd function defined on (0,∞) by

ψ(x) :=

ψ1(x) + ψ2(x) + ψ3(x) x ∈ (0, 14 )

ψ2(x) + ψ3(x) x ∈ [ 14 ,34 )

ψ3(x) x ∈ [ 34 , 1)

0 x ∈ [1,∞)

(7.2)

Let φ(x) :=∫ x0ψ(x)dx. Then φ(x) is an even function , compactly sup-

ported on [-1, 1], and φ′(x) = ψ(x). Fig. 7.3 displays functions ψ(x) andφ(x) graphically.

The smoothness function θ(x, y) is then defined by

θ(x, y) := φ(√x2 + y2),

which is graphically shown in Fig. 7.4, and the 2-D wavelets are defined by ψ1(x, y) := ∂∂xθ(x, y) = φ′(

√x2 + y2) x√

x2+y2

ψ2(x, y) := ∂∂y θ(x, y) = φ′(

√x2 + y2) y√

x2+y2

(7.3)

and are illustrated in Fig. 7.5.The gradient direction and the amplitude of the wavelet transform are

denoted respectively by

∇Wsf(x, y) :=(W 1s f(x, y)

W 2s f(x, y)

), (7.4)

and

|∇Wsf(x, y)| :=√|W 1

s f(x, y)|2 + |W 2s f(x, y)|2. (7.5)

By locating the local maxima of |∇Wsf(x, y)| we can detect the edgesof the images.

7.2 Characterization of Curves through New WaveletTransform

Three significant characteristics of the local maximum modulus of thewavelet transform with respect to the Dirac-structure edges in images willbe held, namely:

Page 305: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

286 Construction of New Wavelet Function and Application to Curve Analysis

−1.5 −1 −0.5 0 0.5 1 1.5−1

−0.8

−0.6

−0.4

−0.2

0

0.2

0.4

0.6

0.8

1

(a)

−1.5 −1 −0.5 0 0.5 1 1.50

0.05

0.1

0.15

0.2

0.25

0.3

0.35

0.4

0.45

(b)

Fig. 7.3 The graphical descriptions of ψ(x) and φ(x): (a) the graphical descriptions offunction ψ(x); (b) its primitive function φ(x).

• Grey-level invariant: the local maximum modulus of the wavelettransform with respect to a Dirac-structure edge takes place at thesame points when the images with different grey-levels are to beprocessed.

Page 306: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Characterization of Curves through New Wavelet Transform 287

−1−0.5

00.5

1

−1

−0.5

0

0.5

1

0

0.1

0.2

0.3

0.4

0.5

Fig. 7.4 The graphical descriptions of function θ(u, v).

• Slope invariant: the local maximum modulus of the wavelet trans-form of a Dirac-structure edge is independent on the slope of theedge.• Width invariant: for various widths of the Dirac-structure edges in

an image, the location of maximum modulus of the wavelet trans-form does not vary under certain circumstance.

The discussion of the Grey-level invariant and slope invariant is thesame as that in Chapter 6. In the following we present the characteristicof the width invariant.

In this section. It will be proved that for various widths of curves, d’s,the location of maximum modulus of the wavelet transform does not vary.It means that parameter ρ retains the same value when ρ ≥ d and thedistance from the central line is just ρ = s

2 .Now that φ(r) is compactly supported and the support is very short,

for the point t0 far away from a and b, we have

w1 =∫ (t0−a)/s

(t0−b)/sdt

∫ (ρ+ d2 )/s

(ρ− d2 )/s

φ′(√t2 + λ2)

t√t2 + λ2

=∫ ∞

−∞dt

∫ (ρ+ d2 )/s

(ρ− d2 )/s

φ′(√t2 + λ2)

t√t2 + λ2

dλ = 0,

Page 307: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

288 Construction of New Wavelet Function and Application to Curve Analysis

−1−0.5

00.5

1

−1

−0.5

0

0.5

1

−0.4

−0.2

0

0.2

0.4

0.6

(a)

−1−0.5

00.5

1−1

−0.5

0

0.5

1−0.4

−0.2

0

0.2

0.4

0.6

(b)

Fig. 7.5 The graphical descriptions of 2-D wavelet functions: (a) Function ψ1(x, y); (b)Function ψ2(x, y).

which concludes that

|∇Wsfld(xρ, yρ)|=√c2fw

22 = |cfw2|

Page 308: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Characterization of Curves through New Wavelet Transform 289

= |cf |∣∣∣∣∣∫ ∞

−∞dt

∫ (ρ+ d2 )/s

(ρ− d2 )/s

φ′(√t2 + λ2)

λ√t2 + λ2

∣∣∣∣∣= 2|cf |

∣∣∣∣∣∣∫ ∞

0

dt

∫ (

√t2+( ρ+d/2

s )2

(

√t2+( ρ−d/2

s )2φ′(λ)dλ

∣∣∣∣∣∣= 2

∣∣∣∣∣cf∫ ∞

0

[φ(

√t2 + (

ρ+ d/2s

)2)− φ(

√t2 + (

ρ− d/2s

)2)]dt

∣∣∣∣∣ .To find ρ such that |∇Wsfld(xρ, yρ)| reaches the local maximum, we

consider its derivative on ρ. We denote

G(x) := x

∫ ∞

0

φ′(√t2 + x2)√t2 + x2

dt = x

∫ ∞

0

ψ(√t2 + x2)√t2 + x2

dt, (7.6)

then have

∂x

∫ ∞

0

φ(√t2 + x2)dt = G(x).

If G(x) ≤ 0, we have

|∇Wsfld(xρ, yρ)| = −2|cf |∫ ∞

0

[φ(

√t2 + (

ρ+ d/2s

)2)

− φ(

√t2 + (

ρ− d/2s

)2)]dt. (7.7)

Therefore

d

dρ|∇Wsfld(xρ, yρ)|

= −2|cf |∫ ∞

0

[φ′(√

t2 + (ρ+ d/2

s)2) (

ρ+d/2s

)1s√

t2 +(ρ+d/2s

)2

− φ′(√

t2 + (ρ− d/2

s)2) (

ρ−d/2s

)1s√

t2 +(ρ−d/2s

)2]dt

= −2|cf |1s

[G

s+

d

2s

)−G

s− d

2s

)].

Page 309: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

290 Construction of New Wavelet Function and Application to Curve Analysis

To guarantee that |∇Wsfld(xρ, yρ)| reaches the local maximum, we letddρ |∇Wsfld(xρ, yρ)| = 0, and we can get

G

s+

d

2s

)= G

s− d

2s

). (7.8)

By Eq. (7.7), it is easily seen that ρ must satisfy the following condition:

∣∣∣∣ρs − d

2s

∣∣∣∣ ≤ 1,∣∣∣∣ρs +

d

2s

∣∣∣∣ ≤ 1, (7.9)

so that |∇Wsfld(xρ, yρ)| reaches the local maximum.Hence, our question turns to solve ρ satisfying Eqs. (7.8) and (7.9). To

do this, we can evaluate G(x) first. For ψ defined by Eq. (8.1), it is clearthat

(1). For x ∈ (0, 14 ),

G(x) = x

∫ 14

x

ψ1(t) + ψ2(t) + ψ3(t)√t2 − x2

dt

+x∫ 3

4

14

ψ2(t) + ψ3(t)√t2 − x2

dt+ x

∫ 1

34

ψ3(t)√t2 − x2

dt

= x

∫ 14

x

ψ1(t)√t2 − x2

dt+ x

∫ 34

x

ψ2(t)√t2 − x2

dt+ x

∫ 1

x

ψ3(t)√t2 − x2

dt;

(2). For x ∈ [14 ,34 ),

G(x) = x

∫ 34

x

ψ2(t) + ψ3(t)√t2 − x2

dt+ x

∫ 1

34

ψ3(t)√t2 − x2

dt

= x

∫ 34

x

ψ2(t)√t2 − x2

dt+ x

∫ 1

x

ψ3(t)√t2 − x2

dt;

(3). For x ∈ [34 , 1),

G(x) = x

∫ 1

x

ψ3(t)√t2 − x2

dt.

Page 310: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Characterization of Curves through New Wavelet Transform 291

Thus, our problem now turns to evaluate:

J1(x) := x

14∫x

ψ1(t)√t2−x2 dt,

J2(x) := x

34∫x

ψ2(t)√t2−x2 dt,

J3(x) := x1∫x

ψ3(t)√t2−x2 dt.

According to the definition of ψ described by Eq. (8.1), we have

−π2J1(x) = x

∫ 14

x

1√t2 − x2

(−8t ln

1 +√

1− 16t2

4t+√

1− 16t2

2t

)dt

= −4x∫ 1

4

x

1√t2 − x2

ln1 +√

1− 16t2

4tdt2

+x∫ 1

4

x

√1− 16t2

4t2√t2 − x2

dt2

= −8x∫ 1

4

x

ln1 +√

1− 16t2

4td√t2 − x2 +

x

4

∫ 116

x2

√1− 16t

t√t− x2

dt

= −8x

√t2 − x2 ln1 +√

1− 16t2

4t

∣∣∣∣∣14

t=x

+∫ 1

4

x

√t2 − x2

t√

1− 16t2dt

+x

4

∫ 116

x2

√1− 16t

t√t− x2

dt

= −4x∫ 1

4

x

√t2 − x2

t2√

1− 16t2dt2 +

x

4

∫ 116

x2

√1− 16t

t√t− x2

dt

= −4x∫ 1

16

x2

√t− x2

t√

1− 16tdt+

x

4

∫ 116

x2

√1− 16t

t√t− x2

dt

= −x4

∫ 116

x2

1t

(16√t− x2

√1− 16t

−√

1− 16t√t− x2

)dt.

Hence

J1(x) =x

∫ 116

x2

1t

(16√t− x2

√1− 16t

−√

1− 16t√t− x2

)dt.

Page 311: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

292 Construction of New Wavelet Function and Application to Curve Analysis

J2(x) and J3(x) can be calculated similarly. We omit the details here, andgive the results as follows:

J2(x) = −3x2π

∫ 916

x2

1t

(16√t− x2

√9− 16t

−√

9− 16t√t− x2

)dt,

J3(x) =x

π

∫ 1

x2

1t

(16√t− x2

√16− 16t

−√

16− 16t√t− x2

)dt.

For k = 1, 3, 4, we have∫ k216

x2

1t

(16√t− x2

√k2 − 16t

−√k2 − 16t√t− x2

)dt

=∫ k2

16

x2

32t− 16x2 − k2

t√−16t2 + (16x2 + k2)t− k2x2

dt

= 32∫ k2

16

x2

dt√−16t2 + (16x2 + k2)t− k2x2

− (16x2 + k2)∫ k2

16

x2

dt

t√−16t2 + (16x2 + k2)t− k2x2

= 8 arcsin32t− (16x2 + k2)

k2 − 16x2

∣∣∣∣k216

t=x2

− 16x2 + k2

kxarcsin

(16x2 + k2)t− 2k2x2

t(k2 − 16x2)

∣∣∣∣ k216

t=x2

= π(8 − 16x2 + k2

kx).

Hence

J1(x) =x

2ππ(8 − 16x2 + 1

x) = −8x2 + 4x− 1

2;

J2(x) = −3x2ππ(8− 16x2 + 9

3x) = 8x2 − 12x+

92;

J3(x) =x

ππ(8 − 16x2 + 16

4x) = −4(1− x)2.

Consequently,

Page 312: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Characterization of Curves through New Wavelet Transform 293

(1). for x ∈ (0, 14 ),

G(x) = J1(x) + J2(x) + J3(x) = −4x2;

(2). for x ∈ [14 ,34 ),

G(x) = J2(x) + J3(x) = 4x2 − 4x+12;

(3). for x ∈ [34 , 1),

G(x) = J3(x) = −4(x− 1)2.

i.e.,

G(x) =

−4x2, x ∈ (0, 1

4 ),4x2 − 4x+ 1

2 , x ∈ [14 ,34 ),

−4(x− 1)2, x ∈ [ 34 , 1),0, x = 0 or x ≥ 1,−G(−x), x < 0.

It is clear that G(x) ≤ 0 and is symmetric about x = 12 , therefore,

Eqs. (7.8) and (7.9) are equivalent to the followings:0 ≤ ρ

s − d2s ≤ ρ

s + d2s ≤ 1

12 −

(ρs − d

2s

)=(ρs + d

2s

)− 12

or−1 ≤ ρ

s − d2s ≤ ρ

s + d2s ≤ 0

− 12 −

(ρs − d

2s

)=(ρs + d

2s

)+ 1

2

,

i.e. 0 ≤ ρ− d

2 ≤ ρ+ d2 ≤ s

ρ = s2

or−s ≤ ρ− d

2 ≤ ρ+ d2 ≤ 0

ρ = − s2

,

i.e. s ≥ dρ = s

2

ors ≥ dρ = − s

2

.

Hence, Eqs. (7.8) and (7.9) are solvable if and only if s ≥ d. There are twosolutions:

ρ1 = −s2, ρ2 =

s

2.

These two solutions realize that the local maxima of |∇Wsfld(xρ, yρ)| arriveat both sides of the central line l of ld and the distance from l is s

2 , whichis independent on the width d.

Page 313: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

294 Construction of New Wavelet Function and Application to Curve Analysis

In summary, The above three invariance properties can be rewritten asthe following theorem:

Theorem 7.1 Let ld be a Dirac-structure edge with width d and l be itscentral line. The local maxima modulus of the wavelet transform corre-sponding to the wavelets of Eq. (8.2) forms two new lines which are locatedsymmetrically on both sides of the central line, and have the same directionwith it. If scale s ≥ d, then the distance between the two new ones equalsto s.

This theorem describes the width invariant property, which is impor-tant. It improves our former results in Chapter 6 and [Tang et al., 2000].A couple of graphical examples are shown in Fig. 7.6.

Such a invariance property can be illustrated in Figs. 7.7 and 7.8 clearly.The graph in Fig. 7.7(a) displays function G(α) defined by Eq. (7.6). Thegraph in Fig. 7.7(b) indicates the positions of local maximum modulusby the wavelets defined by Eq. (8.1), where, the three horizontal straightsegments correspond to the widths of three curves. Point 0 at the horizontalaxis corresponds to the center of the curves. The vertical axis correspondsto the scale s of the wavelet transform. The slant straight lines correspondto the positions of the local maximum moduli of the wavelet transforms.For each scale s, the local maximum moduli of the wavelet transforms withrespect to the curves of different widths are located at the same positions.

To be more clear, we look at Fig. 7.8. There are three curves with thedifferent widths of d = 1, d = 2 and d = 3, as shown in Figs. 7.8(a), (b) and(c). The three horizontal straight segments in Fig. 7.8(d) correspond tothese three curves. This width invariance can guarantee that for each scales, the local maximum moduli of the wavelet transforms with respect to thecurves of different widths are located at the same positions. For example,when we apply the wavelet transform with scale s = 8 to these three curves,the locations of local maximum moduli of the wavelet transform for threecurves, which have different widths of d = 1, 2 and 3, are the same. Theyare located on the points −4 and 4, and denoted by p1 and p2 respectivelyin Fig. 7.8(d).

Page 314: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Comparison with Other Wavelets 295

0

10

20

30

40

50

60 0

10

20

30

40

50

60

0

100

200

0

10

20

30

40

50

60

0

10

20

30

40

50

60

0

100

200

Fig. 7.6 Modulus of wavelet transforms corresponding a segment of straight line and acurve.

7.3 Comparison with Other Wavelets

In this section, we will compare our new wavelet with two other kinds ofwavelets, namely:

• Gaussian wavelets: they are derived from the smoothness functionsθ(x), which are Gaussian function as Eq. (7.1);• the quadratic spline wavelets [Tang et al., 2000].

Page 315: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

296 Construction of New Wavelet Function and Application to Curve Analysis

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1−0.5

−0.45

−0.4

−0.35

−0.3

−0.25

−0.2

−0.15

−0.1

−0.05

0

G

(a)

−8 −6 −4 −2 0 2 4 6 80

2

4

6

8

10

12

14

scal

e

(b)

Fig. 7.7 (a) function G(α) defined by Eq. (7.6); (b) positions of local maximum modulusby the wavelets defined by Eq. (8.1).

7.3.1 Comparison with Gaussian Wavelets

For the first case, θ(x) is a Gaussian function , we let σ := 1/4 for simplicity.Obviously, its derivative is a wavelet which is called a Gaussian wavelet asshown in Fig. 7.9(a). A comparison between the new wavelet defined byEq. (8.1) and Gaussian wavelet will be described below.

Let φ(x) in Eq. (7.6) be the Gaussian function of σ := 1/4 and ψ(x) be

Page 316: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Comparison with Other Wavelets 297

−8 −6 −4 −2 0 2 4 6 80

2

4

6

8

10

12

14

scale

d=1

d=3

d=2

2p

1p d=1

d=3d=2

(d)(c)

(b)(a)

Fig. 7.8 Three curves with different widths of (a) d = 1, (b) d = 2, (c) d = 3, and (d)the positions of local maximum modulus by the wavelets defined by Eq. (8.1).

its derivative, i.e.,

φ(x) =4√2πe−8x2

, ψ(x) = − 64√2πxe−8x2

.

Then the function G(x) defined by (7.6) can be calculated as follows:

G(x) := x

∫ ∞

0

ψ(√t2 + x2)√t2 + x2

dt

= − 64√2πx

∫ ∞

0

e−8(x2+t2)dt

Page 317: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

298 Construction of New Wavelet Function and Application to Curve Analysis

−4 −3 −2 −1 0 1 2 3 4−0.8

−0.6

−0.4

−0.2

0

0.2

0.4

0.6

0.8

(a)

−1 −0.8 −0.6 −0.4 −0.2 0 0.2 0.4 0.6 0.8 1−3

−2

−1

0

1

2

3

(b)

Fig. 7.9 (a) Gaussian wavelet; (b) quadratic spline wavelet.

= (∫ ∞

0

e−8t2dt)ψ(x).

Hence, Eq. (7.8) is equivalent to

ψ

s+

d

2s

)= ψ

s− d

2s

), (7.10)

i.e.,(ρ

s+

d

2s

)exp

[−8

s+

d

2s

)2]

=(ρ

s− d

2s

)exp

[−8

s− d

2s

)2].

Page 318: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Comparison with Other Wavelets 299

Although this equation can not be solved analytically, a numerical solutioncan be obtained. According to Fig. 7.9 (left) which describes function ψ(x),for a constant C: 0 < C ≤ 1, there exists a pair of numbers (α, β) satisfying0 ≤ α < β ≤ 1, such that

β − α = C

ψ(α) = ψ(β). (7.11)

It is obvious that both α and β depend on only the constant C, whichmeans that they are functions on C. Therefore, α and β can be denoted by

α = α(C), β = β(C). (7.12)

In the following, we will solve ρ to satisfy Eq. (7.10). Comparing Eq. (7.10)and Eq. (7.11) yields

ρ

s+

d

2s= β,

ρ

s− d

2s= α. (7.13)

Therefore, we obtain

ρ =s

2(α+ β), C = β − α =

d

s.

By Eq. (7.12), we can deduce that

ρ =s

2(α+ β) =

s

2

(α(d

s) + β(

d

s)).

Then, for a fixed d, parameter ρ is a function of s. Fig. 7.10(a) showsfunction G(α) with respect to the Gaussian wavelet, and Fig. 7.10(b) il-lustrates the positions of local maximum modulus by Gaussian wavelet ford = 1, 2, 3 respectively. Fig. 7.10(e) shows function G(α) with respect tothe new wavelet, and Fig. 7.10(f) illustrates the positions of local maximummodulus by the new wavelet for d = 1, 2, 3 respectively. The readers wouldbe suggested to compare Figs. 7.10(b) and 7.10(f). It is obvious that thelocations of the local maximum of the wavelet transform with respect toGaussian wavelet depend nonlinearly on the curve width d heavily, whilethe locations of the local maximum of the wavelet transform using the newwavelet are fixed.

Page 319: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

300 Construction of New Wavelet Function and Application to Curve Analysis

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1−4

−3.5

−3

−2.5

−2

−1.5

−1

−0.5

0

Gauss

(a)−4 −3 −2 −1 0 1 2 3 40

2

4

6

8

10

12

14

scal

e

(b)

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1−3

−2.5

−2

−1.5

−1

−0.5

0

spline

(c)−5 −4 −3 −2 −1 0 1 2 3 4 50

2

4

6

8

10

12

14

scal

e

(d)

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1−0.5

−0.45

−0.4

−0.35

−0.3

−0.25

−0.2

−0.15

−0.1

−0.05

0

G

(e)−8 −6 −4 −2 0 2 4 6 80

2

4

6

8

10

12

14

scal

e

(f)

Fig. 7.10 Left, i.e. (a), (c) and (e): The functions G(α) with respect to the Gaussianwavelet, quadratic spline wavelet and the new wavelet defined by Eq. (8.1) respectively.Right, i.e. (b), (d) and (f): The positions of local maximum moduli by Gaussian wavelet,quadratic spline wavelet and the new wavelet defined by Eq. (8.1).

7.3.2 Comparison with Quadratic Spline Wavelets

θ(x) is set to be the quadratic spline as discussed in Chapter 6 and [Tanget al., 2000], and a graphical display is presented in Fig. 7.9(b). Fig. 7.10(c)

Page 320: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Algorithm and Experiments 301

presents function G(α) with respect to the quadratic spline wavelet.Fig. 7.10(d) illustrates the corresponding locations of the maximun mod-ula for d = 2, 4, 8 respectively. Similarly, it can be shown that ρ dependsnonlinearly on d lightly.

7.4 Algorithm and Experiments

In this section, the algorithm for extracting the Dirac-structure edges willbe presented, including the calculation of the nonzero coefficients φsk,l fordifferent scales. Several experiments will also be conducted.

7.4.1 Algorithm

In practice, the wavelet transform should be calculated discretely. We havethe following formula:

W isf(n,m) =

∫ ∫f(u, v)ψis(n− u,m− v)dudv

=∑k,l

f(k, l)∫ k+1

k

∫ l+1

l

ψis(n− u,m− v)dudv

=∑k,l

f(k, l)∫ n−k

n−k−1

∫ m−l

m−l−1

ψis(u, v)dudv

=∑k,l

f(n− k − 1,m− l − 1)ψs,ik,l , (i = 1, 2),

where

ψs,ik,l =∫ k+1

k

∫ l+1

l

ψis(u, v)dudv

=∫ (k+1)/s

k/s

∫ (l+1)/s

l/s

ψi(u, v)dudv, (i = 1, 2).

In fact, the computation of the above formula is a discrete convolution.For a small scale s, it can be performed directly. But for a large scale s,considering the amount of computation, FNT (fast numerous transform) orother fast algorithms can be utilized instead. The details can be found in[Mallat and Hwang, 1992; Tang et al., 1998b]. In the following, we discussthe calculation of the coefficients ψs,ik,l.

Page 321: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

302 Construction of New Wavelet Function and Application to Curve Analysis

For the wavelets defined by Eq.(8.2), since

ψ1(u, v) = φ′(√u2 + v2)

u√u2 + v2

= ψ2(v, u),

we deduce that

ψs,1k,l =∫ (k+1)/s

k/s

du

∫ (l+1)/s

l/s

ψ1(u, v)dv

=∫ (k+1)/s

k/s

du

∫ (l+1)/s

l/s

ψ2(v, u)dv

=∫ (k+1)/s

k/s

dv

∫ (l+1)/s

l/s

ψ2(u, v)du

= ψs,2k,l .

Therefore, we need to calculate only ψs,1k,l for all k, l ∈ Z. Note that ψ1(u, v)is odd on u and even on v, thus we have

ψs,1−k,l =∫ (−k+1)/s

−k/s

∫ (l+1)/s

l/s

ψ1(u, v)dudv

= −∫ k/s

(k−1)/s

∫ (l+1)/s

l/s

ψ1(u, v)dudv

= −ψs,1k−1,l.

Similarly,

ψs,1k,−l = ψs,1k,l−1, ψs,1−k,−l = −ψs,1k−1,l−1.

Consequently, we further need to calculate only ψs,1k,l for all positive integersk, l. By ψ1(u, v) = ∂

∂u [φ(√u2 + v2)], we have

ψs,1k,l =∫ (k+1)/s

k/s

∫ (l+1)/s

l/s

∂u[φ(

√u2 + v2)]dudv

=∫ (l+1)/s

l/s

φ√

v2 +(k + 1s

)2− φ

√v2 +

(k

s

)2 dv

= φsl,k+1 + φsl+1,k − φsl+1,k+1 − φsl,k,

Page 322: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Algorithm and Experiments 303

where

φsk,l =∫ ∞

k/s

φ

√v2 +

(l

s

)2 dv.

Hence, our question turns to calculate φsk,l for all non-negative integers kand l. Since

ψ1(u, v) = φ′(√u2 + v2)

u√u2 + v2

= ψ(√u2 + v2)

u√u2 + v2

,

where ψ is defined by Eq. (8.1), we have for any non-negative integers k, lsatisfying k2 + l2 < s2,

φsk,l =∫ ∞

k/s

φ(√v2 + (l/s)2 )dv

=∫ ∞√

k2+l2s

φ(v)d√v2 − (l/s)2

=√v2 − (l/s)2φ(v)

∣∣∣∞v=

√k2+l2

s

−∫ ∞√

k2+l2s

φ′(v)√v2 − (l/s)2dv

= − lsφ(√k2 + l2

s)−

∫ 1

√k2+l2

s

ψ(v)√v2 − (l/s)2dv

= − ls

∫ √k2+l2

s

−∞ψ(v)dv −

∫ 1

√k2+l2

s

ψ(v)√v2 − (l/s)2dv

= − ls

∫ 1s

√k2+l2

0

ψ(v)dv − l

s

∫ 0

−1

ψ(v)dv

−∫ 1

1s

√k2+l2

ψ(v)√v2 − (l/s)2dv

= − ls

∫ 1s

√k2+l2

0

ψ(v)dv +l

s

∫ 1

0

ψ(v)dv

−∫ 1

1s

√k2+l2

ψ(v)√v2 − (l/s)2dv

=l

s

∫ 1

1s

√k2+l2

ψ(v)dv −∫ 1

1s

√k2+l2

ψ(v)√v2 − (l/s)2dv

=∫ 1

1s

√k2+l2

[l

s−√v2 − (l/s)2

]ψ(v)dv.

Page 323: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

304 Construction of New Wavelet Function and Application to Curve Analysis

On the other hand, it is easy to see that φsk,l = 0 for all integers k, l satisfyingk2 + l2 ≥ s2 due to the compact support [−1, 1] of φ(x). According to thecomposite trapezoidal formula of numerical quadrature [Chaohao, 1992]∫ b

a

f(x)dx ≈ b− a2n

[f(a) + f(b) + 2

n−1∑i=1

f(a+ ib− an

)

],

we can calculate all the coefficients φsk,l numerically for non-negative inte-gers k, l. The positive integer n in the formula can be set to be so large thatthe error is smaller than any prior number. The possible nonzero items ofφsk,l for s = 2, 4, 8 are listed in the following four tables.

l\k k = 0 k = 1l = 0 0.2500 0.1617l = 1 0.1241 0.0656

Table 7.1 The nonzero coefficients φsk,l for s = 2.

l\k k = 0 k = 1 k = 2 k = 3l = 0 0.2500 0.2138 0.1170 0.0435l = 1 0.1520 0.1171 0.0612 0.0236l = 2 0.0602 0.0477 0.0260 0.0084l = 3 0.0207 0.0169 0.0078 0

Table 7.2 The nonzero coefficients φsk,l for s = 4.

l\k k = 0 k = 1 k = 2 k = 3l = 0 0.2500 0.2254 0.1871 0.1343l = 1 0.1844 0.1698 0.1374 0.0963l = 2 0.1202 0.1110 0.0882 0.0603l = 3 0.0683 0.0630 0.0495 0.0330l = 4 0.0335 0.0308 0.0239 0.0158l = 5 0.0144 0.0133 0.0104 0.0071l = 6 0.0060 0.0056 0.0046 0.0033l = 7 0.0025 0.0023 0.0018 0.0009

Table 7.3 The nonzero coefficients φsk,l for s = 8, k = 0 − 3.

Page 324: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Algorithm and Experiments 305

l\k k = 4 k = 5 k = 6 k = 7l = 0 0.0821 0.0423 0.0190 0.0079l = 1 0.0577 0.0292 0.0133 0.0056l = 2 0.0350 0.0173 0.0081 0.0032l = 3 0.0187 0.0094 0.0046 0.0013l = 4 0.0091 0.0049 0.0023 0l = 5 0.0045 0.0024 0.0005 0l = 6 0.0020 0.0005 0 0l = 7 0 0 0 0

Table 7.4 The nonzero coefficients φsk,l for s = 8, k = 4 − 7.

Based on the characterization of a straight line in an image developedin Section 7.2, an algorithm to detect straight lines in an image can bedesigned. The result is also valid for general curves since a short segmentof a curve can be regarded as a straight line approximately. In fact, wavelettransforms are essentially local analysis. Therefore the result of Theorem8.1 can be applied to the general curves in an image. Our algorithm todetect curves in an image is designed as follows.

Algorithm 7.1 Let f(x, y) be an image containing curves. For a scales > 0,

Step 1 Calculate all the wavelet transforms W 1s f(x, y), W 2

s f(x, y) withrespect to the wavelets defined by Eq.(8.2).

Step 2 Calculate the local maxima flocmax of |∇Wsf(x, y)| and the gra-dient direction fgradient.

Step 3 For each point (x, y) with local maximum, search the point whosedistance along the gradient direction from (x, y) is s. If it is a pointof local maxima, the center point is detected.

Step 4 The curves formed by all the points detected in Step 3 are whatwe need.

7.4.2 Experiments

Four circles with various gray-levels and widths as shown in Fig. 7.11 aretested using the new method. The original images are illustrated on the leftcolumn of Fig. 7.11. After applying Steps 1 and 2 of the proposed wavelettransform algorithm to these circles, the local maximum modulus of the

Page 325: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

306 Construction of New Wavelet Function and Application to Curve Analysis

Fig. 7.11 Detection of lines by new wavelet transform, s=6.

wavelet transform with respect to them can be computed and the resultsare given on the middle column in Fig. 7.11. Finally, the central lines ofthese circles are extracted using Steps 3 and 4 of the above algorithm, andpresented on the right column in Fig. 7.11.

Next, let us turn back to the beginning of this chapter, and look atFig. 7.12. The particular task is that we are required to extract the skeletonof the circle with various widths. Unfortunately, as we have shown inFig. 7.12, the algorithm based on the spline wavelet in Chapter 6 can notwork well due to the width dependence of the detection. Fortunately, asdescribed in detail in Section 7.2, the method developed in this chapterpossesses the width invariant, grey-level invariant as well as slope invariantAccording to these properties, the skeleton of the circle and tree in Fig. 7.12can be extracted. After applying Steps 1 and 2 of the above algorithm to

Page 326: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Algorithm and Experiments 307

Fig. 7.12 Left: the original image; Middle: the location of maximum modulus of thewavelet transform corresponding to s = 6; Right: the skeleton extracted by the algorithmin this chapter.

the original image as displayed on the left column of Fig. 7.12, the localmaximum modulus of the wavelet transform with respect to them can becomputed and presented on the middle column in Fig. 7.12. At last, thecentral lines are extracted using Steps 3 and 4 of the above algorithm, andpresented on the right column in Fig. 7.12.

Figs. 7.13, 7.14 and 7.15 show experimental results for four other images.Fig. 7.13(a) is the original image which consists of some basic strokes ofChinese and Japanese characters in different fonts. Its MMWTs (maximummoduli of the wavelet transform) are displayed in Fig. 7.13(b). It is easyto see that the locations of its MMWTs are independent of the width ofthe strokes. Fig. 7.13(c) is the original image of a noisy contour of anairplane. There are many anomalistic blurs along the contour and thewidths along the contour are erratically different. It is interesting to seethat its MMWTs, which are shown in Fig. 7.13(d), are smooth with thesame widths along the contour. Fig. 7.14(a) and Fig. 7.15(a) are two circuitdiagrams. Some lines of the schematic diagrams are eroded because ofaging. Some pixels on the lines of the schematic diagrams disappear andsome other noises appear instead. The widths of each line are thus not the

Page 327: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

308 Construction of New Wavelet Function and Application to Curve Analysis

(a) (b)

(c) (d)

Fig. 7.13 (a) An original image containing some basic strokes of Chinese and Japanesecharacters in different fonts; (b) the location of the MMWTs of (a) with the new waveletcorresponding to s = 5; (c) an original image of a noisy contour of an airplane; (d) thelocation of the MMWTs of (c) with the new wavelet corresponding to s = 5.

same. With the novel wavelet presented in this chapter, their MMWTs,which are shown in Fig. 7.14(b) and Fig. 7.15(b) respectively, remain thesame.

Page 328: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Algorithm and Experiments 309

(a)

(b)

Fig. 7.14 (a) A circuit diagram; (b) The locations of the MMWTs of (a) with the newwavelet corresponding to s = 4.

Page 329: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

310 Construction of New Wavelet Function and Application to Curve Analysis

(a)

(b)

Fig. 7.15 (a) A circuit diagram; (b) The locations of the MMWTs of (a) with the newwavelet corresponding to s = 4.

Page 330: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Chapter 8

Skeletonization of Ribbon-like Shapeswith New Wavelet Function

One of the most significant topics in pattern recognition is analysis ofRibbon-like shapes. It can be applied to character recognition, signa-ture verification, understanding of paper-based graphics including mapsand engineering drawings, computer-assisted cartoon, fingerprint analysis,etc. [Janssen, 1997; Tombre, 1998]. Representation of a shape using asuitable form is essential in these recognition systems. An appropriaterepresentation of a Ribbon-like shape is its skeleton [Zou and Yan, 2001].The objective of this study is to extract skeletons from planar Ribbon-likeshapes, which have the following properties: (1) conforming to human per-ceptions of the original shapes, (2) being centred inside the original shapes,(3) being efficiently computable, (4) being robust against noise and geo-metric transformation.

Skeletons have been defined in various ways in the different literatures.Generally, the skeleton of a shape is referred to as the locus of the symmetricpoints or symmetric axes of the local symmetries of the shape, in otherwords, different local symmetry analyses may result in different symmetricpoints, and hence different skeletons are produced. There are three methodsof the local symmetry analysis, which are well-known to the shape analysiscommunity, namely:

• Blum’s Symmetric Axis Transform (SAT) [Blum, 1967],• Brady’s Smoothed Local Symmetry (SLS) [Brady, 1983],• Leyton’s Process-Inferring Symmetry Analysis (PISA) [Leyton,

1988].

Each method contributes to skeletonization of the shapes greatly. The

311

Page 331: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

312 Skeletonization of Ribbon-like Shapes with New Wavelet Function

difference in selection of the location of a symmetric point makes thesemethods distinguishable from each other. Nevertheless, the major problemof the SAT and PISA is that the symmetric points of a local symmetry,and hence a skeleton segment may lie in a perceptually distinct part ofthe underlying shape. Although the skeleton obtained from the SLS has apleasing visual appearance, the major shortcoming of the SLS is that someperceptually irrelevant symmetric axes may be created. Some groupingrules can be used [Connell and Brady, 1987]. However, these rules may notbe appropriate for a wide range of shapes. An alternative way is to dividedthe shape into several parts, and thereafter, the SLS axes are computedwithin each part [Rom and Medioni, 1984]. Dividing a shape into suitableparts is the crucial in this method, unfortunately, it is a difficult task. An-other powerful measure of the symmetry proposed by Kovesi [Kovesi, 1995;Kovesi, 1997] is based on the analysis of phase information. The mathemat-ics of phase congruency using wavelets has been studied by Kovesi [Kovesi,1995], where the phase information can be used to construct a contrast in-variant measure of the symmetry that does not require any prior recognitionor segmenttation. Although it is possible to calculate the phase congruencydirectly [Venkatesh and Owens, 1990], it is a rather awkward quantity tocalculate. Moreover, it provides limited information about the overall shapeof an object, and it is not shown further whether it is capability of skeletonextraction.

The computation of the skeleton of a shape is another challenge for theskeletonization. In other words, to determine the symmetric points of ashape by using the above symmetry analysis is a key issue. Computing theskeleton of a shape in the continuous domain is not an easy task. Supposethe boundaries of a shape are represented by two curves, generally, it isdifficult to determine the symmetric points from those curves. Especiallyin the discrete domain, it is even more difficult to compute the skeleton ofa shape using the definitions of the skeleton given above, since the shape isrepresented by a set of discrete pixels, not in a continuous form. The con-strained Delaunary triangulation technique [Zou and Yan, 2001] is a soundsolution for this problem. However, it has to suffer from the complicatedcomputation and it costs too much computation time.

Therefore, many approximation methods have been proposed to com-pute skeletons in the discrete world, which can be divided into two groups:pixel-based method and non-pixel-based method.

In the pixel-based method, each foreground pixel is utilized for compu-

Page 332: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Skeletonization of Ribbon-like Shapes with New Wavelet Function 313

tation in the skeletonization process. Techniques used in the pixel-basedmethod include thinning [Lam et al., 1992; Smith, 1987] and distance trans-form [Smith, 1987]. The former is applied to most of the existing skele-tonization methods. The basic principle of them is to repetitively removethe pixels of the outside layer of an image until only the central pixels re-main, which establish the approximated skeleton of the shape. It can beregarded as the grassfire process, that produces homotopic skeleton, doesnot alter the topology of the shape, and is easy to implement. The distancetransform possesses the following advantages: (1) A skeleton is producedin a fixed number of passes through the image regardless of the sizes ofthe object. (2) It may operate faster than thinning method does, since itrequires O(n2) to O(n3) time to compute the skeleton of an n × n image[Smith, 1987] rather than the later, which usually takes O(n3) to do so[Smith, 1987].

The pixel-based method often suffers from one or more of the followingdrawbacks:

First, the generated skeletons are generally in discrete forms, where theskeleton points are discrete pixels. However, such a skeleton is not helpfulfor recognizing the underlying shape unless skeleton pixels are linked bylines or curves implicitly or explicitly to form a graph.

Second, even if the skeleton pixels are linked, the resulting skeleton maynot be centred inside the underlying shape due to the use of discrete data.

Third, the computational complexity is quite high, since all foregroundpixels are needed for the computation in the skeletonization process.

In the non-pixel-based method, the skeleton of a shape is analyticallyderived from the border of the image. There are two types of non-pixel-based methods, which are based on either cross-section [Pavlidis, 1986] orVoronoi diagrams [Ogniewicz and Kubler, 1995]. These methods attemptto determine the symmetric points of a shape without the intermediate stepof the grassfire propagation. The fundamental concept of these methods isthat the local symmetric axes of a shape are derived from pairs of contourpixels or a contour segment representing a sequence of the contour pixels.The mid-points or centre-lines of the pairs of the contour elements areconnected to generate the skeleton. An obvious advantage of these methodsover the pixel-based methods is that fewer data (only the contour pixels)are used for the skeletonization. Hence, they are expected to be faster.Especially, comparing with the thinning technique, another advantage ofthe non-pixel-based method is that the real coordinates are available for

Page 333: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

314 Skeletonization of Ribbon-like Shapes with New Wavelet Function

the skeleton points, which are not restricted by the discrete grids. Thus,the generated skeleton can be centred inside the underlying shapes.

On the other hand, the accurate identification of the local symmetriesof the underlying shape is the major problem in the non-pixel-based meth-ods. In fact, given a contour pixel of a digital shape, it may be impossibleto find another pixel on the opposite contour, such that they are exactlymathematically symmetrical, due to the digitization. Thus, a fundamentalproblem needs to be solved is to define symmetries in the discrete domain,so that the skeleton of a digital shape can be computed correctly.

All in all, although more than 300 skeletonization algorithms have beenproposed, the improvement is still required, since the existing approxima-tion algorithms of skeletonization often suffer from one or more of thefollowing drawbacks [Chang and Yan, 1999; Ge and Fitzpatrick, 1996;Lam et al., 1992; Smith, 1987; You and Tang, 2007]:

(1) It may take a long time to skeletonize a high-resolution image.(2) Skeletons may not be centred inside the underlying shapes.(3) Skeletons are sensitive to noise and shape variations, such as rotation

and scaling, etc.(4) A shape and its skeleton may have different number of connected

components.(5) Skeleton may contain artifacts such as noisy spurs and spurious short

branch between split junction points.(6) Skeleton branches may be serious erode.(7) In addition, most methods are suitable for only the binary images

rather than the gray images.To overcome the above problems, a novel wavelet-based method is pre-

sented in [Tang and You, 2003; You and Tang, 2007]. In this way, a newwavelet function called Tang-Yang wavelet , which has been constructed byour research group [Yang et al., 2001; Yang et al., 2003a], is applied; a newsymmetry analysis, which is called symmetry analysis of maximum moduliof wavelet transform, is also proposed. This approach benefits from thefollowing desired characteristics of new wavelet function investigated.

• The position of the local maximum moduli of the wavelet transformwith respect to the Ribbon-like shape is independent of the gray-levels of the image.• The local maximum moduli of the wavelet transform of the Ribbon-

like shape form two new contours, when the appropriate scale of

Page 334: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Tang-Yang Wavelet Function 315

the wavelet transform is selected according to the width of theshape. Meantime, the new contours are located symmetrically atthe both sides of the original image, and keep the same topologicaland geometric properties.• The distance from one contour to opposite one, which is completely

independent of the width of the shape, and equals to the scale ofthe wavelet transform.

Based on the above symmetry analyses, a new skeleton called wavelet skele-ton can be defined, which not only remain the good properties provided bythe existing methods, but also improves the technique in the following re-spects: (1) Generally, it is easy to determine the symmetric points from thesymmetric curves proposed; and a skeleton may be centred exactly insidethe underlying shape; (2) The computation of the skeleton of a shape isreadily simply, moreover, it takes less time to perform the skeleton; (3) Askeleton representation is robust against noise and insensitive to linear ge-ometric transformations, such as translation, rotation and scaling; (4) Theimage to be processed may be extended to any gray levels.

This chapter is organized as follows: In Section 8.1, the Tang-Yangwavelet function is introduced. In Section 8.2, a corresponding symmetryanalysis will be developed based on three important properties of the maxi-mum moduli of the wavelet transform. The characterization of the skeletonproduced by the proposed method will also be compared with the existingones. In Section 8.3, the wavelet skeleton and its implementation will fur-ther be discussed. A set of techniques for modifying the artifacts of theprimary wavelet skeleton will also be given. An algorithm to perform theproposed new scheme to extract the skeleton of the Ribbon-like shapes aswell as experiments will be illustrated in Section 8.4.

8.1 Tang-Yang Wavelet Function

It’s well known that to settle the contour or boundary of shape is a keyof extracting the skeleton. With the growth of wavelet theory, the wavelettransform has been found to be a remarkable mathematical tool to analyzethe singularities including the edges, in particular, the sharp boundary ofthe shape, and further, to detect them effectively [Canny, 1986; Mallat,1998; Mallat and Hwang, 1992; Mallat and Zhong, 1992; Tang et al., 2000].

Page 335: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

316 Skeletonization of Ribbon-like Shapes with New Wavelet Function

Although lots of wavelet functions have been found so far, the constructionof a appropriate one according to the application in practice is still a greatchallenge for the worldwide researchers. In order to extract the skeletonof a shape, detecting the boundary or contour of the shape is required. Inthis chapter, a novel wavelet function called Tang-Yang wavelet, which isconstructed in our work [Yang et al., 2001; Yang et al., 2003a], is utilized.

As we have known, the edge points of a digital image are the pixels,which are as close as possible to the center of the true edge but absolute.Hence, when we extract the central point of shape via its edges, the lo-cation of edge pexils may be shifted around the centre of the true edgewithout loosing the human vision. In our motivation, when we detect theedges from the local maxima of the wavelet transform modulus, the desiredoperator not only detect the singular points of the signal but also adjustproperly the location of the edge points around the centre of the true edge,which depends strongly on the scale of the wavelet transform. Therefore,a novel wavelet function ψ(x, y) is a considerable candidate, which satisfiesthe mentioned extra requirement besides those conditions, that Gaussianfunction and quadratic spline do. Namely, when it is used as the waveletfunction, the location of maximum moduli of the wavelet transform is rel-atively dependent of the scale of the wavelet transform. Obviously, it ispreferable for the boundary detection of the Ribbon-like shapes. An oddfunction ψ(x) (for the sake of simplicity, we discuss one dimension casefirst) is considered as the new wavelet function. Consequently, we consideran odd function ψ(x), which is defined on (0,∞) by

ψ(x) :=

ψ1(x) + ψ2(x) + ψ3(x) x ∈ (0, 14 )

ψ2(x) + ψ3(x) x ∈ [ 14 ,34 )

ψ3(x) x ∈ [ 34 , 1)

0 x ∈ [1,∞)

(8.1)

where ψ1(x) = − 2

π (−8x ln 1+√

1−16x2

4x + 12x

√1− 16x2)

ψ2(x) = − 2π (8x ln 3+

√9−16x2

4x − 32x

√9− 16x2)

ψ3(x) = − 2π (−4x ln 1+

√1−x2

x + 4x

√1− x2)

as the candidate of 1-D wavelet function. Apparently, function φ(x) :=

Page 336: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Characterization of the Boundary of a Shape by Wavelet Transform 317

∫ x0 ψ(x)dx is an even function with compactly supported on [-1, 1], andφ′(x) = ψ(x) holds as well. The graphical description of functions ψ(x)and φ(x) can be found in Fig. 7.3 in Chapter 7. The 2-D wavelet functionsare given by ψ1(x, y) := ∂

∂xθ(x, y) = φ′(√x2 + y2) x√

x2+y2

ψ2(x, y) := ∂∂y θ(x, y) = φ′(

√x2 + y2) y√

x2+y2

(8.2)

and are graphically displayed in Fig. 7.5 (Chapter 7).The gradient direction and the amplitude of the wavelet transform are

denoted respectively by

∇Wsf(x, y) :=(W 1s f(x, y)

W 2s f(x, y)

), (8.3)

and

|∇Wsf(x, y)| :=√|W 1

s f(x, y)|2 + |W 2s f(x, y)|2. (8.4)

Here, |∇Wsf(x, y)| is called modulus of the wavelet transform at point(x, y). The boundary of the shape can be detected by locating the localmaxima of the wavelet transform modulus. The details of the selection ofthe new function and analysis of its property as well as the comparisonswith Gaussian function and quadratic spline are presented in [Yang et al.,2003a].

8.2 Characterization of the Boundary of a Shape by WaveletTransform

In this section, some significant characteristics of the Ribbon-like shapewith respect to the local maximum moduli of the wavelet transform basedon the above wavelet function will be presented, namely:

• Gray-level invariant — The local maximum moduli of the wavelettransform of the Ribbon-like shape take place at the same pointsregardless of the different gray-levels of the image.• Slope invariant: The local maximum moduli of the wavelet trans-

form of the Ribbon-like shape are independent of the slope of theobject.

Page 337: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

318 Skeletonization of Ribbon-like Shapes with New Wavelet Function

• Width invariant — The maximum moduli of the wavelet transformof the Ribbon-like shape produce two new lines around the originalboundary. Moreover, the location of maximum moduli are indepen-dent of the width of the shape, namely, the distance between thetwo new lines depends on only the scale of the wavelet transformrather than width of the shape under certain circumstance.• Symmetry — The location of maximum moduli of the wavelet

transform cover exactly the points of the original boundary if thetransform scale s equals to the width of the shape. Moreover, whenthe scale is bigger than or equals to the width of a shape, the twonew lines which formed by the maximum moduli of the wavelettransform are exactly symmetrical with respect to the central lineof the shape.

The above properties can be summarized in the following theorem, theproofs can be find in [Yang et al., 2003a].

Theorem 8.1 Let ld be a straight segment of the Ribbon-like shape withwidth d and central line l. If the scale of the wavelet transform s ≥ d, thenthe local maximum moduli of the wavelet transform using wavelet functionof Eq. (8.2) generate two new periphery lines around the original segment,which have the following properties: The two new lines are exactly sym-metric with respect to the central line of the segment; the distance betweenthe new lines equals to scale s, in other words, the location of the maxi-mum moduli of the wavelet transform depends completely on scale s, andthe location of the central line of the segment. Moreover, the two new linespossess the same gradient direction as the central line does. Furthermore, ifand only if scale s equals to the width of the shape, the locations of pointsof the maximum moduli lie exactly on the boundaries of the shape.

Therefore, the following definitions are natural outcomes:

Definition 8.1 In wavelet transform, if scale s is bigger than or equals tothe width of the Ribbon-like shape, the points of the maximum moduli willgenerate two new lines locating on the periphery of the shape. Moreover,they are local symmetrical with respect to the central line of the shape.This symmetry is called maximum moduli symmetry (MMS).

Definition 8.2 The wavelet skeleton of the Ribbon-like shape is definedas the curve of all connective midpoints of the segment lines, which are

Page 338: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Characterization of the Boundary of a Shape by Wavelet Transform 319

connected by all pairs of the symmetrical maximum moduli of the wavelettransform of the shape.

To illustrate the above definitions more clearly, now a brief compari-son of our new symmetry analysis with the traditional ones, i.e. Blum’ssymmetric axis transform (SAT)[Blum, 1967], Brady’s smoothed local sym-metry (SLS)[Brady, 1983] and Leyton’s process-inferring symmetry analysis(PISA) [Leyton, 1988], will be presented.

The graphical descriptions of four symmetry analyses are shown inFig. 8.1 and Fig. 8.2. Here, l1 and l2 are two opposite boundaries ofthe shape. A circle labelled by C is placed between l1 and l2 such thatit is simultaneously tangential to both boundaries at points A and B inFigs. 8.1(a), (b) and Fig. 8.2(c). Blum’s symmetric axis transform (SAT) isshown in Fig. 8.1(a), and its symmetric point of the local symmetry formedby A and B is defined as the center of circle C. Hence, its correspond-ing skeleton is defined as the locus of the central points of the maximalinscribed symmetric circles of the shape. It is obvious that the interior ofcircle C must lie entirely inside either the foreground or the background ofthe image. Most of the existing skeletonization algorithms are based on theconcept of this symmetry analysis, such as the grassfire technique.

In SLC symmetry analysis, Brady defines the symmetric point of thelocal symmetry by the intersecting point of two lines, the mirror l andsegment AB, i.e. the midpoint of AB. Its corresponding skeleton is thelocus of the mid-points of the symmetric lines of the symmetric circles asshown in Fig. 8.1 (b). In Brady’s original proposal, a basic criterion, calledequal-angle criterion, asks that angle (θ) between symmetric line AB anda tangent line t1 equals to the angle between AB and another tangentline t2. More precisely, two points, A and B, on a planar curve form alocal symmetry if the angle between vector −−→AB and the normal of thecurve at B equals to the angle between vector −−→BA and the normal of thecurve at A. However, the interior of circle C is not required to stay insidethe shape completely. This characteristic can be either an advantage or adisadvantage compared with SAT and PISA methods. The advantage isthat a wider variety of situations are considered. For instance, SAT failsto produce the minor axis of an ellipse, which can be generated by SLS[Brady and Asada, 1993]. The disadvantage is that a symmetric axis fromSLS may not lie inside the shape entirely [Saint-Marc et al., 1993]. Theadditional measures have to be used while the perceptually salient axes are

Page 339: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

320 Skeletonization of Ribbon-like Shapes with New Wavelet Function

t1

t2

l1

l2

C

A

B

Blum’s symmetric point

(a) Blum’s Symmetric Axis Transform

l1

Brady’s symmetric point

A

B

l2

C

l

t1

t2

(b) Brady’s Smoothed Local Symmetry

Fig. 8.1 The illustration of Symmetry Analyses.

selected to characterize the shape. In addition, the question of whether thelocus of symmetries lies within the shape or not depends not only on thechoice of locality of the symmetry point (e.g. centre of circle, mid-chord)but also on whether the bitangent circle is forced to be inscribed (entirelycontained within the shape). Typically SLS does not enforce this constrainwhilst the SAT of Blum does.

Leyton’s symmetric point is defined as the intersecting point of ‘mirro’m and symmetric circle C, i.e. the midpoint of the arc AB, and the corre-sponding skeleton is defined by the locus of the midpoints of the symmetricarcs of the circles, which can be shown in Fig. 8.2(c). Since there are two

Page 340: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Characterization of the Boundary of a Shape by Wavelet Transform 321

Leyton’s symmetric point

A

B

l1

l2

(c) Leyton’s Process−Inferring Symmetry

C

t1

t2

m

Location of maximum moduli

Wavelet symmetric points

l1

l2

l

A

B

C

(d) Maximum Moduli Symmetry of Wavelet Transform

2

1m

m

Fig. 8.2 The illustration of Symmetry Analyses (Continuous).

symmetric arcs, and two symmetric points associated with the symmetricpair A and B, PISA becomes ambiguous when it comes to decide whichsymmetric point is appropriate to represent the symmetry property of theobject.

In our proposed symmetry analysis, which is shown in Fig. 8.2(d), thesymmetric point is defined as the midpoint of segment AB. Meanwhile, thecorresponding skeleton of a shape is defined as the locus of the midpointsof the segments connecting any pair of points, which lie on two oppositesymmetric maximum moduli m1 and m2. The first advantage is that asymmetric axis must be inside the shape entirely. Moreover, the skeleton

Page 341: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

322 Skeletonization of Ribbon-like Shapes with New Wavelet Function

of the shape can be mathematically centred inside the underlying shape.Another obvious advantage is that its implementation is relatively easy,in other words, the computation of the skeleton of the shape is simpleand direct, because its two symmetric maximum moduli lines are easilyobtained by applying the wavelet transform to the shape. Moreover, thedistance between the two symmetric maximum moduli lines completelydepends on the scale of the wavelet transform, thus, it is relatively easy tolocate midpoint of the segment in practice. As far as the symmetry analysesin either SAT or SLS or PISA, the implementation is not straightforwardand relatively difficult. Because it is hard to fix circle C between l1 and l2such that it is simultaneously tangential to both contours at A and B, whichcan be found in Figs. 8.1(a)-(b) and Fig. 8.2(c), especially in the discretedomain. Moreover, it also implicates that the above indirect approaches(SAT, SLS and PISA) suffer from the higher computational cost. Ourapproach is a direct method, in which the points of the modulus maxima ofthe wavelet transform are just contour points of the shape, therefore, thecomputational cost is mainly determined by this phase itself. The extracomputational cost of searching the tangent circles of the contours in SAT,SLS and PISA can be saved.

8.3 Wavelet Skeletons and Its Implementation

In this section, a set of schemes for extracting wavelet skeletons of theRibbon-like shapes will be presented, which includes two parts, namely, (1)implementation of the wavelet transform in the discrete domain to generatea primary wavelet skeleton, and (2) modification of the primary waveletskeleton.

8.3.1 Wavelet Transform in the Discrete Domain

In practice, the images to be processed are in discrete world. In this sub-section, we will give wavelet transform formula in the discrete domain andcalculate the corresponding wavelet coefficients. In fact, the wavelet trans-form formula can be re-written as follows:

W isf(n,m) =

∫ ∫f(u, v)ψis(n− u,m− v)dudv

Page 342: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Wavelet Skeletons and Its Implementation 323

=∑k,l

f(k, l)∫ k+1

k

∫ l+1

l

ψis(n− u,m− v)dudv

=∑k,l

f(n− k − 1,m− l − 1)ψs,ik,l , (i = 1, 2),

where

ψs,ik,l =∫ k+1

k

∫ l+1

l

ψis(u, v)dudv

=∫ (k+1)/s

k/s

∫ (l+1)/s

l/s

ψi(u, v)dudv, (i = 1, 2).

It is clear that the computation of the above formula is a discrete con-volution. For a small scale s, it can be performed directly. But for a largescale s, considering the amount of computation, FNT (fast numerous trans-form) or other fast algorithms can be utilized instead. The details can befound in [Tang et al., 2000]. In the following, we will discuss the calculationof the coefficients ψs,ik,l.

For the wavelet functions defined in Eq. (8.2), since

ψ1(u, v) = φ′(√u2 + v2)

u√u2 + v2

= ψ2(v, u),

we can deduce that

ψs,1k,l = ψs,2l,k , ψs,1−k,l = −ψs,1k−1,l, ψs,1k,−l = ψs,1k,l−1, ψs,1−k,−l = −ψs,1k−1,l−1.

Consequently, we further need to calculate only ψs,1k,l for all positive integersk and l. By ψ1(u, v) = ∂

∂u [φ(√u2 + v2)], we have

ψs,1k,l = φsl,k+1 + φsl+1,k − φsl+1,k+1 − φsl,k,where

φsk,l =∫ ∞

k/s

φ

√v2 +

(l

s

)2 dv.

Hence, our question turns to calculate φsk,l for all non-negative integers kand l. Since

ψ1(u, v) = φ′(√u2 + v2)

u√u2 + v2

= ψ(√u2 + v2)

u√u2 + v2

,

Page 343: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

324 Skeletonization of Ribbon-like Shapes with New Wavelet Function

where ψ is defined by Eq. (8.1), for any non-negative integers k and l

satisfying k2 + l2 < s2, we have

φsk,l =∫ ∞

k/s

φ(√v2 + (l/s)2 )dv =

∫ 1

1s

√k2+l2

[k

s−√v2 − (l/s)2

]ψ(v)dv.

On the other hand, it is easy to see that φsk,l = 0 for all integers k andl satisfying k2 + l2 ≥ s2 due to the compact support [−1, 1] of φ(x).

We can calculate all coefficients φsk,l numerically for non-negative in-tegers k and l. The positive integer n in the formula can be set to be solarge that the error is smaller than any prior number. The possible nonzeroitems for s = 2, 4, 6, 8 are listed in the following five tables.

l\k l = 0 l = 1k = 0 0.2500 0.1250k = 1 0.0497 0.0111

Table 8.1 The nonzero coefficients φsk,l for s = 2.

k\l l = 0 l = 1 l = 2 l = 3k = 0 0.2500 0.2292 0.1250 0.0208k = 1 0.1468 0.1206 0.0552 0.0060k = 2 0.0497 0.0366 0.0111 0.0003k = 3 0.0047 0.0026 0.0002 0

Table 8.2 The nonzero coefficients φsk,l for s = 4.

k\l l = 0 l = 1 l = 2 l = 3 l = 4 l = 5k = 0 0.2500 0.2438 0.2022 0.1250 0.0478 0.0062k = 1 0.1831 0.1718 0.1333 0.0767 0.0257 0.0025k = 2 0.1106 0.1003 0.0723 0.0367 0.0094 0.0005k = 3 0.0497 0.0436 0.0281 0.0111 0.0017 0.0000k = 4 0.0133 0.0109 0.0056 0.0014 0.0000 0k = 5 0.0011 0.0008 0.0002 0.0000 0 0

Table 8.3 The nonzero coefficients φsk,l for s = 6.

Page 344: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Wavelet Skeletons and Its Implementation 325

k\l l = 0 l = 1 l = 2 l = 3k = 0 0.2500 0.2474 0.2292 0.1849k = 1 0.2006 0.1950 0.1741 0.1358k = 2 0.1468 0.1403 0.1206 0.0902k = 3 0.0935 0.0882 0.0733 0.0517k = 4 0.0497 0.0462 0.0366 0.0236k = 5 0.0199 0.0180 0.0132 0.0072k = 6 0.0047 0.0041 0.0026 0.0011k = 7 0.0004 0.0003 0.0001 0

Table 8.4 The nonzero coefficients φsk,l for s = 8, l = 0 − 3.

k\l l = 4 l = 5 l = 6 l = 7k = 0 0.1250 0.0651 0.0208 0.0026k = 1 0.0884 0.0433 0.0126 0.0013k = 2 0.0552 0.0244 0.0060 0.0004k = 3 0.0287 0.0107 0.0020 0k = 4 0.0111 0.0032 0.0003 0k = 5 0.0026 0.0004 0 0k = 6 0.0002 0 0 0k = 7 0 0 0 0

Table 8.5 The nonzero coefficients φsk,l for s = 8, l=4-7.

8.3.2 Generation of Wavelet Skeleton in the Discrete

Domain

Based on the discussion in Section 8.2, a set of schemes to detect the seg-ment of shape can be designed. The result is also valid for general Ribbon-like shapes since a short segment of a shape can be regarded as a straightline. In fact, wavelet transform is essentially a local analysis. Therefore,the result of Theorem 8.1 can be applied to the general Ribbon-like object.

Maximum moduli symmetry is defined in the continuous domain as men-tioned in the previous discussion, In fact, the exact symmetries betweencontour pixels may not exist in the discrete domain. When a continuousshape is digitized, its boundary is sampled by discrete points. For somecontour pixels of a digital shape, it may not be possible to find their sym-metrical counterparts on the opposite contour to form local symmetries.

Page 345: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

326 Skeletonization of Ribbon-like Shapes with New Wavelet Function

Even if a pair of symmetric contour pixels can be found precisely, theircorresponding symmetrical central point may not exist.

In addition, in the continuous domain, the gradient direction of a func-tion can be accurately counted in mathematics. However, in contrast, it isdifficult to express it exactly in the discrete form. Consequently, we will de-vote our efforts on finding the best way to locate the symmetric maximummoduli points and the corresponding central points.

First, we determine the gradient direction of a digital signal and itscorresponding local maximum. Fortunately, in the equi-spaced sampling,only eight adjacent pixels are around a point. Hence, only the nearest eightpoints will be taken into account. It is said that the discrete image has eightgradient directions. Therefore, a plane can be divided into eight sectors. Agradient direction is defined by

αs := arctan(∂(f ∗ θs)(x, y)

∂y/∂(f ∗ θs)(x, y)

∂x),

where s denotes the wavelet transform scale.When αs falls into a sector, it will be quantified to a certain vec-

tor, which is represented by a central line of that sector. It indicatesa direction of the gradient, and along this direction, the local maximalmoduli can be achieved. The effect of any opposite gradient direction isthe same. Thus, only 4 codes are needed to be used to code these dif-ferent directions. The tangent of each direction, which is described bytgαs = ∂(f∗θs)(x,y)

∂y /∂(f∗θs)(x,y)∂x , falls into one of the following intervals:

[−1−√

2, 1−√

2), [1−√

2),√

2− 1), [√

2− 1,√

2 + 1),

[√

2 + 1,+∞) ∪ (−∞,−1−√

2).

The above gradient code is called Gradient Code of Wavelet Transform(GCWT). It will play an important role not only in locating the centralpoints (primary skeleton points), but also in modifying artifacts of theprimary wavelet skeleton whereafter.

On the other hand, for every maximum moduli point, even though thecorresponding symmetric counterpart cannot be achieved or not exist alongits gradient direction, one or more maximum moduli points may appear ina sector, which contains certain GCWT or gradient direction. Hence, fromthese points, we can select one, where the distance from this point to the

Page 346: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Wavelet Skeletons and Its Implementation 327

original maximum moduli point approximates to scale s of the wavelettransform, as the symmetric counterpart of the original maximum modulipoint. Meantime, the midpoint or approximate midpoint of the segment,which is connected through the pair of maximum moduli symmetric points,is regarded as the symmetric central point, namely, the skeleton point.In practice, this approach can be implemented accurately and easily inmathematics.

An important issue in skeletonization is to reduce the noise. As we haveknown, the noise always distributes randomly. From the point of view ofthe statistics, the average value of the noise is nearly a constant in a certainarea. In general, we can suppose the value of this constant is zero, and takea weighted mean to the signal in this area. This action can be regardedas a low-pass filtering. In this way, the noise will be eliminated consid-erably. Virtually, θ(x, y) is a smoothing operator, which convolutes withf(x, y), thus, the noise can be reduced. In fact, we often have some priorinformation to identify the difference between the singularities of signaland the noise. The technique of reducing noise based the detection of thewavelet transform maxima has been developed [Canny, 1986; Mallat, 1998;Mallat and Hwang, 1992; Mallat and Zhong, 1992; Tang et al., 2000;You and Tang, 2007]. In our practice, a threshold processing is appliedto reduce the noise and remain the edge information. In this processing,after calculating the modulus of the wavelet transform, a threshold is usedto decide which point is an noise one to be eliminated. If the modulus ofthe wavelet transform is less than the threshold, then their modulus will bereset as 0. Even though the threshold cannot be automatically computed, itcan be selected by the experiments. In our practice, we have T = CT ×M ,where, CT is a constant to be adjusted manually according to the amountof noise or the distracting background (in our experiments, CT ≈ 0.35), Mis the maximum modulus of the wavelet transform. Based on the thresholdprocessing, the prospective edge or contour of the shape can be detectedeffectively and exactly.

8.3.3 Modification of Primary Wavelet Skeleton

Obviously, a few points on the central line produced by the above techniquemay be lost. Hence, the primary skeleton obtained from the above approachdo not resemble somewhat human perceptions. The lost points may beresumed through a slight modification. Namely, for each lost point, we

Page 347: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

328 Skeletonization of Ribbon-like Shapes with New Wavelet Function

examine the neighbour points along the normal of the gradient, if theyhave the same GCWT, then the lost points will be considered to be theskeleton points. Meantime, the typical junction-points and intersections ofthe shape, such as T-pattern, K-pattern and Cross-pattern intersections,etc. as shown in Fig. 8.3 are applied to the modification of the primarywavelet skeleton.

Let us look at an example as shown in Fig. 8.5(c), by using the proposedforegoing central line searching technique to letter “H”, some skeleton linesin the junctions are lost. In fact, this is a key problem, which is needed tobe solved in any skeletonization method. Fortunately, the GCWT plays anextremely important role in our new technique. Six typical junctions arelisted in Fig. 8.3, which may arise the pixel-losing in the primary skeleton.Some modifying techniques are proposed in this chapter to reduce the pixel-losing. It will be noted that they still depend completely on the relevantresults of the above wavelet transform.

Cross−Pattern T−Pattern K−Pattern

X−Pattern V−Pattern Y−Pattern

A

BC D

A BC

D

EF

A

B

C

C

D

A B

AB

DC

E

Fig. 8.3 All sorts of junction-points.

For the cross-patterns as shown in Fig. 8.3, the points betwen A and

Page 348: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Wavelet Skeletons and Its Implementation 329

B of the wavelet skeleton are truncated. Fortunately, it is easy to findthese points through the above wavelet transform since they have exactlythe same gradient direction or the same GCWT. Based on the foregoingdefinition of the wavelet symmetry, one can easily accept the fact thatthe distance between points A and B equals (approximate) to scale s ofthe wavelet transform. Consequently, in practice, from a terminal pointA, we can find another point B along its planar normal direction or thesame GCWT. A similar process can be performed between C and D. Itis obvious that this modification approach is suitable for the shape withX-pattern intersection as well.

The primary wavelet skeleton of the shape with T-pattern junction isalso shown in Fig. 8.3. Here, the points between A and B as well as C andDare lost. Likewise, the lost points between A and B in the primary skeletonpossess the same gradient direction as that of points A and B. Moreover,along either its gradient direction or opposite direction, for every such point,one and only one corresponding point has the maximum moduli, and thedistance between them is half of scale s. Consequently, we only need tosearch the lost points, which satisfy the above two conditions, and thenretrieve these points from the primary skeleton line to find the modifyingskeleton locus. It is noted that if the distance from some lost point to thelocation of the maximum moduli along the gradient direction or normaldirection at the lost point is less than half of the scale s of the wavelettransform, then the retrieve process needs to be stopped. For example,since the distance from the next neighbour of point D along its gradientdirection is less than half of scale s for the T-pattern of Fig. 8.3, retrieveprocess from point C to D has to end at point D.

Virtually, the analogical process can be done for K-pattern, V-patternand Y-pattern, which are also shown in Fig. 8.3. Apparently, the modifiedrules depend strongly on the gradient direction and location of the localmaximum modulus points. In fact, all retrieve and extend processes arestrictly limited within the area enclosed by the local maximum moduluspixels. Therefore, it does not result in the incorrect connection of unrelatedcontour or create new artificial branch in even closely neighbouring shapes.

Generally, if the terminal or end point lying on the locus of the primaryskeleton satisfies one of the following conditions, it will be called unstableterminal point.

• Condition 1: For the terminal or end point lying on the locus of

Page 349: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

330 Skeletonization of Ribbon-like Shapes with New Wavelet Function

the primary skeleton, along the vertical direction of its gradient,there exists a neighbour point with the same GCWT such that thedistance from itself to the nearest location of the maximum moduliis more than scale s.• Condition 2: Along the vertical direction of the gradient, there

exists another terminal or end point with the same GCWT lying onanother segment of the locus of the primary skeleton, every pointbetween these two end points lies completely inside the shape, andthe distance between the two terminal points equals to scale s ofthe wavelet transform.• Condition3: For the next neighbour point of a terminal point

along the vertical direction of its gradient, there exists only onelocation of maximum moduli point along its gradient direction oropposite direction such that the distance from this point to thelocation of maximum moduli is half of scale s, further, along theplanar normal of the gradient direction at the point, no maximummoduli point exists or the distance from this point to the locationof maximum moduli is more than half of scale s of the wavelettransform.

As a result, the above modifying process for the primary wavelet skeletoncan be rewritten as the following algorithm :Input: An image contains the primary wavelet skeleton with correspond-ing maximum moduli resource.Output: An image contains the modified wavelet skeleton.

REPEATFOR Every unstable terminal point in the imageIF It satisfies Condition 1THEN Retrieve its next neighbour point locating at the vertical direction

of its gradient as a modified skeleton;ELSE IF It satisfies Condition 2THEN Retrieve s points between two terminal points as a part of modified

skeleton;ELSE IF It satisfies Condition 3THEN Retrieve its next neighbour point locating at the vertical direction

of its gradient as one modified skeleton.END IF;

Page 350: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Algorithm and Experiment 331

END FOR;UNTIL No unstable terminal point is detected.END.

In addition, it has been noted that a primary wavelet skeleton repre-sentation can also be used to recover the contours of the underlying shape.This is because that the contour information of the shape is recorded inits primary representation. In other words, the wavelet skeleton preservesits width and direction information of the shape. This property is oftendesirable since a shape is completely specified by its contours, and further,by its wavelet skeletons.

8.4 Algorithm and Experiment

To implement the proposed method to extract the wavelet skeletons of theRibbon-like shapes, in this section, an algorithm will be provided followedby several experiments.

8.4.1 Algorithm

The algorithm based on the maximum moduli analysis of the wavelet trans-form (MMAWT) method to extract wavelet skeleton of the Ribbon-likeshape in an image is designed as follows:

Algorithm 8.1 Let f(x, y) be an image containing Ribbon-like shapes, andscale s > 0,

Step 1 Select the suitable scale of the wavelet transform according to thewidth of the Ribbon-like shape.

Step 2 Calculate wavelet transforms W 1s f(x, y), W 2

s f(x, y) using thewavelets defined by Eq. (8.2).

Step 3 Calculate modulus |∇Wsf(x, y)| of the wavelet transform and thegradient direction fgradient.

Step 4 Take threshold T according to the amount of noise and backgroundin the original image and proceed with threshold on the modulusimage (if necessary).

Step 5 For each point (x, y), its modulus of the wavelet transform is com-pared with one of its neighbouring points along its gradient direc-tion, if its modulus arrives at the maximum, it will recorded as the

Page 351: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

332 Skeletonization of Ribbon-like Shapes with New Wavelet Function

local modulus maximum flocmax.Step 6 For each point (x, y) with local maximum, search the point whose

distance to (x, y) along the gradient direction is s. If it is a pointwith the local maximum, the central point is detected.

Step 7 The primary skeleton is formed by all the points detected in Step4.

Step 8 Modify the above primary wavelet skeleton according to the fore-going modification program to obtain the final wavelet skeleton.

Obviously, the implementation of the above algorithm is easy, simple andfast due to the following reasons: It is well known that performing wavelettransform for an image is easy as long as the discrete transform formulais given. Secondly, only the points of the maximum moduli of the wavelettransform, i.e. contour pixels are considered in Steps 3, 4 and 5. Hence, itis expected to be fast. Finally, the skeletons produced from the proposedalgorithm are not sensitive to noise and shape variations such as rotationand scaling.

However, the selection of the proper scale according to the width of theshape is tough and depends on the experience in practice. It is emphasizedthat the properties of the modulus maximum of the wavelet transform stillhold as long as the scale s ≥ d. Therefore, in practice, the scale can beselected to be bigger than the true value, which is accepted within thecertain degree.

8.4.2 Experiments

In this subsection, we focus on the verification of the effectiveness of theskeletonization based on the maximum moduli analysis of wavelet transform(MMAWT) method by experiments. Three types of the experiments havebeen done, namely, (1) production of maximum moduli image of a shape,(2) extraction of primary wavelet skeleton of the Ribbon-like shape, and(3) modification of the primary wavelet skeleton. The images used in theexperiments vary in types, noise, grey levels, etc. Some examples will bepresented below.

An interesting example is shown in Fig. 8.4. The original image con-sists of a face drawing with various widths. By carrying out the algorithmof this chapter, the skeleton is extracted, which is shown graphically inFig. 8.4(c). The second example is illustrated in Fig. 8.5. The original im-

Page 352: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Algorithm and Experiment 333

(a) (b) (c)

Fig. 8.4 (a) The original image; (b) The location of maximum moduli of the wavelettransform corresponding to s = 6; (c) The skeletons extracted by the proposed algorithm.

age, English letter “H” with varied gray levels, is given in Fig. 8.5(a). Wetake scale s = 4, the maximum moduli image is presented in Fig. 8.5(b).The primary wavelet skeleton is obtained from MMAWT and shown inFig. 8.5(c). Obviously, the skeleton loci which locate in some intersectionsof the shape are lost. The modified skeletion of English letter “H” is shownin Fig. 8.5(d), where the disappeared skeleton loci, which locate in theseintersections of the shape are retrieved successfully.

Some other examples are shown in Figs. 8.6, 8.7 and 8.8, where Englishprinted characters “BesT”, and handwritings “C” and “D” are presentedrespectively. We take the scales of the wavelet transform, s = 8 and s = 4,respectively. The original images are shown in Figs. 8.6(a), 8.7(a) and8.8(a), where each letter contains some strokes with a variety of widths.Fortunately, their locations of the maximum moduli have exactly the samewidth as shown in Figs. 8.6(b), 8.7(b) and 8.8(b). Some truncations inthe primary skeleton loci are apparent in the intersections of the shapes, inaddition, some truncations are also discovered in the non-intersection parts,which can be found in Figs. 8.6(c), 8.7(c) and 8.8(c). After applying themodification processes to these images, those truncated points are retrievedsuccessfully in final wavelet skeletons as illustrated in Figs. 8.6(d), 8.7(d)and 8.8(d), which closely resemble human perceptions of the underlyingshapes.

Chinese printed characters “Tian’an gate” and “material”, “glory” and“silk” are displayed respectively in Figs. 8.9 and 8.10. Obviously, each Chi-nese character contains some strokes with a variety of widths as shown in ofFigs. 8.9(a) and 8.10(a) respectively. Virtually, the width in the same stroke

Page 353: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

334 Skeletonization of Ribbon-like Shapes with New Wavelet Function

(a) (b)

(c) (d)

Fig. 8.5 (a) The original image; (b) The location of maximum moduli of the wavelettransform corresponding to s = 4; (c) The primary skeletons extracted by the proposedalgorithm; (d) The final skeletons obtained by applying the modification algorithm.

maybe different. The locations of the maximum moduli of the wavelettransform with respect to these Chinese characters can be computed, andthe results are given in Figs. 8.9(b) and 8.10(b). Likewise, their locationsof the maximum moduli of the wavelet transform have the same width.The primary skeletons of these Chinese characters are extracted utilizingSteps 3 and 4 of the above algorithm, and presented in Figs. 8.9(c) and8.10(c) respectively. Final skeletons are obtained by MMAWT, and shownin Figs. 8.9(d) and 8.10(d). Apparently, all final skeletons are closely re-semble human perceptions of the underlying shapes as well as preserve theiroriginal topological and geometric properties.

The image of a raw chest x-ray with varying grey level distribution andnoise is illustrated in Fig. 8.11(a). The raw modulus image after performingthe wavelet transform is presented in Fig. 8.11(b). The corresponding out-put of edge detection obtained from non-threshold and threshold process-ing are shown respectively in Figs. 8.11(c) and (d). Applying MMAWT toFigs. 8.11(c) and (d) produces the primary skeleton as shown in Figs. 8.11(e)

Page 354: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Algorithm and Experiment 335

Fig. 8.6 (a) The original image of English letters; (b) The location of maximum moduliof the wavelet transform corresponding to s = 8; (c) The primary skeletons extracted bythe proposed algorithm; (d )The final skeletons modified by applying the modificationprogram.

and (f). By comparing the result of the non-threshold processing shown inFig. 8.11(c) with that of the thresold one shown in Fig. 8.11(d), we can con-clude that the threshold processing of wavelet transform modulus is robustagainst the noise. Finally, it is clear that the modified result shown in ofFig. 8.11(g) is much better than the primary skeletons shown in Fig. 8.11(f),which can verify the desired effect.

The experiment results in Figs. 8.12 and 8.13 show that the proposedapproach is robust against both the noise and the affine transformation.Image in Fig. 8.12(a) contains three affine transformed patterns of thesame Chinese character. In Fig. 8.13(a), the image is harmed by boththe affine transformation and white “salt and pepper” noise. The wavelet

Page 355: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

336 Skeletonization of Ribbon-like Shapes with New Wavelet Function

Fig. 8.7 (a) The original image of a English handwriting; (b) the location of maximummoduli of the wavelet transform corresponding to s = 4; (c) The primary skeletonsextracted by the proposed algorithm; (d) The final skeletons modified by applying themodification program.

Fig. 8.8 (a) The original image; (b) The location of maximum moduli of the wavelettransform corresponding to s = 4; (c) The primary skeletons extracted by the proposedalgorithm; (d) The final skeletons modified by applying the modification program.

transform with scale s = 4 is applied to the images in Figs. 8.12(a) and8.13(a) and their corresponding raw outputs of modulus images are placedin Figs. 8.12(b) and 8.13(b) respectively. To reduce the noise affectionto the edge detection, we set threshold T = 0.39 ×M for eliminating thepoints, which have relatively weak modulus values and were caused by thenoise or the distracting background. Namely, for each point, if the modulusvalue of the wavelet transform is less than 0.39 times of the maxima mod-ulus, its modulus value will be reset to 0. After the threshold processing,the raw edge for the further skeleton extraction can be detected and shownin Figs. 8.12(c) and 8.13(c). The primary and modified skeletons of threeChinese characters are extracted and shown respectively in Figs. 8.12(d)-(e)and 8.13(d)-(e).

Finally, to evaluate the performance of our method, we compare it withtwo typical skeletonization method: ZSM method [Lam et al., 1992] andCYM method [Chang and Yan, 1999]. Our method is suitable for removingboth periphery and intersection artifacts, but the ZSM and CYM methods

Page 356: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Algorithm and Experiment 337

Fig. 8.9 (a) The original image of Chinese characters; (b) The location of maximummoduli of the wavelet transform corresponding to s = 4; (c) The primary skeletonsextracted by the proposed algorithm; (d) The final skeletons modified by applying themodification program.

Fig. 8.10 (a) The original image of Chinese characters; (b) The location of maximummoduli of the wavelet transform corresponding to s = 4; (c) The primary skeletonsextracted by the proposed algorithm; (d) The final skeletons modified by applying themodification program.

can remove only one type of artifact. The results of the comparision areillustrated in Fig. 8.14. The original image, which is a Chinese character, isshown in Fig. 8.14(a). The skeletons obtained from the proposed method,ZSM and CYM are shown in Figs. 8.14(b), (c) and (d) respectively. Appar-ently, the result obtained from the proposed method is much better thanthese from the ZSM and CYM, and it resembles closer human perceptionthan those obtained from ZSM and CYM.

Page 357: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

338 Skeletonization of Ribbon-like Shapes with New Wavelet Function

(a)

(b) (c) (d)

(e) (f) (g)

Fig. 8.11 (a) The chest x-ray image; (b) Raw of modulus of wavelet transform; (c)Non-threshold processing on modulus image, raw output of edge obtained by MMAWT;(d) The output of edge obtained after threshold processing on modulus image; (e) Rawskeleton obtained from (b); (f) The primary skeleton obtained from (c); (g) The finalmodified skeleton from (e).

Page 358: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Algorithm and Experiment 339

(a)

(b) (c)

(d) (e)

Fig. 8.12 (a) The original image of chinese character with affine transforms; (b) Rawof modulus of wavelet transform; (c) Raw output of edge detection through the modulusmaximum of wavelet transform; (d) The primary skeleton extracted by the proposedalgorithm; (e) The final modified skeletons.

Page 359: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

340 Skeletonization of Ribbon-like Shapes with New Wavelet Function

(a)

(b) (c)

(d) (e)

Fig. 8.13 (a) The original image which is harmed by both the affine transform and noise;(b) Raw of modulus of wavelet transform; (c) Raw output of edge detection obtainedby the modulus maximum of wavelet transform; (d) The output of primary skeletonextracted by the proposed algorithm; (e) The modified skeletons.

Page 360: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Algorithm and Experiment 341

(a) (b)

(c) (d)

Fig. 8.14 (a) The original image of a chinese character; (b) The skeleton extracted bythe proposed algorithm; (c) The skeleton obtained from ZSM; (d) The skeleton obtainedfrom CYM.

Page 361: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

This page intentionally left blankThis page intentionally left blank

Page 362: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Chapter 9

Feature Extraction by WaveletSub-Patterns and Divider Dimensions

Feature extraction is the heart of a pattern recognition system. In patternrecognition, features are utilized to identify one class of pattern from an-other. The pattern space is usually of high dimensionality. The objective ofthe feature extraction is to characterize the object, and further, to reducethe dimensionality of the measurement space to a space suitable for theapplication of pattern classification techniques. In the feature extractionphase, only the salient features necessary for the recognition process are re-tained such that the classification can be implemented on a vastly reducedfeature space.

Feature extraction can be view as a mapping, which maps a patternspace into a feature space. Pattern space X may be described by a vectorof m pattern vectors such that

X =

∣∣∣∣∣∣∣∣∣XT

1

XT2...

XTm

∣∣∣∣∣∣∣∣∣ =

∣∣∣∣∣∣∣∣∣x11 x12 · · · x1n

x21 x22 · · · x2n

......

xm1 xm2 · · · xmn

∣∣∣∣∣∣∣∣∣ , (9.1)

where the superscript T for each vector stands for its transpose, the XTi =

(xi1, xi2, · · · , xin), i = 1, · · · ,m represent pattern vectors.The objective of the feature extraction functions as the dimensionality

reduction. It maps the pattern space (i.e. original data) into the featurespace (i.e. feature vectors). The dimensionality of the feature space has tobe smaller than that of the pattern space. Obviously, the feature vectors

343

Page 363: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

344 Feature Extraction by Wavelet Sub-Patterns and Divider Dimensions

can be represented by

XTi = (xi1, xi2, · · · , xir), i = 1, · · · ,m, r < n. (9.2)

Note that since the feature space is in a smaller dimension, the maxmumvalue of r has to be smaller than that of n, i.e. r < n.

There are many methods to feature selection, however they can be cat-egorized into the followings [Tou and Gonzalez, 1974]:

• Entropy minimization - Entropy is a statistical measure of uncer-tainty. It can be used as a suitable criterion in the design of op-timum feature selection. The entropy minimization approach isbased on the assumption that the pattern classes under considera-tion are normally distribution.• Orthogonal expansion - When the assumption of the normally dis-

tribution is not valid, the method of orthogonal expension offersan alternative approach to the feature extraction. The principaladvantage of this method is that it does not require knowledge ofthe various probability densities.• Functional approximation - If the features of a class of objects can

be characterized by a function that is determined on the basis ofobserved data, the feature extraction can be consirded to be a prob-lem of functional approximation.• Divergence - It can be used to determine feature ranking and to

evaluate the effectiveness of class discrimination. The divergencecan also be used as a criterion function for generating an optimumset of features.

In this chapter, we present a novel approach to extract features inpattern recognition that utilizes ring-projection-wavelet-fractal signatures(RPWFS). This approach can be categorized into the second method listedin the preceding paragraph. In particular, this approach reduces the dimen-sionality of a two-dimensional pattern by way of a ring-projection method,and thereafter, performs Daubechies’ wavelet transform on the derived one-dimensional pattern to generate a set of wavelet transformed sub-patterns,namely, curves that are non-self-intersecting. Further from the resultingnon-self-intersecting curves, the divider dimensions are readily computed.These divider dimensions constitute a new feature vector for the originaltwo-dimensional pattern, defined over the curves’ fractal dimensions.

Page 364: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Feature Extraction by Wavelet Sub-Patterns and Divider Dimensions 345

Wavelet analysis and its applications have become the fastest growingresearch areas in the recent years. Advanced research and development inwavelet analysis has found numerous applications in such areas as signalprocessing, image processing, and pattern recognition with many encourag-ing results [Daubechies, 1990; IEEE, 1992; IEEE, 1993; Mallat and Hwang,1992; Tang et al., 1997a; Tang et al., 1998a]. During this fast growth intheories and applications, the theoretical development of high-dimensionalwavelet analysis is somewhat lagging behind as compared to that of the one-dimensional wavelet. As has been shown in several real-life applications,the two-dimensional wavelet analysis has not been as effectively applied asthe one-dimensional analysis.

The goal of this chapter is to, through mathematically sound deriva-tions, reduce the problem of two-dimensional patterns into that of one-dimensional ones, and thereafter, utilize the well-established 1-D wavelettransform coupled with fractal theory to extract the one-dimensional pat-terns’ feature vectors for the purpose of pattern recognition.

It is a well-known fact that in many real-life pattern recognition sit-uations such as optical character recognition (OCR), patterns are oftenfound to be rotated due to experimentation constraints or errors. This im-plies that the new pattern recognition method must be developed that isinvariant to rotations. In 1991, Tang [Tang et al., 1991] first proposed amethod of transforming two-dimensional patterns into one-dimensional pat-terns through so-called ring projections. As the projections are done in theform of rings, the one-dimensional pattern obtained from ring-projection isinvariant to rotations.

Drawing on the aforementioned work by Tang [Tang et al., 1991], thepresent work further explores the use of ring-projection in reducing the di-mensionality of two-dimensional patterns such as alpha-numeric symbolsinto one-dimensional ones. Consequently, we can perform Daubechies’wavelet transform on the derived one-dimensional patterns to generatea set of wavelet transformed sub-patterns which are curves with non-self-intersecting. We then compute the divider dimensions for the individualcurves. This allows us to map the set of non-self-intersecting curves into afeature vector defined over the curves’ fractal dimensions, which is also thefeature vector corresponding to the original two-dimensional patterns. Anoverall description of this approach can be illustrated by a diagram shownin Fig. 9.1.

Following the descriptions of the theoretical constructs of the ring-

Page 365: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

346 Feature Extraction by Wavelet Sub-Patterns and Divider Dimensions

Analysis

Transformation

DimensionFractalMultiresolutionComputation

Ring-Projection Divider

Dimension

Wavelet

Algorithm

Dimension

Reduction

2-DPattern

1-DPattern

FeatureVector

Sub-Patterns

Fig. 9.1 Diagram of Ring-projection-wavelet-fractal method.

projection-wavelet-fractal signatures (RPWFS) method, we shall also presentthe results of experiments in which two-dimensional patterns were tested.The experiment data consist of a sub-set of Chinese characters and a setof printed alphanumeric symbols, including 26 alphabets in both upperand lower cases, 10 numeric digits, and additional 10 ASCII symbols. Ourmethod yielded 100 % correct classification rate, even when the orientationsor fonts of these characters were altered.

The overall sequence of presentation of this chapter is illustrated below:

• Dimensionality reduction of two-Dimensional Patterns with a Ring-Projection• Wavelet orthonormal decomposition to produce sub-patterns• Wavelet-fractal scheme

– Basic concepts of fractal dimension– The divider dimension of one-dimensional patterns

• Experiments

– Experimental procedure– Experimental results

9.1 Dimensionality Reduction of Two-Dimensional Patternswith Ring-Projection

This section provides an overview of the ring-projection method for reduc-ing the dimensionality of two-dimensional patterns. First, suppose that atwo-dimensional pattern such as an alphanumeric symbol has been repre-

Page 366: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Dimensionality Reduction of Two-Dimensional Patterns with Ring-Projection 347

sented into a binary image. Taking a letter A as an example, its grey-scaleimage, p(x, y), can be discretized into binary values as follows:

p(x, y) =

1 if (x, y) ∈ D0 otherwise

(9.3)

where domain D corresponds to the white region of letter A, as shown inFig. 9.2. The above multivariate function p(x, y) can also be viewed as atwo-dimensional density function of mass distribution on the plane. FromEq. (9.3), it is readily noted that the corresponding density function isa uniform distribution. That is also to say, the mass is homogeneouslydistributed over the region D. From this uniform mass distribution, we canderive the centroid of the mass for the region D, as denoted by m(x0, y0),and subsequently, translate the origin of our reference frame to this centroid,as has been illustrated in Fig. 9.2.

D

M(X0, Y0)

O

Y

X

Fig. 9.2 A binary-image of letter “A” whose centroid is used to place the origin of anew reference frame.

Next, we let

M = maxN∈D

| N(x, y)−m(x0, y0) |

where | N(x, y)−m(x0, y0) | represents the Euclidean distance between two

Page 367: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

348 Feature Extraction by Wavelet Sub-Patterns and Divider Dimensions

points, N and m, on the plane. Further, we transform the original referenceCartesian frame into a polar frame based on the following relations:

x = γ cos θy = γ sin θ

(9.4)

Hence,

p(x, y) = p(γ cos θ, γ sin θ)

where γ ∈ [0,∞), θ ∈ (0, 2π].For any fixed γ ∈ [0,M ], we then compute the following integral:

f(γ) =∫ 2π

0

p(γ cos θ, γ sin θ)dθ (9.5)

X

Y

MO

f(x)

r

Fig. 9.3 An illustration of the ring-projection for letter A.

The resulting f(γ) is in fact equal to the total mass as distributedalong circular rings, as shown in Fig. 9.3. Hence, the derivation of f(γ)is also termed as a ring-projection of the planar mass distribution. Thesingle-variate function f(γ), γ ∈ [0,M ], sometimes also denoted as f(x),x ∈ [0,M ], can be viewed as an one-dimensional pattern that is directlytransformed from the original two-dimensional pattern through a ring-projection. Owing to the facts that the centroid of the mass distribution is

Page 368: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Dimensionality Reduction of Two-Dimensional Patterns with Ring-Projection 349

invariant to rotation and that the projection is done along circular rings,the derived one-dimensional pattern will be invariant to the rotations ofits original two-dimensional pattern. In other words, the ring-projection isrotation-invariant.

From a practical point of view, the images to be analyzed by a recog-nition system are most often stored in discrete formats. Catering to suchdiscretized two-dimensional patterns, we shall modify Eq. (9.5) into thefollowing expression (see Fig. 9.4):

f(γ) =M∑k=0

p(γ cos θk, γ sin θk) (9.6)

Q1

Q2

QM

QM-1

Fig. 9.4 Projection of a two-dimensional pattern along rings in a discrete manner.

Two examples of dimension reduction for two-dimensional patterns canbe found in Figs. 9.5 and 9.6. In the first example, the image of Chinesecharacter “big” is a two-dimensional pattern as shown on the left side ofFig. 9.5. After applying the operation of the ring-projection, an one-dimensional signal is obtained and illustrated on the right side of Fig. 9.5.

Page 369: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

350 Feature Extraction by Wavelet Sub-Patterns and Divider Dimensions

In the second example, the original pattern is a two-dimensional object, anaircraft, which is displayed on the left side of Fig. 9.6. As the the ring-projection operation is applied to it, an one-dimensional signal is obtained,and presented on the right side in Fig. 9.6.

M(X0, Y0)

M

0

Y

X

f(x)r

Fig. 9.5 An example of dimension reduction for Chinese character “big”.

M

f(x)

Y

M(X0, Y0)

0

X

r

Fig. 9.6 An example of dimension reduction for a two-dimensional pattern.

Interested readers are referred to [Tang et al., 1991] for a thorough dis-cussion on ring-projection. In the succeeding sections, we are concernedmainly with how to extract as most information as possible from the ob-tained ring-projection, i.e., an one-dimensional pattern, by way of wavelettransform. This, as will be described later, enables us to obtain a set of

Page 370: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Wavelet Orthonormal Decomposition to Produce Sub-Patterns 351

wavelet transformed sub-patterns − curves that are non-self-intersecting,from which feature vectors defined over the curves’ fractal dimensions caneasily be computed.

9.2 Wavelet Orthonormal Decomposition to ProduceSub-Patterns

Let Vj be an orthonormal MRA, then Vj−1 can be decomposed orthogo-nally as follows:

Vj−1 = Wj ⊕ Vj . (9.7)

Note that the order of Vj and Vj−1 here, in this chapter, differs from thatin the prvious chapters, namely,

• we use the subspaces in Vj by the order of

· · · ⊂ Vj+1 ⊂ Vj ⊂ Vj−1

in the present chapter;• we use the order of

· · · ⊂ Vj−1 ⊂ Vj ⊂ Vj+1

in the previous chapters.

Actually, these two representations have no different.As can be realized, any real-world instruments for measuring physical

data are capable of acquiring information with limited precision. In otherwords, the signals obtained using such instruments will have limited reso-lution. The same is also true for the one-dimensional pattern that we havederived in the preceding sections, f(x); it must belong to a closed space Vj .Mathematically, we can express this as follows:

Pj : L2(IR) =⇒ Vj projective operator from L2(IR) to VjQj : L2(IR) =⇒Wj projective operator from L2(IR) to Wj

Since f(x) ∈ Vj ⊂ L2(IR), we arrive at

f(x) = Pjf(x) =∑k∈ZZ

cj,kϕj,k(x)

= Pj+1f(x) +Qj+1f(x)

Page 371: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

352 Feature Extraction by Wavelet Sub-Patterns and Divider Dimensions

=∑m∈ZZ

cj+1,mϕj+1,m(x) +∑m∈ZZ

dj+1,mψj+1,m(x) (9.8)

where

cj+1,m =< Pj+1f, ϕj+1,m >=∑k∈ZZ

cj,khk−2m (9.9)

dj+1,m =< Qj+1f, ψj+1,m >=∑k∈ZZ

cj,kgk−2m (9.10)

and hk−2m and gk−2m denote the conjugate vectors of hk−2m and gk−2m,respectively. When both hk−2m and gk−2m are real, we have hk−2m =hk−2m and gk−2m = gk−2m.

It should be mentioned that both Eqs. (9.9) and (9.10) compute thesum of an infinite number of terms. However, from a computational pointof view, we wish to see only a finite number of non-zero terms, hk, hencereducing the problem of infinite summation to that of finite summation.In doing so, we carry out the following procedure, in order to find theexpression

m0(ω) =∑k∈ZZ

1√2hke

−ikω ,

such that the number of non-zero hk is finite.First, let us consider:

1 =(cos2

ω

2+ sin2 ω

2

)3

= cos6ω

2+ 3 cos4

ω

2sin2 ω

2+ 3 cos2

ω

2sin4 ω

2+ sin6 ω

2(9.11)

Suppose that

| m0(ω) |2= cos6ω

2+ 3 cos4

ω

2sin2 ω

2, (9.12)

hence,

| m0(ω + π) |2= sin6 ω

2+ 3 sin4 ω

2cos2

ω

2. (9.13)

Since,

1 + e−iω/2

2=e−iω/2(eiω/2 + e−iω/2)

2= e−iω/2 cos

ω

2(9.14)

Page 372: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Wavelet Orthonormal Decomposition to Produce Sub-Patterns 353

1− e−iω/22

=e−iω/2(eiω/2 − e−iω/2)

2= ie−iω/2 sin

ω

2(9.15)

we have:

m0(ω) = (e−iω/2 cosω

2)2e−iω/2(cos

ω

2+ i√

3 sinω

2)

=(

1 + e−iω/2

2

)2 (1 + e−iω/2

2+√

31− e−iω/2

2

)=

18

[(1 +

√3) + (3 +

√3)e−iω

]+

18

[(3−

√3)e−iω2 + (1−

√3)e−iω3

](9.16)

at the same time, we know:

m0(ω) =3∑

k=0

1√2hke

−ikω (9.17)

By comparing Eqs. (9.16) and (9.17), we can immediately obtain the fol-lowing:

h0 =1 +√

34√

2= 0.4829629131445341

h1 =3 +√

34√

2= 0.8365163037378077

h2 =3−√34√

2= 0.2241438680420134

h3 =1−√34√

2= −0.1294095225512603

In other words, if the above terms are chosen as hk, k = 0, 1, 2, 3, and

m0(ω) =3∑

k=0

1√2hke

−ikω

will satisfy the following conditions:

| m0(ω) |2 + | m0(ω + π) |2= 1

m0(0) = 1

Page 373: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

354 Feature Extraction by Wavelet Sub-Patterns and Divider Dimensions

Now, if we define that

ϕ(ω) =∞∏j=1

m0(ω/2j),

then the resulting scaling function, ϕ(x), can be said to have a compactsupport [Daubechies, 1988]. Thus, we can simplify the wavelet transformexpressions of Eqs. (9.9) and (9.10) into the following:

cj+1,m =3∑

k=0

hkcj,k+2m (9.18)

dj+1,m =3∑

k=0

gkcj,k+2m (9.19)

Next, m0(ω) is also determined following the above mentioned steps, exceptthat we examine the expression of

1 =(cos2

ω

2+ sin2 ω

2

)5

to obtain

m0(ω) =5∑

k=0

1√2hke

−ikω .

In this case, we can simplify the wavelet transform expressions of Eqs. (9.9)and (9.10) into the following:

cj+1,m =5∑

k=0

hkcj,k+2m (9.20)

dj+1,m =5∑

k=0

gkcj,k+2m (9.21)

In [Daubechies, 1992], I. Daubechies used the following notations:

nM0(ξ) =1√2

2N−1∑n=0

Nhne−inξ (9.22)

Page 374: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Wavelet Orthonormal Decomposition to Produce Sub-Patterns 355

where nM0(ξ) is equivalent to m0(ω) in our case, and Nhn is equivalentto our hk. Daubechies also provided the exact values of hk (or Nhn) forN = 2 to 10 in tabular forms. The tables might be of interest to thosereaders who want to use Eqs. (9.9) and (9.10) but not to know how hk’sare computed. When N is large enough, the computation of hk couldbecome problem-dependent. Generally speaking, the larger the N value,the higher the resolution of the wavelet orthonormal decomposition will be,and at the same time, the more costly the computation will become.

W 2V

4

V

2

W

1V 1

4V

3W3

0

W

V

Fig. 9.7 Examples of the wavelet transform sub-patterns from a Chinese character.

According to the wavelet orthonormal decomposition as shown in Eq.(9.7), first Vj is decomposed orthogonally into a high-frequency sub-spaceWj+1 and a low-frequency one Vj+1 using the wavelet transform Eqs. (9.20)and (9.21). The low-frequency sub-space Vj+1 is further decomposed intoWj+2 and Vj+2. Afterwards, Vj+2 is broken into Wj+3 and Vj+3, and theseprocesses can be continued. The above wavelet orthonormal decomposition

Page 375: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

356 Feature Extraction by Wavelet Sub-Patterns and Divider Dimensions

can be represented by

Vj = Wj+1 ⊕ Vj+1

⇓(Wj+2 ⊕ Vj+2)

⇓(Wj+3 ⊕ Vj+3)

⇓· · · · · · · · ·

In the view of pattern recognition, Vj can be considered to be an originalpattern, while Vj+1, Vj+2, ..., Wj+1, Wj+2, ... can be regard as the sub-patterns which are referred as wavelet transform sub-patterns.

In Fig. 9.7, we have shown the one-dimensional pattern resulted fromthe ring-projection [Tang et al., 1991] of a two-dimensional pattern, forexample, a Chinese character, and its corresponding wavelet transform sub-patterns. In this figure, V0 denotes the resulting one-dimensional patternfrom the ring-projection, which is a dimension reduction operation. Vjdenotes the wavelet transform sub-pattern resulted from the jth wavelettransform based on Eq. (9.20). Wj denotes the wavelet transform sub-pattern resulted from the jth wavelet transform based on Eq. (9.21). Since

Vj = Wj+1 ⊕ Vj+1

= Wj+1 ⊕Wj+2 ⊕ Vj+2

= Wj+1 ⊕Wj+2 ⊕Wj+3 ⊕ Vj+3

= · · · · · · · · · ,it can be seen that in Fig. 9.7,

V0 = W1 ⊕ V1

= W1 ⊕W2 ⊕ V2

= W1 ⊕W2 ⊕W3 ⊕ V3

= W1 ⊕W2 ⊕W3 ⊕W4 ⊕ V4.

Another example of the wavelet transform sub-patterns from a two-dimensional object using the wavelet orthonormal decomposition is illus-trated in Fig. 9.8. The original pattern is an aircraft, which is a 2-D object.The dimension reduction operation is applied to it, and an 1-D pattern isproduced which is a curve labeled by V0 in Fig. 9.8. After utilizing the

Page 376: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Wavelet Orthonormal Decomposition to Produce Sub-Patterns 357

V 4 W 4

W

0

3W3V

2W2V

1V 1

V

Fig. 9.8 Examples of the wavelet transform sub-patterns from a pattern.

wavelet orthonormal decomposition, eight wavelet transform sub-patternsare obtained, i.e. V1 - V4 and W1 - W4 in Fig. 9.8.

In Fig. 9.9, we have shown the one-dimensional pattern resulted fromthe ring-projection of an alphabet, A, and its corresponding wavelet trans-formation sub-patterns. In the figure, S20A denotes the resulting one-dimensional pattern. S2jA denotes the wavelet sub-pattern resulted fromthe jth wavelet transformation of S20A based on Eq. (9.20). W2jA denotesthe wavelet sub-pattern resulted from the jth wavelet transformation ofS20A based on Eq. (9.21).

The above wavelet orthonormal decomposition can be represented by

S20A = W21A ⊕ S21A

⇓(W22A ⊕ V22A)

⇓(W23A ⊕ V23A)

⇓(W24A ⊕ V24A)

Page 377: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

358 Feature Extraction by Wavelet Sub-Patterns and Divider Dimensions

Fig. 9.9 The one-dimensional pattern obtained after ring-projection, and its corre-sponding wavelet transformation sub-patterns.

In the view of pattern recognition, S20A can be considered to be an originalpattern, while V2jA and W2jA can be regard as the sub-patterns.

9.3 Wavelet-Fractal Scheme

In 1975, B. Mandelbrot first developed the notion of fractal [Mandelbrot,1982]. For the past decades, the theories of fractal geometry have beenwidely applied in a variety of domains, such as in computer science, physics,chemistry, biology, material science, geography, geology, and even in socialscience and humanities. Of equal significance is its applications in patternrecognition. Among others, in 1994, Tang et al. examined the essence ofMinkowski fractional dimension, and applied the Minkowski blanket tech-nique in deriving fractal signatures for document processing, as part of anew method for page layout analysis [Ma et al., 1995; Tang et al., 1995b;Tang et al., 1997b].

Page 378: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Wavelet-Fractal Scheme 359

9.3.1 Basic Concepts of Fractal Dimension

In this sub-section, the basic concepts of fractals will be introduced.

Definition 9.1 A collection of subsets of the space X is said to haveorder m+1 if some point of X lies in m+ 1 elements of , and no point ofX lies in more than m+ 1 elements of . Given a collection of subsetsof X , a collection is said to refine , or to be a refinement of , if eachelement B of is contained in at least one element of .

Now we define what we mean by the topological dimension of a spaceX .

Definition 9.2 A space X is said to be finite-dimensional if there issome integer m such that for every open covering of X , there is anopen covering of X that refines and has order at most m + 1. Thetopological dimension of X is defined to be the smallest value of m for whichthis statement holds. We use notation dimTX to represent the topologicaldimension of X .

The topological dimension is a complicated and advanced mathematicaltopic, more details about it can be found in [Munkres, 1975].

What are fractals? There are many definitions, because it is very diffi-cult to define fractal strictly. B. Mandelbrot gave two definitions in 1982and 1986 respectively.

(1) The first definition from his original essay (1982) says:

Definition 9.3 A set F is called fractal set if its Hausdorff dimension(dimH F ) greater than the Topological dimension (dimT F ), namely:

dimH F > dimT F

(2) In 1986, B. Mandelbrot defined the fractal as:

Definition 9.4 Fractal is a compound object, which contains severalsub-objects. The global characteristic of this object is similar to the localcharacteristics of each sub-object.

(3) A more precise definition of the fractal set F can be provided below:

Definition 9.5 A set F is called fractal set if the following conditionsare satisfied:

Page 379: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

360 Feature Extraction by Wavelet Sub-Patterns and Divider Dimensions

• The global characteristic of the set F is self-similar to the localcharacteristics of each sub-set, namely:

(F ) ∼ (fi), fi ⊃ F,

where (.) stands for the characteristic of (.).• The set F is infinitely separable, i.e.

F = f11 , f

12 , ..., f

1i , ..., f

1n,

f1i = f2

1 , f22 , ..., f

2k , ..., f

2n,

· · · · · · · · ·

fmk = fm+11 , fm+1

2 , ..., fm+1k , ..., fm+1

n , m+ 1→∞.

• Usually, the fractal dimension of the set F is a fraction, and greaterthan the Topological dimension dimT F , namely:

dimH F > dimT F

• In many cases the definition of F is recursive.

Let U be a non-empty subset of n-dimensional Euclid space IRn, andthe diameter of U is defined as

|U | = sup|x− y| : x, y ∈ U,

where sup. stands for the supremum of .. Thus, the diameter of U isthe greatest distance apart of any pair of points in U . If Ui is a countablecollection of sets of diameter at most δ that cover F , such that

(δ) = Ui = Ui : i = 1, 2, ...,

and

F ⊂∞⋃i=1

Ui, 0 < |Ui| ≤ δ,

we say that Ui is a δ-cover of F .

Page 380: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Wavelet-Fractal Scheme 361

Suppose that F ⊂ IRn and s is a real number and s ≥ 0. For any δ > 0,we define

Hsδ (F ) = inf

(δ)

∞∑i=1

|Ui|s : Ui is a δ-cover of F

, (9.23)

where the symbol inf. indicates the infimum of .. As δ decreases, theclass of permissible covers of F in Eq. (9.23) is reduced. Consequently, theinfimum Hs

δ (F ) increases, and so approaches a limit as δ → 0. We have thefollowing definition:

Definition 9.6 When δ → 0, the limit ofHsδ (F ) exists for any subset F of

IRn, and the limiting value can be (and usually) 0 or∞. The s-dimensionalHausdorff measure of F can be defined by:

Hs(F ) = limδ→0

Hsδ (F )

= limδ→0

[inf(δ)

∞∑i=1

|Ui|s : Ui is a δ-cover of F

]. (9.24)

We can clearly prove that Hs is a measure. Specifically, Hs(φ) = 0,and if E ⊂ F then Hs(E) ≤ Hs(F ). If Fi is any countable collection ofBorel set, such that

∞⋂i=1

Fi = φ,

we have

Hs

( ∞⋃i=1

Fi

)=

∞∑i=1

Hs(Fi).

Furthermore, if F is a Borel subset of IRn, then the n-dimensional Hausdorffmeasure of F can be deduced as:

Hn(F ) =π

n2

2nΓ(n+22 )

voln(F ),

where

• Hn(F ) stands for the n-dimensional Hausdorff measure of F .• voln(F ) represents the n-dimensional volume of F which is called

Lebesgue measure of F .

Page 381: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

362 Feature Extraction by Wavelet Sub-Patterns and Divider Dimensions

– vol1 is length,– vol2 is area,– vol3 is the usual 3-dimensional volume.

Consequently, Hausdorff measures generalize the familiar ideas of length,area and volume.

Let us review Eq. (9.23). For any set F and δ < 1, Hsδ (F ) is a non-

increasing function of s. According to Eq. (9.24), it can be shown thatHs(F ) is also a non-increasing function of s. In fact, the stronger conclusionis that if t > 0 and Ui is a δ-cover of F , we have

Htδ(F ) ≤

∑i

|Ui|t ≤ δt−s∑i

|Ui|s. (9.25)

We take the infimum, that is

Htδ(F ) ≤ δt−sHs

δ (F ).

Definition 9.7 Let δ → 0, if Hs(F ) < ∞, then Ht(F ) = 0 for s < t.Therefore, there exists a critical value of s, such that Hs(F ) jumps from∞ to 0 at this point. This critical value is called Hausdorff Dimension ofF , and it is symbolized by dimH F .

Formally, we have

dimH F = inf s : Hs(F ) = 0 = sup s : Hs(F ) =∞ , (9.26)

and

Hs(F ) = ∞ if s < dimH F

0 if s > dimH F

If s = dimH F , probably Hs(F ) is 0 or ∞, or may satisfy

0 < Hs(F ) <∞.A Borel set is called an s-set if the latter condition as shown in the aboveis satisfied. More details about Hausdorff dimension can be found in [Fal-coner, 1990; Falconer, 1985]. Hausdorff dimension is the oldest and proba-bly the most important one of the fractal dimensions. It has the followingadvantages: (1) Hausdorff dimension can be defined for any set. (2) It ismathematically convenient. (3) It is based on measures, which are relativelyeasy to manipulate. However, the major disadvantage of the Hausdorff di-mension is that it is difficult to compute or to estimate in many cases. In

Page 382: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Wavelet-Fractal Scheme 363

practice, box-computing dimension is convenient to apply. Therefore, ourstudy will focus on the box-computing dimension.

Fundamental to most definitions of dimension is the idea of measure-ment at scale δ. For each δ, a set can be measured in a way that ignoresirregularities of size less than δ, and we see how these measurements behaveas δ → 0 [Falconer, 1990].

Suppose F is a plane curve, the measurement Mδ(F ) denotes the num-ber of sets (with length δ) which divide the set F . A dimension of F isdetermined by the power law obeyed by Mδ(F ) as δ → 0. If

Mδ(F ) ∼ Kδ−s, (9.27)

where K and s are constants, we might say that F has dimension s, and Kcan be considered as “ s-dimensional length” of F .

Taking the logarithm of both sides in Eq. (9.27) yields the formula:

log2Mδ(F ) & log2K − s log2 δ,

in the sense that the difference of the two sides tends to 0 with δ, we have

s = limδ→0

log2Mδ(F )− log2 δ

. (9.28)

From the above equation, s can be regarded as a slope on a log-log scale[Falconer, 1990].

Box-computing dimension or box dimension is one of the most widelyused fractal dimensions. The popularity of the Box-computing dimensionis largely due to its relative ease of mathematical calculation and empiricalestimation.

Let F be a non-empty and bounded subset of IRn, ξ = ωi : i =1, 2, 3, ... be covers of the set F as shown in Fig. 9.10. Nδ(F ) denotesthe number of covers, such that

Nδ(F ) = |ξ : di ≤ δ|,

where di stands for the diameter of the i-th cover. This equation meansthat Nδ(F ) is the smallest number of subsets which cover the set F , andtheir diameters di’s are not greater than δ (Fig. 9.10).

Page 383: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

364 Feature Extraction by Wavelet Sub-Patterns and Divider Dimensions

id iw

F

Fig. 9.10 Opening covers with diameters di’s covering F .

The upper and lower bounds of the box-computing dimension of F canbe defined by the following formulas:

dimBF = lim infδ→0

log2Nδ(F )− log2 δ

, (9.29)

dimBF = limδ→0

log2Nδ(F )− log2 δ

, (9.30)

where the over line of dimBF stands for the upper bound of dimensionwhile the under line of dimBF for lower bound. An example of the upperbound and lower bound is shown in Fig. 9.11

Definition 9.8 If both the upper bound dimBF and the lower bounddimBF are equal, i.e.

lim infδ→0

log2Nδ(F )− log2 δ

= limδ→0

log2Nδ(F )− log2 δ

,

Page 384: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Wavelet-Fractal Scheme 365

lim f(x)

x 0lim f(x)

x 0

f(x)

Fig. 9.11 Upper and lower bounds of a function.

the common value is called box-computing dimension or box dimension ofF , namely:

dimB F = limδ→0

log2Nδ(F )− log2 δ

. (9.31)

Further discussions on fractal theory can be found in [Edgar, 1990; Falconer,1990].

9.3.2 The Divider Dimension of One-Dimensional Patterns

In the preceding sections, we have shown how to carry out ring-projectionsto reduce an original two-dimensional pattern, such as alphanumeric sym-bols, into an one-dimensional pattern, and furthermore described how toapply wavelet transform to the resulting one-dimensional patterns in orderto obtain a set of wavelet transformed sub-patterns. Such sub-patterns arein fact non-self-intersecting curves. In this subsection, we shall address theproblem of computing the divider dimension of those curves, and there-after, use the computed divider dimension to construct a feature vector forthe original two-dimensional pattern in question for pattern recognition. In

Page 385: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

366 Feature Extraction by Wavelet Sub-Patterns and Divider Dimensions

what follows, we shall first formally define the notion of divider dimensionof a non-self-intersecting curve.

Definition 9.9 Suppose that C is a non-self-intersecting curve, and δ >0. Let Mδ(C) be the maximum number of ordered sequence of pointsx0, x1, · · · , xM on curve C, such that | xk − xk−1 |= δ for k = 1, 2, · · · ,M .The divider dimension, dimDC, of curve C is defined as follows:

dimDC = limδ→0

logMδ(C)− log δ

(9.32)

where | xk − xk−1 | represents the magnitude of the difference between twovectors xk and xk−1, as illustrated in Fig. 9.12.

X0

X1

X2

X3Xk-1

Xk

XM-1

XM XT

O X

Y

Fig. 9.12 The difference between two vectors on curve C.

It should also be mentioned that xM is not necessarily the end pointof curve C, xT , but | xT − xM |< δ. Furthermore, (Mδ(C) − 1)δ may beviewed as the “length” of curve C as measured using a pair of divider thatare set δ distance apart.

If the readers are interested in the details of the divider dimension, whocan refer to [Falconer, 1990].

Page 386: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Experiments 367

9.4 Experiments

This section presents the procedure as well as the results of our experimentsthat aim at recognizing a set of two-dimensional patterns.

9.4.1 Experimental Procedure

The key steps of the experimental procedure consist of the following:

Step 1. Ring-projection of two-dimensional patterns:We denote each of the two-dimensional patterns in question byp(x, y). Thus, the ring-projection of p(x, y) can be expressed asfollows:

f(xk) =M∑i=0

p(xk cos θi, xk sin θi) (9.33)

Step 2. Wavelet transform of the one-dimensional patterns:Let f(xk) = cj,k, where k = 0, 1, · · · , 2N − 1. and

S20A = cj,k = cj,0, cj,1, · · · , cj,2N−1.Thus, the expressions for the wavelet transform of S20A can bewritten as follows:

cj+1,m =5∑

k=0

hkcj,k+2m

dj+1,m =5∑

k=0

gkcj,k+2m (9.34)

where m = 0, 1, · · · , N − 1.Hence, the wavelet transformed sub-patterns of S20A obtained us-ing Eq. (9.34) will become:

S21A = cj+1,0, cj+1,1, · · · , cj+1,N−1

W21A = dj+1,0, dj+1,1, · · · , dj+1,N−1Step 3. Computation of divider dimensions for wavelet transformed

sub-patterns:

Page 387: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

368 Feature Extraction by Wavelet Sub-Patterns and Divider Dimensions

Since the divider dimensions of non-self-intersecting curves are asymp-totic values, we can derive their approximations based on the fol-lowing expression:

logMδ(C)− log δ

when δ is set small enough.In our experiments, we performed three consecutive wavelet trans-formations for each one-dimensional pattern. Hence, the 1-D pat-tern, such as the ring-projection of letter A, will yield seven non-self-intersecting curves, namely:

S20A, S21A, S22A, S23A, W21A, W22A, W23A

For each of the seven curves, we further compute its divider dimen-sion, and therefore, relate each symbol with a feature vector.

9.4.2 Experimental Results

This sub-section presents the results of our experiments that aim at rec-ognizing a set of two-dimensional patterns, including a sub-set of Chinesecharacters, 52 upper and lower case English letters, and ten numeric digitsplus additional ten ASCII symbils. All samples were rotated at different an-gles. Examples of Chinese character “Xin” (in English it means heart) andEnglish letter “g” rotated at 0, 75, 150, 225, and 300 are illustrated inFig. 9.13. The 52 upper and lower case alphabets with five different fontswere considered in the feature-vector computation.

In our experiments, we performed three consecutive wavelet transformfor each one-dimensional pattern. Hence, the one-dimensional pattern, suchas the ring-projection of Chinese character “Da” (in English it means big),will yield seven non-self-intersecting curves, namely,

V0, V1, V2, V3, W1, W2, W3,

since

V0 = W1 ⊕ V1

= W1 ⊕W2 ⊕ V2

= W1 ⊕W2 ⊕W3 ⊕ V3.

Page 388: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Experiments 369

75 150 3000 225

75 150 3000 225

Fig. 9.13 Examples of Chinese character “Xin” (Heart) and English letter “g” rotatedat 0, 75, 150, 225, and 300.

The graphical illustration is shown in Fig. 9.14, where the curves (a),(c), (g), (i) and (d), (h), (j) represent V0 - V3 through W1 - W3 respectively.Note that f(x) is the one-dimensional pattern of Chinese character “Da”(Big), and V0 is f(x) itself in this case. Fig. 9.14(b) is the frequencyspectrum of V0, while Fig. 9.14(e) is the frequency spectrum of V1. Bycomparing these two frequency spectra, we can find that V0 contains allfrequency components of f(x), while V1 contains only one half of frequencycomponents of f(x). The reason is that V0 is divided into two parts:

V0 = V1 ⊕W1,

As for the first part, V1, only the low-frequency components of V0 are kept,and the high-frequency components are lost. In addition, only the high-frequency components of V0 are kept, and the low-frequency componentsare lost in W1. Similarly, V1 is further divided into two parts:

V1 = V2 ⊕W2,

where, the low-frequency components of V1 remain in V2, while the high-frequency components of V1 are kept in W2. Hence, V2 contains only onehalf of frequency components of V1, that is only one quarter of frequency

Page 389: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

370 Feature Extraction by Wavelet Sub-Patterns and Divider Dimensions

W

a

1 (ω) for 1

e

W

F

g

1

d

h

V

for

i

1

c

j

(ω)

(ω)

f

VF

b

F

3W3V2W2V

f(x)

Fig. 9.14 Wavelet transform sub-patterns of Chinese character “Da” (Big) and theirfrequency analyses.

components of f(x). Again for the same reason, V3 contains only one eighthof frequency components of f(x), etc..

A series of experiments have been conducted to verify the proposedmethod. The results are shown in Figs. 9.14 - 9.19.

After wavelet decomposition, a pattern has produced seven sub-patterns.For each of the seven curves, we further computed its divider Dimension,

Page 390: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Experiments 371

(ω)

(ω)

1V 1W

for 1W(ω)Ffor 1VF

F

3W3V2W2V

f(x)

Fig. 9.15 Wavelet transform sub-patterns of Chinese character “Tai” (Too much) andtheir frequency analyses.

and therefore, related each pattern with a feature vector. The experimentdata consist of a sub-set of Chinese characters and a set of printed alphanu-meric symbols, including 26 alphabets in both upper and lower cases, 10numeric digits, and additional 10 ASCII symbols. For the printed alphanu-meric symbols, their feature vectors are presented in Tables 9.1 - 9.4, wherethe values in each row indicate the divider dimensions of seven sub-patterns

Page 391: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

372 Feature Extraction by Wavelet Sub-Patterns and Divider Dimensions

(ω)

(ω)

1V 1W

for 1W(ω)Ffor 1VF

F

3W3V2W2V

f(x)

Fig. 9.16 Wavelet transform sub-patterns of Chinese character “Quan” (Dog) and theirfrequency analyses.

for each symbol.

Page 392: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Experiments 373

char S20(∗) S21(∗) W21(∗)

A 1.1139433384 1.1047174931 1.0648593903B 1.1238559484 1.1136001348 1.0730702877C 1.1167527437 1.1132092476 1.0624803305D 1.1197948456 1.1136578321 1.0700432062E 1.1139442921 1.1020903587 1.0629045963F 1.1100301743 1.0874330997 1.0602608919G 1.1257215738 1.1170243025 1.0674185753H 1.1142077446 1.1060614586 1.0664664507I 1.0840704441 1.0549546480 1.0441081524J 1.1017495394 1.0808098316 1.0476298332K 1.1139196157 1.0974267721 1.0708941221L 1.1026504040 1.0669544935 1.0534558296M 1.1212527752 1.1126092672 1.0775213242N 1.1176242828 1.1083389521 1.0729970932O 1.1214458942 1.1196649075 1.0770056248P 1.1121571064 1.1039747000 1.0661952496Q 1.1247720718 1.1199330091 1.0716108084R 1.1206896305 1.1102559566 1.0806628466S 1.1185953617 1.1158298254 1.0743304491T 1.1036618948 1.0789839029 1.0521930456U 1.1125218868 1.1064934731 1.0647976398V 1.1079084873 1.0890588760 1.0515108109W 1.1243741512 1.1173660755 1.0764572620X 1.1142315865 1.0871822834 1.0648663044Y 1.1017326117 1.0773953199 1.0506635904Z 1.1157565117 1.1043380499 1.06405603890 1.1168053150 1.1078009605 1.06193745141 1.1028971672 1.0694137812 1.05193758012 1.1089236736 1.0893353224 1.06899988653 1.1099339724 1.0979336500 1.05792200574 1.1061652899 1.0899257660 1.05592489245 1.1143358946 1.0999945402 1.07303798206 1.1117491722 1.0993975401 1.05900168427 1.1040900946 1.0803054571 1.04959309108 1.1123523712 1.1005206108 1.05840802199 1.1148401499 1.1010701656 1.0597313643

Table 9.1 Divider dimensions computed for 72 printed symbols

Page 393: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

374 Feature Extraction by Wavelet Sub-Patterns and Divider Dimensions

char S22(∗) W22(∗) S23(∗) W23(∗)

A 1.0620796680 1.0203253031 1.0321298838 1.0096461773B 1.0757583380 1.0170320272 1.0424953699 1.0116459131C 1.0778726339 1.0138599873 1.0455238819 1.0122945309D 1.0791871548 1.0267117023 1.0460337400 1.0130724907E 1.0550003052 1.0216575861 1.0250078440 1.0069218874F 1.0459311008 1.0240161419 1.0195240974 1.0061128139G 1.0895853043 1.0255262852 1.0553485155 1.0214713812H 1.0645886660 1.0131975412 1.0322223902 1.0091987848I 1.0211712122 1.0151667595 1.0079869032 1.0055073500J 1.0463556051 1.0200892687 1.0200742483 1.0079109669K 1.0503554344 1.0194057226 1.0224356651 1.0070123672L 1.0315659046 1.0158586502 1.0114238262 1.0061960220M 1.0746159554 1.0180855989 1.0394244194 1.0094848871N 1.0676525831 1.0181691647 1.0326002836 1.0105568171O 1.0961915255 1.0249220133 1.0584391356 1.0235477686P 1.0630793571 1.0239624977 1.0319234133 1.0084927082Q 1.0963153839 1.0238838196 1.0569688082 1.0244978666R 1.0684889555 1.0262739658 1.0370421410 1.0095887184S 1.0754898787 1.0259306431 1.0420234203 1.0142017603T 1.0403193235 1.0152760744 1.0144587755 1.0082896948U 1.0712003708 1.0221848488 1.0397174358 1.0074933767V 1.0530000925 1.0157818794 1.0261570215 1.0078532696W 1.0759001970 1.0372149944 1.0386097431 1.0088177919X 1.0430511236 1.0131111145 1.0191410780 1.0054205656Y 1.0399550200 1.0197407007 1.0164992809 1.0062215328Z 1.0620642900 1.0264353752 1.0310798883 1.00843369960 1.0728080273 1.0246663094 1.0417411327 1.00790858271 1.0326262712 1.0114061832 1.0116872787 1.00714480882 1.0527602434 1.0210211277 1.0254948139 1.00660896303 1.0563023090 1.0109890699 1.0268583298 1.00939881804 1.0551825762 1.0126544237 1.0278050900 1.00513887415 1.0546742678 1.0228652954 1.0254955292 1.00885820396 1.0559306145 1.0179107189 1.0281671286 1.00882554057 1.0430243015 1.0153788328 1.0195813179 1.00598621378 1.0582846403 1.0142199993 1.0291059017 1.00857830059 1.0582153797 1.0221956968 1.0298372507 1.0067170858

Table 9.2 Divider dimensions computed for 72 printed symbols (continued)

Page 394: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Experiments 375

char S20(∗) S21(∗) W21(∗)

a 1.1124289036 1.1017379761 1.0647013187b 1.1129053831 1.1025065184 1.0577483177c 1.1096138954 1.1018588543 1.0524585247d 1.1138308048 1.1023379564 1.0613058805e 1.1173223257 1.1131840944 1.0712224245f 1.0966352224 1.0739761591 1.0401916504g 1.1138812304 1.1035263538 1.0677573681h 1.1104953289 1.0909165144 1.0611625910i 1.0898797512 1.0654842854 1.0428867340j 1.0985819101 1.0733737946 1.0505572557k 1.1036610603 1.0771027803 1.0567890406l 1.0866196156 1.0642234087 1.0423823595m 1.1117404699 1.1028811932 1.0665664673n 1.1099185944 1.1014550924 1.0498541594o 1.1197787523 1.1124036312 1.0888708830p 1.1132911444 1.1032136679 1.0608453751q 1.1141122580 1.1080610752 1.0727815628r 1.0962741375 1.0674076080 1.0423336029s 1.1148400307 1.1055955887 1.0563476086t 1.0966463089 1.0725744963 1.0399602652u 1.1121745110 1.1033401489 1.0550986528v 1.1025810242 1.0756613016 1.0482001305w 1.1197830439 1.1085958481 1.0760765076x 1.1038902998 1.0788321495 1.0512022972y 1.1015509367 1.0733027458 1.0484067202z 1.1092675924 1.0997101068 1.0636947155+ 1.0951038599 1.0682361126 1.0504192114- 1.0777190924 1.0501787663 1.0364004374∗ 1.0885618925 1.0625029802 1.0379626751/ 1.0820037127 1.0522413254 1.0374629498= 1.1034380198 1.0821037292 1.0473917723¿ 1.0986634493 1.0686403513 1.0433781147¡ 1.1005434990 1.0753053427 1.0443359613( 1.0821937323 1.0506196022 1.0377899408) 1.0795989037 1.0480804443 1.0329642296? 1.1018882990 1.0856221914 1.0461981297

Table 9.3 Divider dimensions computed for 72 printed symbols (continued)

Page 395: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

376 Feature Extraction by Wavelet Sub-Patterns and Divider Dimensions

char S22(∗) W22(∗) S23(∗) W23(∗)

a 1.0639376640 1.0190188885 1.0330584049 1.0155755281b 1.0619244576 1.0232038498 1.0326099396 1.0063673258c 1.0650064945 1.0149598122 1.0355489254 1.0124291182d 1.0654503107 1.0228716135 1.0351454020 1.0064482689e 1.0756344795 1.0332411528 1.0424871445 1.0176811218f 1.0408747196 1.0150277615 1.0157804489 1.0071839094g 1.0618500710 1.0178625584 1.0322690010 1.0100055933h 1.0562689304 1.0192553997 1.0275653601 1.0072581768i 1.0308871269 1.0149402618 1.0106828213 1.0073467493j 1.0384023190 1.0228306055 1.0125319958 1.0095375776k 1.0393686295 1.0122373104 1.0165767670 1.0052092075l 1.0321862698 1.0211771727 1.0108287334 1.0083882809m 1.0571626425 1.0170327425 1.0283771753 1.0088099241n 1.0639086962 1.0118888617 1.0350456238 1.0062968731o 1.0819115639 1.0584974289 1.0469623804 1.0224372149p 1.0617285967 1.0226594210 1.0317831039 1.0102237463q 1.0720965862 1.0300858021 1.0401749611 1.0091934204r 1.0329773426 1.0121468306 1.0128583908 1.0058519840s 1.0681239367 1.0374056101 1.0327115059 1.0203156471t 1.0337879658 1.0192551613 1.0106018782 1.0087591410u 1.0648975372 1.0165529251 1.0357654095 1.0063078403v 1.0425969362 1.0102100372 1.0186051130 1.0057344437w 1.0638923645 1.0303624868 1.0287992954 1.0120517015x 1.0377725363 1.0120788813 1.0158277750 1.0059341192y 1.0364419222 1.0107214451 1.0150331259 1.0061452389z 1.0546982288 1.0181393623 1.0260168314 1.0094790459+ 1.0358840227 1.0237274170 1.0138664246 1.0080053806- 1.0249313116 1.0114963055 1.0089241266 1.0068209171∗ 1.0311700106 1.0164752007 1.0129623413 1.0083116293/ 1.0214143991 1.0115058422 1.0073471069 1.0066345930= 1.0502055883 1.0121105909 1.0243492126 1.0072437525¿ 1.0380367041 1.0120087862 1.0165723562 1.0057575703¡ 1.0435506105 1.0124135017 1.0198223591 1.0060656071( 1.0224382877 1.0079113245 1.0076332092 1.0052670240) 1.0189806223 1.0097336769 1.0072559118 1.0047732592? 1.0515812635 1.0236015320 1.0239137411 1.0104774237

Table 9.4 Divider dimensions computed for 72 printed symbols (continued)

Page 396: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Experiments 377

(ω)

1V 1W

for

F

1WFfor 1V(ω) (ω)F

f(x)

V2 W 2 V3 W 3

Fig. 9.17 Wavelet transform sub-patterns of Chinese character “Fu” (Husband) and

their frequency analyses.

Page 397: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

378 Feature Extraction by Wavelet Sub-Patterns and Divider Dimensions

(ω)

(ω)

1V 1W

for 1W(ω)Ffor 1VF

F

3W3V2W2V

f(x)

Fig. 9.18 Wavelet transform sub-patterns of Chinese character “Tian” (Sky) and their

frequency analyses.

Page 398: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Experiments 379

(ω)

(ω)

1V 1W

for 1W(ω)Ffor 1VF

F

3W3V2W2V

f(x)

Fig. 9.19 Wavelet transform sub-patterns of Chinese character “Yao” (Die prematurely)

and their frequency analyses.

Page 399: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

This page intentionally left blankThis page intentionally left blank

Page 400: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Chapter 10

Document Analysis by Reference LineDetection with 2-D Wavelet

Transform

Document processing has become a very active topic in areas of patternrecognition, office automation, artificial intelligence and knowledge engi-neering for a decade [Tang et al., 1994]. The acquisition of knowledge fromdocuments by an information system can involve an extensive amount ofhand-crafting which can be time-consuming. Actually, it is a bottleneck ofinformation systems. Thus, automatic knowledge acquisition from docu-ments is an important subject, and many researchers are trying to find newtechniques of processing documents. In reality, it is very difficult to developa general system that can process all kinds of documents, such as technicalreports, government files, newspapers, books, journals, magazines, letters,bank cheques, etc. As the first step, many researchers concentrated theystudies to developing specific ones to treat some specific types of docu-ments. After carefully studying the major characteristics of different typesof documents, the specific properties of form documents have been analyzedin our earlier work [Tang et al., 1995c]. According to these properties, wehave taken the approach of building a simpler system for processing formdocuments, instead of a complex one for all sorts of documents.

First, let us consider the major characteristics of forms:

• In general, a form consists of straight lines, which are orientedmostly in horizontal and vertical directions. These lines are referredto as reference lines, which can be found in an example, a Canadiancheque, shown in Fig. 10.1(a).• The reference lines are pre-printed to guide the users to complete

the form. A typical example is a bank cheque, where reference linesare printed to guide the users to write in the name of the payee,

381

Page 401: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

382 Document Analysis by Reference Line Detection with 2-D Wavelet Transform

Fig. 10.1 (a) A Canadian cheque image, and (b) the item images extracted from (a).

amount, and date in the appropriate places.• Not all the information in a form is useful. The information that

should be entered to computer and processed is usually the filleddata. For example, in Fig. 10.1(a), the date, numeric amount, legalamount and signature are the filled data. These data shown in Fig.10.1(b) need to extracted from the cheque image Fig. 10.1(a).• In order to indicate the filling position, the reference lines can be

used and the filled information usually appears either above, be-neath, or beside these reference lines. Thus, in form processing,the reference lines have to be detected first, then we can find theuseful information from a form based on them, and thereafter, enterto the computers.

Page 402: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Two-Dimensional MRA and Mallat Algorithm 383

Consequently, extraction of such reference lines plays a very important rolein the form processing. However, the extraction of the reference lines froma complex-background document is a difficult task. A traditional methodto detect lines from images is the Hough transform. In 1994, the journalIEEE PAMI published a new method called SLIDE (Subspace-Based LineDetection) proposed by Aghajan and Kailath [Aghajan and Kailath, 1994].The SLIDE yields closed-form and high resolution estimates for line pa-rameters, and its computational complexity and storage requirement arefar less than those of the Hough transform.

In this chapter, a novel wavelet-based method will be presented. In thismethod, two-dimensional multiresolution analysis (MRA), wavelet decom-position algorithm , and compactly supported orthonormal wavelets areused to transform a document image into several sub-images. Based onthese sub-images, the reference lines of a complex-background documentcan be extracted, and knowledge about the geometric structure of the doc-ument can be acquired. Particularly, this approach appears to be moreefficient in processing form documents with multi-grey level background.

10.1 Two-Dimensional MRA and Mallat Algorithm

The principle of the 1-D multiresolution analysis (MRA) presented in Chap-ter 3 can be extended directly to 2-D multiresolution by replacing L2(R)with L2(R2).

First of all, we declare that, as in the last chapter we use the subspacesin Vj by the order of

· · · ⊂ Vj+1 ⊂ Vj ⊂ Vj−1

when we deal with MRAs in this chapter.

Definition 10.1 Let Vjj ∈ Z be a sequence of closed subspaces inL2(R). The 2-D MRA can be constructed by tensor product space V 2

j j∈Z

if and only if Vjj∈Z is a 1-D MRA in L2(R), and

V 2j = Vj ⊗ Vj . (10.1)

The scaling function Φ(x, y) for 2-D MRA has the form of

Φ(x, y) = ϕ(x)ϕ(y),

Page 403: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

384 Document Analysis by Reference Line Detection with 2-D Wavelet Transform

where ϕ is the real scaling function of the 1-D multiresolution analysisVjj∈Z. For each j ∈ Z, the orthonormal bases of V 2

j can be produced bythe function system of

Φj,k1,k2 = ϕj,k1(x)ϕj,k2 (y)|(k1, k2) ∈ Z2.

Such multiresolution analysis V 2j j∈Z in space L2(R2) is called divisible

MRA.We define a wavelet space W 2

j = (V 2j )⊥, i.e. V 2

j ⊕W 2j = V 2

j−1. Thusthe wavelet function consists of three basic wavelet functions: ψ1, ψ2 andψ3. The orthonormal bases of the wavelet space W 2

j can be obtained fromthe “single wavelets” ψ1, ψ2 and ψ3 by a binary dilation i.e. dilation by2j and dyadic translation (of k/2j). More precisely, we have the followingtheorem:

Theorem 10.1 Let V 2j j∈Z be a divisible MRA in L2(R2): V 2

j = Vj⊗Vj ,where Vjj∈Z is a 1-D MRA in the space L2(R) with scaling function ϕ

and wavelet function ψ. We define the following three functions:

ψ1(x, y) = ϕ(x)ψ(y)ψ2(x, y) = ψ(x)ϕ(y)ψ3(x, y) = ψ(x)ψ(y)

For any j ∈ Z, the orthonormal bases of the space W 2j can be obtained

from the following function system:Ψ1j,k,m = ϕj,k(x)ψj,m(y)

Ψ2j,k,m = ψj,k(x)ϕj,m(y)

Ψ3j,k,m = ψj,k(x)ψj,m(y)

Therefore, the function system

Ψej,k,m|e = 1, 2, 3; j, k,m ∈ Z (10.2)

becomes a set of orthonormal bases of L2(R2).Proof

From Eq. (10.1) a very significant formula can be produced

V 2j−1 = Vj−1 ⊗ Vj−1

= (Vj ⊕Wj)⊗ (Vj ⊕Wj)

= (Vj ⊗ Vj)⊕ (Vj ⊗Wj)⊕ (Wj ⊗ Vj)⊕ (Wj ⊗Wj). (10.3)

Page 404: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Two-Dimensional MRA and Mallat Algorithm 385

It can be rewritten as

V 2j−1 = Vj−1 ⊗ Vj−1

= (Vj ⊗ Vj)⊕ (Vj ⊗Wj)⊕ (Wj ⊗ Vj)⊕ (Wj ⊗Wj)

= V 2j ⊕ [(Vj ⊗Wj)⊕ (Wj ⊗ Vj)⊕ (Wj ⊗Wj)]︸ ︷︷ ︸

W 2j

(10.4)

Since ϕj,k|k ∈ Z is an orthonormal base for Vj , the set ψj,k|k ∈ Zbecomes the orthonormal bases of the space Wj . Therefore,

• Ψ1j,k,m|m ∈ Z is an orthonormal base of Vj ⊗Wj ;

• Ψ2j,k,m|m ∈ Z is an orthonormal base of Wj ⊗ Vj ;

• Ψ3j,k,m|m ∈ Z is an orthonormal base of Wj ⊗Wj .

Consequently, Eq. (10.4) indicates that the function represented by Eq. (10.2)has constituted the orthonormal bases of W 2

j .

Let Pj , D1j , Q

2j and Q3

j be projection operators from L2(R2) to itssubspaces (Vj ⊗ Vj), (Vj ⊗ Wj), (Wj ⊗ Vj) and (Wj ⊗ Wj) respectively.In practice, the document image f(x, y) ∈ V 2

j1 has a limited resolution,namely: j1 is a certain integer. We have

f(x, y) = Pj1f(x, y)

=∑k1∈Z

∑k2∈Z

cj1,k1,k2Φj1,k1,k2

=∑k1∈Z

∑k2∈Z

cj1,k1,k2ϕj1,k1(x)ϕj1,k2(y)

= Pj1+1f +Q1j1+1f +Q2

j1+1f +Q3j1+1f, (10.5)

where

cj1,k1,k2 =< Pj1+1f(x, y), ϕj1,k1(x)ϕj1,k2(y) >,

and

• Pj1f ∈ Vj1 ⊗ Vj1 ;• Pj1+1f ∈ Vj1+1 ⊗ Vj1+1;• Q1

j1+1f ∈ Vj1+1 ⊗Wj1+1;• Q2

j1+1f ∈Wj1+1 ⊗ Vj1+1;• Q3

j1+1f ∈Wj1+1 ⊗Wj1+1.

Page 405: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

386 Document Analysis by Reference Line Detection with 2-D Wavelet Transform

In Eq. (10.5), Pj1+1f and Qβj1+1f (β = 1,2,3) can be computed by

Pj1+1f =∑m1∈Z

∑m2∈Z

cj1+1,m1,m2Φj1+1,m1,m2

=∑m1∈Z

∑m2∈Z

cj1+1,m1,m2ϕj1+1,m1(x)ϕj1+1,m2(y),

and

Qβj1+1f =∑m1∈Z

∑m2∈Z

dβj1+1,m1,m2Ψβj1+1,m1,m2

=∑m1∈Z

∑m2∈Z

dβj1+1,m1,m2ψβj1+1,m1

(x)ψβj1+1,m2(y) (β = 1, 2, 3).

Eq. (10.5) can be written below:

f(x, y) = Pj1+1f +Q1j1+1f +Q2

j1+1f +Q3j1+1f

=∑m1∈Z

∑m2∈Z

cj1+1,m1,m2ϕj1+1,m1(x)ϕj1+1,m2(y)

=∑m1∈Z

∑m2∈Z

d1j1+1,m1,m2

ϕj1+1,m1(x)ψj1+1,m2(y)

=∑m1∈Z

∑m2∈Z

d2j1+1,m1,m2

ψj1+1,m1(x)ϕj1+1,m2(y)

=∑m1∈Z

∑m2∈Z

d3j1+1,m1,m2

ψj1+1,m1(x)ψj1+1,m2(y).

An iterative algorithm called Mallat algorithm is presented as follows:

cj1+1,m1,m2 =∑k1∈Z

∑k2∈Z

hk1−2m1hk2−2m2cj1,k1,k2

d1j1+1,m1,m2

=∑k1∈Z

∑k2∈Z

hk1−2m1gk2−2m2cj1,k1,k2

d2j1+1,m1,m2

=∑k1∈Z

∑k2∈Z

gk1−2m1hk2−2m2cj1,k1,k2

d3j1+1,m1,m2

=∑k1∈Z

∑k2∈Z

gk1−2m1gk2−2m2cj1,k1,k2

. (10.6)

Page 406: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Detection of Reference Line from Sub-Images by the MRA 387

Let Hr = (Hk1,m1), Hc = (Hk2,m2), Gr = (Gk1,m1), and Hc = (Gk2,m2)be matrices. The subscript “r” indicates an operation on the rows of the ma-trix, while the subscript “c” for operation on the column. Thus, Eq. (10.6)can be represented by a simple form:

Cj1+1 = HrHcCj1Q1j1+1 = HrGcCj1

Q2j1+1 = GrHcCj1

Q3j1+1 = GrGcCj1

. (10.7)

Pj1+1f will be decomposed in the same way, and Pj1+2f and Qβj1+2f will beproduced. This iteration procedure will be continued. After j2 − j1 steps,we arrive at

f(x, y) = Pj2f(x, y) +j2∑

j=j1+1

3∑β=1

Qβj f(x, y) (10.8)

10.2 Detection of Reference Line from Sub-Images by theMRA

In this section, the basic idea of form analysis by the MRA will be pre-sented. First, we will introduce the properties of the wavelet transformedsub-images. A document image can be transformed into four sub-imagesby applying the Mallat algorithm, namely, (1) LL sub-image, (2) LH sub-image, (3) HL sub-image, and (4) HH sub-image. According to Eq. (10.3),these sub-images possess the following properties:

• LL sub-image: both horizontal and vertical directions have low-frequencies. It corresponds to (Vj ⊗ Vj), and its orthonormal basisis Φj,k,m|k,m ∈ Z.• LH sub-image: the horizontal direction has low-frequencies, and

the vertical one has high-frequencies. It corresponds to (Vj ⊗Wj),and its orthonormal basis is Ψ1

j,k,m|k,m ∈ Z.• HL sub-image: the horizontal direction has high-frequencies, and

the vertical one has low-frequencies. It corresponds to (Wj ⊗ Vj),and its orthonormal basis is Ψ2

j,k,m|k,m ∈ Z.• HH sub-image: both horizontal and vertical directions have high-

frequencies. It corresponds to (Wj⊗Wj), and its orthonormal basis

Page 407: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

388 Document Analysis by Reference Line Detection with 2-D Wavelet Transform

is Ψ3j,k,m|k,m ∈ Z.

An example is illustrated in Fig. 10.2. The original image is a squarewith grey level shown in Fig. 10.2(a). It has been transformed into four sub-images by the MRA, illustrated in Fig. 10.2(b). The LL sub-image is theresult from a filter, which allows lower frequencies to pass through along thehorizontal direction as well as the vertical direction. That is a “smoothing”effect on both directions. The HH sub-image comes from a filter where thehigher frequency components can cross it along both directions. That is an“enhancing” effect on the horizontal and vertical directions.

We are interested in the LH and HL sub-images. The LH sub-imageis achieved from a filter which allows lower frequency components to reachacross along the horizontal direction, as well as the higher frequencies alongthe vertical direction. That is an “enhancing” effect on the vertical, and“smoothing” effect on the horizontal. The result of the HL sub-image isopposite to that of the LH one. In this way, the horizontal direction of thefilter opens for the higher frequencies, and the vertical direction for lowerfrequency components. That is an “enhancing” effect on the horizontal,and “smoothing” effect on the vertical.

Another example can be shown in Figs. 10.3 and 10.4. The input im-age is illustrated in Fig. 10.3, which contains several lines with complex-background including texts. Its LH and HL sub-images are depicted inFigs. 10.4(a) and (b) respectively.

From Fig. 10.4(a), it is clear that only horizontal lines remain in the LHsub-image, while only vertical ones remain in the HL sub-image as shown inFig. 10.4(b). Both the LH and HL sub-images keep only straight lines, thegrey-level background is removed. We are interested in Figs. 10.4(b) and(c), because these important properties can be used to extract the horizon-tal and vertical lines in a form document, which has complex-background.In form documents, the information that should be entered to the computerand processed is usually the filled data. In order to indicate the filling po-sition, some pre-printed reference lines should be extracted. The usefulinformation, in general, is either above, beneath, or beside these specificlines. In our work, the LH and HL sub-images have been used to extractsuch lines.

To perform the above proposed method, an MRA algorithm and com-pactly supported orthonormal wavelets are used.

Page 408: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Detection of Reference Line from Sub-Images by the MRA 389

LL HL

LH HH

(a)

(b)

Fig. 10.2 A square image and its sub-images.

Page 409: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

390 Document Analysis by Reference Line Detection with 2-D Wavelet Transform

Fig. 10.3 Input image.

10.3 Experiments

Using sub-images of wavelet, experiments have been conducted to processfinancial documents by a personal computer system. The document is en-tered into the system by an optical scanner and converted to a digital image.A document can be digitized into a color image, monochrome grey scale im-age or binary image according to different requirements and applications.In our experiments, an HP scanner is employed to capture the image ofthe document. The resolution of digitization in our experiments can varyover a range of 200-300 DPI. All documents are converted to gray scaleimages in the experiments. We have examined a variety of form documentsoriginated from United States, Canada, and China. They contain alpha-

Page 410: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Experiments 391

(a) LH sub-image (b) HL sub-image

Fig. 10.4 LH and HL sub-images.

numerics, Chinese characters, some special symbols and graphics. Bothsimple financial documents such as Canadian bank cheques and complexdocuments such as Canadian Federal tax return forms and deposit formsof Chinese bank have been tried by our new method. Because of the pagelimit in this chapter, only a few examples will be presented, namely:

(1) Cheque of a Canadian bank (TD Bank) (Fig. 10.5);(2) Portion of a Federal tax return form (Fig. 10.6);(3) Deposit form of Chinese bank (Fig. 10.8).

In these experiments, the 2-D MRA algorithm has been applied. Thecompactly supported orthonormal wavelets used in our study have beenchosen from [Daubechies, 1988], and the values of hk’s are listed in Ta-bles 10.1, 10.2, 10.3, and 10.4.

For the Canadian Bank cheque shown in Fig. 10.5(a), there exists agrey-level background on it. To remove the grey-level background, thespecial properties of the sub-images can be used. Precisely, the grey-levelbackground has been removed in both LH sub-image and HL sub-image.

The LH sub-image results from a filter which allows lower frequencies topass through along the horizontal direction, and higher frequencies alongthe vertical direction. That is an “enhancing” effect on the vertical, and“smoothing” effect on the horizontal. As a result, only horizontal lines

Page 411: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

392 Document Analysis by Reference Line Detection with 2-D Wavelet Transform

hN (n) hN (n)

N=2 n=0 0.482 962 913 145 N=3 n=0 0.332 670 552 9501 0.836 516 303 738 1 0.806 891 509 3112 0.224 143 868 042 2 0.459 877 502 1183 -0.129 409 522 551 3 -0.135 011 020 010

4 -0.085 441 273 8825 0.035 226 291 882

N=4 n=0 0.230 377 813 309 N=5 n=0 0.160 102 397 9741 0.714 846 570 553 1 0.603 829 269 7972 0.630 880 767 930 2 0.724 308 528 4383 -0.027 983 769 417 3 0.138 428 145 9014 -0.187 034 811 719 4 -0.242 294 887 0665 0.030 841 381 836 5 -0.032 244 869 5856 0.032 883 011 667 6 0.077 571 493 8407 -0.010 597 401 785 7 -0.006 241 490 213

8 -0.012 580 751 9999 0.003 335 725 285

Table 10.1 Values of hN (n)’s, N = 2 ∼ 5.

remain in the LH sub-image. The HL sub-image is opposite to the LHone. The high frequency spectrum can pass through along the horizontaldirection, while low frequency spectrum along the vertical direction. Thatis an “enhancing” effect on the horizontal, and “smoothing” effect on thevertical. Thus, only vertical lines remain in the HL sub-image.

In our experiments, the special property of the LH sub-image has beenused. To produce the LH sub-image, the two-dimensional multiresolutionanalysis (MRA) algorithm and compactly supported orthonormal waveletshave been applied to the documents. The LH sub-image of Fig. 10.5(a)has been obtained and shown in Fig. 10.5(b). Since only horizontal linesremain in the LH sub-image, reference lines, which guides the writer to filldata in the proper location, can be extracted.

A point worth noting to mention is that the number of pixels containedin any sub-image is one fourth of that of the original document image.Thus, the size of LH sub-image shown in Fig. 10.5(b) is one fourth of thatof the original cheque image shown in Fig. 10.5(a). To achieve a highquality image and correctly map the filled data with reference lines, the

Page 412: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Experiments 393

(a)

(c)

(b)

Fig. 10.5 A bank cheque and its original and enhanced LH sub-images.

Page 413: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

394 Document Analysis by Reference Line Detection with 2-D Wavelet Transform

hN (n) hN (n)

N=6 n=0 0.111 540 743 350 N=7 n=0 0.077 852 054 0851 0.494 623 890 398 1 0.396 539 319 4822 0.751 133 908 021 2 0.729 132 090 8463 0.315 250 351 709 3 0.469 782 287 4054 -0.226 264 693 965 4 -0.143 906 003 9295 -0.129 766 867 567 5 -0.224 036 184 9946 0.097 501 605 587 6 0.071 309 219 2677 0.027 522 865 530 7 0.080 612 609 1518 -0.031 582 039 318 8 -0.038 029 936 9359 0.000 553 842 201 9 -0.016 574 541 63110 0.004 777 257 511 10 0.012 550 998 55611 -0.001 077 301 085 11 0.000 429 577 937

12 -0.001 801 640 70413 0.000 353 713 800

Table 10.2 Values of hN (n)’s, N = 6 ∼ 7.

LH sub-image has been processed by regular enhancement and smoothingtechniques, and has been scaled up to the same size as the original image.The result can be found in Fig. 10.5(c).

For the form shown in Fig. 10.6, there are altogether 20 horizontallines and many text strings in it. The result of extracting the pre-printedreference lines from the LH sub-image of wavelet is presented in Fig. 10.7.

Note that the extracted lines in both Fig. 10.5(b) and Fig. 10.7(a) aregray-levels, since the document images to be processed in our method aregray scale images.

The last example is a deposit form of Chinese bank as shown in Fig.10.8, which is rather complicated. The original image of the Chinese bankdeposit form is given in Fig. 10.8(a). As applying wavelet decomposition al-gorithm, the reference lines are detected, and shown in Fig. 10.8(b). Basedon these reference lines, the images of the some items which contain theuseful information are extracted, the results are displayed in Fig. 10.8(c).

Page 414: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Experiments 395

hN (n) hN (n)

N=8 n=0 0.054 415 842 243 N=9 n=0 0.038 077 947 3641 0.312 871 590 914 1 0.243 834 674 6132 0.675 630 736 297 2 0.604 823 123 6903 0.585 354 683 654 3 0.657 288 078 0514 -0.015 829 105 256 4 0.133 197 385 8255 -0.284 015 542 962 5 -0.293 273 783 2796 0.000 472 484 574 6 -0.096 840 783 2237 0.128 747 426 620 7 0.148 540 749 3388 -0.017 369 301 002 8 0.030 725 681 4799 -0.044 088 253 931 9 -0.067 832 829 06110 0.013 981 027 917 10 0.000 250 947 11511 0.008 746 094 047 11 0.022 361 662 12412 -0.004 870 352 993 12 -0.004 723 204 75813 -0.000 391 740 373 13 -0.004 281 503 68214 0.000 675 449 406 14 0.001 847 646 88315 -0.000 117 476 784 15 0.000 230 385 764

16 -0.000 253 963 18917 0.000 039 347 320

Table 10.3 Values of hN (n)’s, N = 8 ∼ 9.

hN (n) hN (n)

N=10 n=0 0.026 670 057 901 N=10 n=10 -0.029 457 536 8221 0.188 176 800 078 11 0.033 212 674 0592 0.527 201 188 932 12 0.003 606 553 5673 0.688 459 039 454 13 -0.010 733 157 4834 0.281 172 343 661 14 0.001 395 351 7475 -0.249 846 424 327 15 0.001 992 405 2956 -0.195 946 274 377 16 -0.000 685 856 6957 0.127 369 340 336 17 -0.000 116 466 8558 0.093 057 364 604 18 0.000 093 588 6709 -0.071 394 147 166 19 -0.000 013 264 203

Table 10.4 Values of hN (n)’s, N = 10.

Page 415: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

396 Document Analysis by Reference Line Detection with 2-D Wavelet Transform

Fig. 10.6 Portion of a Federal tax return form.

Page 416: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Experiments 397

(a)

(b)

Fig. 10.7 (a) LH sub-image of the portion of a Federal tax return form shown in Fig.10.6; (b) the enhanced image.

Page 417: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

398 Document Analysis by Reference Line Detection with 2-D Wavelet Transform

Fig. 10.8 (a) An image of the deposit form of Chinese bank; (b) the reference linesdetected from (a); and (c) the item images extracted from (a) according to the referencelines.

Page 418: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Chapter 11

Chinese Character Processing withB-Spline Wavelet Transform

Chinese character recognition is a very significant branch in pattern recogni-tion, and Chinese character processing is an important technology within it.Chinese character processing is to operate and modify the Chinese charac-ters including generation, storage, display, printing, transferring, geometrictransformation, etc. with the modern computer.

In this chapter, several algorithms for Chinese character processing arestudied, based on cubic B-spline wavelet transform, namely:

(1) Compression of Chinese character,(2) Arbitrary enlargement of the typeface size of Chinese character,(3) Generation of Chinese type style.

The outline of Chinese character processing by wavelet transform pre-sented in this chapter is graphically illustrated in Fig. 11.1. It consists ofthree stages, precisely, (1) pre-processing, (2) wavelet transform, and (3)objective processing. They will be presented below:

(1) Pre-processing:

The original character is entered into a computer system by scanning,and it is further undergone by a contour extraction operator. Thus, aChinese character is converted to one or more contours, which can be con-sidered to be curves. Each curve is represented by an array of coordinatepoints, Qi(i = 1, 2, · · · ,M). It is then sent to the next stage.

(2) Wavelet transform:

After the pre-processing stage, a Chinese character is already repre-sented by its contours (curves), and each of them is formed by an array

399

Page 419: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

400 Chinese Character Processing with B-Spline Wavelet Transform

Wavelet

Pre-Processing

Character

Generation

Input

Character

Compression

Coefficients

Contour of

Enlargement

TransformWavelet

Fig. 11.1 Procedure of Chinese character processing with wavelet transform.

of coordinate points Qi(i = 1, 2, · · · ,M). In this stage, the cubic B-splinefunction is employed to interpolate such a parameter curve. Suppose Sn(t)indicates the interpolation curve, which is produced in accordance with thecubic B-spline function, and passes through these coordinate points.

The interpolation curve Sn(t) using cubic B-spline can be written as

Sn(t) = (sn0 (t), sn1 (t), · · · , snM−2(t)), (11.1)

where n stands for the level number of decompositions in wavelet analysis,which will be presented later. sni (t) denotes the ith interpolation sub-curvewith cubic B-spline and can be expressed by

sni (t) =4∑l=1

cni+l−1 ·Nl,3(t), 0 ≤ i ≤M − 2, 0 ≤ t ≤ 1, (11.2)

where Nl,3(t) is a basis function of the cubic B-spline interpolation, whichmeans polynomial spline function with equally spaced sample knots. Cn =(cn0 , c

n1 , · · · , cnM+1, ) is a coefficient sequence, which is called the control point

Page 420: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Chinese Character Processing with B-Spline Wavelet Transform 401

of the cubic B-spline interpolation curve. These control points correspondto the coordinate points (sometimes, those points are called vertices ofeigen-polygon of B-spline).

The relationship between the coordinate points and the control pointsis

(cni−1 + 4cni + cni+1)6

= Qi, i = 1, 2, · · · ,M, (11.3)

there are M equations in (11.3), but there are M + 2 unknown variables.Hence, two boundary conditions are needed to supply. For the interpolationcurve with cubic B-spline, we have the following at the endpoints:

cn0 = cn1 , cnM+1 = cnM .

Consequently, we can obtain a linear equation as follows:1 −1 0 0 0 016

46

16 0 0 0

· · · · · · · · · · · · · · · · · ·0 0 0 1

646

16

0 0 0 0 −1 1

·

cn0cn1· · ·cnMcnM+1

=

0Q1

· · ·QM0

(11.4)

According to the above analysis, it is clear that

• Owing to (11.2) and (11.4), we can find the relationship among thecoordinate points Qi, sub-curves sni and control points cni .• A cubic B-spline curve constructed by Cn = (cn0 , c

n1 , · · · , cnM+1, )

passes through the coordinate points Qi(i = 1, 2, · · · ,M).• By (11.2), four control points produce a sub-curve. M coordinate

points express M − 1 sub-curves, i.e., a curve needs M + 2 controlpoints.• The coordinate points can be converted to the control points by

sloving equation (11.4).

Next, the multiresolution analysis in wavelet theory is applied to de-scribe a curve Sn(t). In this way, the control points, by which the curve isformed, are transformed with wavelet function. For effectively decompos-ing curve, the number of sub-curves is usually 2 to the power n, i.e., curveSn(t) should have 2n + 3 control points. When the control points are lessthan 2n + 3, the coordinate points must be extended as well the controlpoints. The performance of the extension can be periodical spinning out or

Page 421: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

402 Chinese Character Processing with B-Spline Wavelet Transform

adding zeros or re-sampling. For a Chinese character, which is composedof several closed curves, the periodic extension is usually utilized.

When the number of the control points is equal to 2n+3, after the firstdecomposition by wavelet transform, the sequence of the control points Cn

becomes Cn−1 and Dn−1. Thereafter, Cn−1 is decomposed into Cn−2 andDn−2 again. This process continues, as a total number of n decompositions,finally, we arrive at C0 and D0. This process can be illustrated as follows:

Cn = Dn−1 ⊕ Cn−1

⇓(Dn−2 ⊕ Cn−2)

⇓(Dn−3 ⊕ Cn−3)

⇓· · · · · · · · ·⇓

(D0 ⊕ C0)

Consequently, it is clear that the sequence of the control point Cn canbe represented by wavelet coefficients:

Cn =⇒ Cn−1, Cn−2, · · · , C1, C0,

Dn−1, Dn−2, · · · , D1, D0.

Finally, we obtain

Cn = Dn−1 ⊕Dn−2 ⊕ · · · ⊕D1 ⊕D0 ⊕ C0.

The curve Sn can be decomposed as

Sn =⇒ Sn−1, Sn−2, · · · , S1, S0.

An example of this procedure is shown in Fig. 11.2, here we know n = 4.Therefore, four wavelet decomposition layers occur. Owing to Fig. 11.2, wecan further find the relationship between the sub-curves and the controlpoints as well as the relationship between the wavelet coefficients and thesub-curves at the different layers. In this example, we obtain

C4 =⇒ C3, C2, C1, C0,

D3, D2, D1, D0

S4 =⇒ S3, S2, S1, S0

Page 422: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Chinese Character Processing with B-Spline Wavelet Transform 403

Fig. 11.2 Decomposition of cubic B-spline curve.

and

C4 = D3 ⊕D2 ⊕D1 ⊕D0 ⊕ C0.

where the highest frequency in C3 must be greater than that in C2. Inturn, the highest frequency in C2 must be greater than that in C1, etc. Ingeneral, we have

Fmax(Ck) > Fmax(Ck−1)

where Fmax(Ck) denotes the highest frequency in Ck. The same thingappears in Di and Si. Therefore,

Fmax(Dk) > Fmax(Dk−1), Fmax(Sk) > Fmax(Sk−1).

If we consider the curve to be a 1-D signal, this implies that Sk (or Ck orDk) contains more particulars than Sk−1 (or Ck−1 or Dk−1) has.

(3) Objective processing:

In the stage of wavelet transform, a curve is decomposed to severallayers, and the details of the curve at each layer can be described by waveletcoefficients. Therefore, by adequately choosing and processing these wavelet

Page 423: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

404 Chinese Character Processing with B-Spline Wavelet Transform

coefficients, the different objective processing of the Chinese character canbe performed. In this book, compression of characters, arbitrary scale ofthe typeface and generation of Chinese type styles are introduced using thecubic B-spline wavelet transform. In the rest of this chapter, we emphasizethese objective operations and implemention.

11.1 Compression of Chinese Character

Compression of Chinese character is a very important aspect in Chineseinformation processing with computers. It can benefit reducing the amountof character storage memory, speeding up the processing, decreasing thecost, etc.

In the first three stages in Fig. 11.1, each Chinese character is convertedto several contours (closed curves) by the process of extracting strokes anddetecting edges, and the individual curve is estimated by a cubic B-splineexpression, which can be represented by a sequence of control points. Thecontrol points of B-spline curve are transformed into the different layersof details Dn−1, Dn−2, · · · , D1, D0 plus C0 or the different layers of con-trol points Cn−1, Cn−2, · · · , C1, C0 by wavelet transform. Therefore, eachChinese character can be described with wavelet transform coefficients (orcontrol points) at different decomposition layers. According to the charac-teristics of wavelet transform coefficients (or control points), two approachesof compressing Chinese character are presented in this section, namely, (1)global approach, and (2) local approach.

11.1.1 Algorithm 1 (Global Approach)

The method of this algorithm is similar to image compression by wavelettransform. The basic idea is that, under certain accuracy or error range,we consider the entire curve to delete some details Di and reserve less coef-ficients on the basis of the influence of different layer details on the curve.More precisely, in the result of the wavelet decomposition, a threshold J ischosen, so that the certain accuracy is satisfied, and thereafter, based onthis threshold, some wavelet transform coefficients are removed, and someare kept. This can be described as follows:

Dn = Dn−1 ⊕Dn−2 ⊕ · · · ⊕DJ+1︸ ︷︷ ︸Deleted

⊕DJ ⊕DJ−1 ⊕ · · · ⊕D1 ⊕D0 ⊕ C0︸ ︷︷ ︸Kept

Page 424: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Compression of Chinese Character 405

≈ DJ ⊕DJ−1 ⊕ · · · ⊕D1 ⊕D0 ⊕ C0︸ ︷︷ ︸N

.

In this algorithm, a method of the non-fixed length code will be used inencoding these remained details as foolow:

• Give a quatification level L and the maximum absolute value (max)in the residual details;• Calculate the quantified value x of the residual details by the equa-

tion: x = [(L ∗ VD)/max+ 0.5], where VD stands for the value theresidual details, and [.] denotes obtaining the integer value;• In encoding the quantified value x, define two expressions l =

[log2(|x|)] and y = (|x| − 2l) except the value x equating zero.There are two situations to be discussed. If x = 0, the code isrepresented by one byte. If x < 0 or x > 0, the x code is com-posed of three parts such as 0, 0, · · · , 0︸ ︷︷ ︸

l+1

, 1,f lag,(y)2︸︷︷︸l

. Here, the first

part shows the code unique feature, and the second part flag ispositive/negative flag, and the finial part is a binary value with l

representing the quantified value x.

Quantified value Positive value code Negative value code0 1 11 010 0112 00100 001103 00101 001114 0001000 00011005 0001001 0001101· · · · · · · · · · · · · · · · · ·

8 000010000 000011000· · · · · · · · · · · · · · · · · ·

15 000010111 000011111· · · · · · · · · · · · · · · · · ·x 0, 0, · · · , 0︸ ︷︷ ︸

l+1

, 1, 0,(y)2︸︷︷︸l

0, 0, · · · , 0︸ ︷︷ ︸l+1

, 1, 1,(y)2︸︷︷︸l

Table 11.1 Non-fixed length code

As the encoding method mentioned above, some examples are listed in

Page 425: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

406 Chinese Character Processing with B-Spline Wavelet Transform

Table 11.1. At the same time, the compressed data in Algorithm recordinformation as follows:

• Firstly, record the length of the original control points and thenumber of decomposition layers N ;• Then, store the quatification level L and the value max;• Finally, record the code of the details at different layers and the

low-frequency components of the curve C0.

11.1.2 Algorithm 2 (Local Approach)

The second algorithm is a specific one for the curves. The control points ofa curve are decomposed to Cn−1, Cn−2, · · · , C0 by the wavelet transform,which approximate the original curve Sn. Those points at the differentdecomposition layers reflect the characteristics of the sub-curve approxi-mation. The control points in Ck are more close to the original curve thanthese in Ck−1. In a cubic B-spline expression, four control points describea sub-curve. Suppose that at the jth layer, sji is a sub-curve, which is deter-mined by four control points cji , c

ji+1, c

ji+2, c

ji+3(0 ≤ j ≤ (n−1), 0 ≤ i ≤ 2j),

the sub-curve sji corresponds to exactly two (more detailed) curves sj+12i and

sj+12i+1 at the (j + 1)th layer. Consequently, in this case, the number of con-

trol points are added up to 5 from 4. In Fig. 11.2, the sub-curve s20 at thesecond layer corresponds to two curves both s30 and s31 at the third layer,i.e., the curve s20 is the approximation of two curves both s30 and s31. Asthe layers increase, the approximation to the original curve become better.Hence, under a certain error, the entire original curve can be estimated bymany sub-curves established by control points separately at the differentlayers. The steps of algorithm are listed as follows:

Step-1 Given an error, the approximation process starts from the lowestlayer;

Step-2 At the jth layer, the error between the approximated sub-curvesand the original ones is checked at each segment;

Step-3 If the error is less than the given error in a certain segment, thenthe control points of this segment remain, otherwise, the controlpoints at the (j + 1)th layer are chosen, and we repeat the secondstep, and so on, until the whole curve can be described with controlpoints at the different layers.

Page 426: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Compression of Chinese Character 407

In this algorithm, the compressed data are organized as follows:

• The first byte records the length of curve N , i.e. how many seg-ments (sub-curves) on the entire curve have been divided in theapproximation.• The successive bits are used to store a position information of the

control points at each decomposition layer. For example, the ap-proximated curve described by control points of kth segment at thejth layer, k is the position information. According to incrementalchange of the position information, the information code of eachlayer is performed below: (1) To compute the difference value ofthe position information k; (2) To code the difference value accord-ing to the non-fixed length code (Table 11.1).• The last few bits are utilized to quantize and code the control points

of each decomposition layer.

11.1.3 Experiments

The process of our experiment are listed as follows:

(1) To extract the contours (closed curves) from the bitmap image ofa Chinese character.

(2) To check the number of coordinate points (or control points). Thenumber of points is usually 2 to the power n, exactly, curve Sn(t)should have 2n+3 control points. When the control points are lessthan 2n + 3, the coordinate points must be extended as well thecontrol points. The performance of the extension can be periodicalspinning out or adding zeros or re-sampling.

(3) To convert each contour into a cubic B-spline curve.(4) To apply the wavelet transform to control points Cn, and the

wavelet transform coefficients are produced.(5) To choose adequately coefficients according to the above algorithms.(6) To organize compression data by the above approaches.

In this experiment, 120× 120 bitmap images of characters (1800 bytes)with four typeface fonts (Song, Fang Song, Kai and Hei) are chosen. InAlgorithm 1, the quantification level L mainly affects compression ratio. Inthe second algorithm, the given error also have enormous effect on com-pression ratio. Table 11.2 shows the compression results of Algorithms 1

Page 427: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

408 Chinese Character Processing with B-Spline Wavelet Transform

Font CR(Algorithm 1) CR(Algorithm 1) CR(Algorithm 2)

(1800) L = 32 L = 64 ε = 2Songti 6.59 6.12 8.45

F-songti 7.28 6.41 9.20Kaishu 5.46 4.85 7.69Black 6.29 5.47 7.79

Average 6.41 5.71 8.28

Font CR(Algorithm 2) Method of Method of(1800) ε = 1 white and black outline link-codeSongti 5.96 2.25 3.50

F-songti 6.45 1.93 2.61Kaishu 5.90 2.03 3.74Black 5.69 2.67 4.83

Average 6.00 2.22 3.67

Table 11.2 Results of Algorithms 1 and 2 as well as the traditional methods. NoteCR=Compression Ratio.

and 2 as well as the traditional methods. In this table, the quantizationlevel in the first algorithm are 32 or 64. The given error range in the secondalgorithm are 1 or 2 pixels. Examples of the compression of Chinese type-face are illustrated in Figs. 11.3 and 11.4. The compression result using thefirst algorithm is shown in Fig. 11.3, and that using the second algorithmis displayed in Fig. 11.4.

11.2 Enlargement of Type Size with Arbitrary Scale Basedon Wavelet Transform

A font has a particular size and style of type. The size modification ofChinese character, including the reduction and enlargement, is one of themost useful technologies in Chinese character processing systems. Com-pared with the font zooming out, the font enlargement is more difficult tobe realized. Recently, some effective methods, such as the homogeneouscoordinate, the logical equation interpolation, etc., have been proposed todeal with the enlargement of type size of Chinese character with arbitrary(smooth) scale. This section aims at a new method for the font enlargement

Page 428: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Enlargement of Type Size with Arbitrary Scale Based on Wavelet Transform 409

Fig. 11.3 The compressed results using the first algorithm: The first row is an original

Chinese character with four fonts; The second row shows the compression result with thequantization level L = 32; The third one is that result with quantization level L = 64.

with arbitrary scale. In this way, a bitmap image is converted to one ormore contours, then, the arbitrary scale enlargement is performed to thesecontours based on wavelet transform.

11.2.1 Algorithms

In practice application, when a curve (line) is dispalyed or printed on theoutput device, it is formed by a finite amount of unit points such as pixelor dot. For a certain curve, if an amount of unit points is fixed, the higheris the resolution of the output device, the smaller the curve is displayedor printed, vice versa. Thus, under the same resolution, for zooming in acurve, it is necessary to increase the amount of unit points by adding somepixels in the original curve. Several techniques, such as interpolation andcomplement can be used to perform this task.

According to wavelet transform theory, we know that the wavelet re-construction is performed by interpolation. Is it possible to enlarge a curveby a wavelet reconstruction? The answer is definite. In order to do so, we

Page 429: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

410 Chinese Character Processing with B-Spline Wavelet Transform

Fig. 11.4 The compressed results using the second algorithm: The first row is an originalChinese character with four fonts; The second row shows the compression reslut one withthe error ε = 2; The third one is that result with the error ε = 1.

should keep the distance between two neighboring control points on a curveunchangeable. Otherwise, the length of the reconstructed curve will not bechanged.

Let Cn denote the control points of an original curve, and Cn+1 be thatof its enlarged curve. Based on the interpolation theory, we have knownthat

Cn+1 = Pn+1 · Cn +Qn+1 ·Dn (11.5)

where Pn+1 and Qn+1 are two filters. The particulars, Dn, contained onthe original curve can be viewed as zero, therefore, the control points of thenew curve is

Cn+1 = Pn+1 · Cn. (11.6)

Eq.(11.6) can be considered to be a procedure of the interpolation bywavelet reconstruction based on the cubic B-spline function. Accordingto the wavelet reconstruction, the control points on a curve are doubled

Page 430: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Enlargement of Type Size with Arbitrary Scale Based on Wavelet Transform 411

after the interpolation. In this way, an original curve can be enlarged atany 2j times, where j is a positive integer. It means that the scale of theenlargement is always multiple of 2. A question is that how the Chinesetype size can be enlarged with arbitrary scale? We solve this question inthis section, where two algorithms are proposed:

• The first one is used to perform the enlargement of a curve witharbitrary scale by a cubic B-spline wavelet transform.• The second algorithm is employed to accomplish the arbitrary en-

largement of Chinese type size using the first algorithm associatedwith other techniques.

(1) Algorithm 1:

Let Sj and Sj+1 represent two enlarged curves, the sizes of which are2j and 2j+1 times of the original curve, respectively. Our object is to finda curve Sj+t(0 ≤ t ≤ 1) between Sj and Sj+1 as shown in Fig. 11.5. It can

Sj

c j+1

2i-1

c j+ti

Sj+1

c ij

c 2ij+1

Sj+t

c j+ti’

c 11

c 21

S1

S2

c 22

Cj+1

Cj

C2

C1

Fig. 11.5 Curve Sj+t is produced by the different wavelet transform layers.

be seen that, after wavelet reconstruction, a control point cji on the curveSj (1 ≤ i ≤ 2j +1) corresponds to two control points cj+1

2i−1 and cj+12i on the

curve Sj+1, thus, one point becomes two. Note that, in this section, thecontrol points can be considered to be the coordinate points. For example,in Fig. 11.5, c11 on S1 corresponds to c21 and c22 on S2. If we draw two lines

Page 431: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

412 Chinese Character Processing with B-Spline Wavelet Transform

from cji to cj+12i−1 and cj+1

2i respectively, we can obtain two cross points cj+ti

and cj+ti′ on the curve Sj+t, which can be computed with line equations asfollows:

cj+ti = cji + t · (cj+12i−1 − cji )

= (1− t) · cji + t · cj+12i−1 (11.7)

cj+ti′ = cji + t · (cj+12i − cji )

= (1− t) · cji + t · cj+12i (11.8)

Note that, we should consider a special case, i.e. the distance betweenthe control points cj+ti and cj+ti′ is less than a unit point (a pixel). In thissituation, we should combine these two control points to a single one.

Consequently, the control points Cj+t on the curve Sj+t can be obtainedby the control points Cj and Cj+1 on the curves Sj and Sj+1, and can bewritten by

Cj+t = Cj + (Cj+1 − Cj) · t= (1− t) · Cj + t · Cj+1. (11.9)

It is clear that two special cares also should be considered, namely: (1)Sj+t → Sj when t→ 0; (2) by contrast, Sj+t → Sj+1 when t→ 1.

Finally, we have the following algorithm for the enlargement of a curvewith arbitrary scale.

Algorithm 1 (Enlargement of Curves)

Step 1: For a given scale d, to compute j and t by 2j ≤ d ≤ 2j+1 andt = (d− 2j)/2j.

Step 2: According to formula (11.6), to enlarge the original curve to 2j

and 2j+1 times with the wavelet reconstruction based on the cubicB-spline function.

Step 3: To obtain Cj+t by formula (11.9).

(2) Algorithm 2:

A Chinese character is composed of a set of contour (closed curves).Therefore, the enlargement of the entire character can be performed bytreating each closed curves using Algorithm 1 separately. In practice, itis found that the jaggy and staircase phenomenon emerge on the contourwhen a curve is directly enlarged without any preprocessing. An example

Page 432: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Enlargement of Type Size with Arbitrary Scale Based on Wavelet Transform 413

of the character with such jaggy and staircase phenomenon can be fundin Fig. 11.6(e). To avoid this phenomenon, it is necessary to remove thejaggy and staircase before we enlarge a curve. We have known that thedecomposition transform functions as a filter, which can eliminate the jaggyand staircase phenomenon. For this reason, the wavelet decomposition withthe cubic B-spline function is employed to perform this task.

Fig. 11.6 Results and comparison of enlarged fonts. (a) original font, (b) enlarged twotimes, (c) enlarged three times, (d) enlarged four times, (e) directly enlarged four timeswithout step 5 in Algorithm 2, (f) enlarged two times by traditional interpolation and(g) enlarged four times by traditional interpolation.

As a conclusion, we have the following algorithm for enlargement of aChinese type size with arbitrary scale based on the cubic B-spline wavelettransform.

Algorithm 2 (Enlargement of Chinese type Size)

Step 1: To divide a Chinese character into a set of connected domains interms of some regular techniques of image processing.

Step 2: To extract the edge of each connected domain by the edge detec-tion algorithm, which have been presented in the previous chapter

Page 433: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

414 Chinese Character Processing with B-Spline Wavelet Transform

in this book.Step 3: To trace the contour of each edge, as a result, a set of closed curves

(contours) can be obtained for the Chinese character.Step 4: To perform the pre-processing of each curve with wavelet decom-

position, firstly, to decompose Cn into Cn−1 by

Cn = Dn−1 ⊕ Cn−1.

LetDn−1=0, which means we remove the particulars (high-frequencycomponents). Then, the preprocessing can be implemented by re-constructing Cn with formula (11.6).

Step 5: To enlarge each curve with a given scale by Algorithm 1, whichhas been described in this section.

Step 6: After enlarging the contours, to fill the domains, which are en-closed by the contours.

Step 7: To repeat Steps 4 - 6, until all contours have been processed.

11.2.2 Experiments

In our experiments, 100 × 100 bitmap images of Chinese characters areselected to be processed using both Algorithm 2 and a traditional algorithm,which is an interpolation algorithm with Bezier curve equation, respectively.The original image of a character is scanned into a computer system, andits contour can be extracted by the edge detection technique and contourtracing algorithm. The contour points of an original curve are chosen asits control points Cn. The results of our experiments are illustrated inFig. 11.6, in that (a) is an original font; (b)∼(d) are the results, where theoriginal font is enlarged by two ∼ four times with Algorithm 2 respectively;(e) is the font which is directly enlarged from the original one by four timeswith the Algorithm 2 without the preprocessing (Step 4); (f)∼(g) are theresulting fonts, where the original font is enlarged by two and four timesrespectively with the traditional interpolation. Clearly, the curves enlargedby Algorithm 2 is smoother than the curves enlarged by the traditionalinterpolation. On the other hand, the distortion produced by Algorithm2 is less than that produced by the traditional method, especially for thecorner or short line in the characters.

Fig. 11.7 shows other experiments, where the handwritten Chinese char-acters are enlarged by the algorithm described above in this section.

In this section, we apply the cubic B-spline wavelet transform to im-

Page 434: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Generation of Chinese Type Style Based on Wavelet Transform 415

Fig. 11.7 Chinese handwritings are enlarged with arbitrary scales by the algorithmsdescribed in this section.

plement the enlargement of Chinese characters with arbitrary scales. Itsadvantages can be concluded below:

(1) The algorithm is very simple and easy to be implemented. (2) Thecomputational complexity of the algorithm is O(N). (3) The distortion ofamplified font is very light because it is only related to that of the originalimage itself.

11.3 Generation of Chinese Type Style Based on WaveletTransform

With the increasing requirement of the Chinese computing processed by thecomputer including the Chinese character recognition and Chinese press,the generation of type style has become another important application ofthe Chinese character processing systems. In this section, a new approach,which applies the cubic B-spline wavelet transform to the generation ofChinese type style, will be discussed.

Usually, a new type style can be derived by modifying the structural fea-

Page 435: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

416 Chinese Character Processing with B-Spline Wavelet Transform

tures of an existing font. For instance, changing the length and the width ofits strokes can produce a new type style. The structural features of a fontcorrespond to the details at various wavelet decomposition layers, wheneach contour of a character is decomposed by a wavelet transform. Withthe cubic B-spline wavelet transform, which is viewed as a ”mathemati-cal microscope”, the details of a font at different layers can be effectivelyextracted. For a given font, modifying its structural features can be per-formed by changing its details in some layers, or composing its details withthat of others. In this way, three steps are involved:

• the re-sample of the spline curves of the Chinese character,• the wavelet transform of each curve,• the modification or composition of the original curves to produce a

new type style.

Two approaches are proposed in this section:

• The first one is to generate a new font by modifying the structuralfeatures of an original one.• The second one is to generate a new font by composing the struc-

tural features of several existing ones.

11.3.1 Modification

Several algorithms, which can perform the modifications of the type styles,will be discussed in this sub-section.

Algorithm 1When a cubic B-spline curve is utilized to fit the contour of a font with

M coordinate points, the number of the control points should be M + 2.Further, if M = 2n+1, the number of the control points of a cubic B-splinecurve needs to be extended to 2n + 3. On the other hand, when two ormore fonts are composed to form a new one, it is necessary to ensure thatthey have the same topological structure, e.g., their length, direction, startand end point. In order to extend the control points with the requiredlength and hold the structure unchangeable, it is necessary to re-samplethe B-spline curve as follows:

Step-1 Given M coordinate points of a curve, to find a cubic B-spline

Page 436: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Generation of Chinese Type Style Based on Wavelet Transform 417

curve Fn(u), which passes through these coordinate points,

Fn(u) = (fn1 (u), fn2 (u), · · · , fnM (u)),

where fni (u) is the ith B-spline sub-curve, it can be written as:

fni (u) =4∑j=1

cni+j−2Nj,3(u) i = 1, 2, · · · ,M, u ∈ [0, 1] (11.10)

where Nj,3(u) are the base functions of the cubic B-spline. cni arethe control points of the cubic B-spline curve, corresponding to thecoordinate points of the curve.

Step-2 To select the decomposition levels n, in accordance with the lengthof the curve, L, satisfying M ≤ L and L = 2n − 1.

Step-3 To re-sample Fn(u) with a new sample interval of ∆t = M2n−1

producing a set of new coordinate points Q′i(i = 1, 2, ...,M ′), M ′ =

L+ 1.Step-4 Owing to formula (11.10), we can obtain the extended control

points cni′−1(i′ = 1, 2, · · · ,M ′) with the length of 2n + 3. we have

Fn(u) = (fn1 (u), fn2 (u), · · · , fnM′(u)).

The wavelet base we used here is the cubic B-spline wavelet, which caninterpolate a function with equal interval. Further, since the contour of thecharacter is a closed curve, its start point is the same as its end point, thatis, cn0 = cn1 = cnM ′+2 = cnM ′+3. Therefore, only 2n− 1 points in curve Fn(u)need to be re-sampled.

Based on the re-sampled B-spline curve, the wavelet transform can beemployed to modify the Chinese type styles. We have three stages to doso:

Step-1 To apply wavelet transform to the re-sampled B-spline curve, whichhas the length of 2n + 3.

Step-2 To process the details at some wavelet decomposition layers.Step-3 To reconstruct a new type style by the wavelet reconstruction al-

gorithm.

Two examples are shown in Fig. 11.8 and Fig. 11.9, in which four dif-ferent fonts of a Chinese character are decomposed into seven layers bywavelet transform.

In Fig. 11.8, the modifications are conducted as follows:

Page 437: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

418 Chinese Character Processing with B-Spline Wavelet Transform

• The detail Dn−1 is removed from the first layer;• The details Dn−1 and Dn−2 are deleted from the second layer;• The details Dn−1, Dn−2 and Dn−3 are discarded from the third

layer;• · · · · · · · · ·• All of the details Dn−1, Dn−2, · · · , Dn−7 are no longer kept at the

seventh layer.

The results of the above modifications are illustrated from left to right inFig. 11.8.

The modifications in Fig. 11.9 are carried out below:

• Only the detail Dn−1 is removed from the first layer;• Only the detail Dn−2 is deleted from the second layer;• Only the detail Dn−3 is discarded from the third layer;• · · · · · · · · ·• Only the detail Dn−7 is no longer kept at the seventh layer.

The results of the above modification are illustrated from left to right inFig. 11.9. From these, it is easy to see that the details contained at differentlayers affect the features of the type style variously. The deeper is the layer,the greater the effect of the details will be.

Fig. 11.8 Example 1.

Page 438: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Generation of Chinese Type Style Based on Wavelet Transform 419

Fig. 11.9 Example 2.

Algorithm 2 (Smoothing of Curves)Suppose a objective curve r(t) contains m = 2j+3 control points: Cj =

(cj1, cj2, · · · , cjm). According to the least-squared error, an approximated

curve with m′ = 2j′+ 3 control points can be obtained (j′ < j is a non-

negative integer). From the previous section, we have known

Cn−1 = An · Cn. (11.11)

Therefore, the control points C′ of the approximated curve can be expressedas

C′ = Aj′+1Aj′+2 · · ·AjCj . (11.12)

A remarkable property of the multiresolution curve is its discrete nature,i.e., we can use K control points to construct approximated curve efficientlyat the jth layer. In this way, K can be any of the integers 4, 5, 7, 11 or2j+3, and j can be any integer. In practice, we can also define another non-integer-layer curve γj+µ(t), µ ∈ R and 0 ≤ µ ≤ 1, which can be achievedby two curves, γj(t) and γj+1(t), at the neighboring integer layers, as below:

γj+µ(t) = (1− µ)γj(t) + µγj+1(t)

= (1− µ)Φj(t)Cj + µΦj+1(t)Cj+1 (11.13)

This non-integer-layer curve can benefit to smooth the curve at any contin-uous scales. We can continuously edit any segments on this curve, which

Page 439: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

420 Chinese Character Processing with B-Spline Wavelet Transform

vary curve from the smoothest form (with only four control points) to itshighest resolution (with m > 4 control points).

Suppose curve γ(t) is to be smoothed, the concrete procedure to smoothit is presented below:

Step 1: To decompose the curve γ(t) into a sequence of basic control points(including four basic points) and a group of details using wavelettransform.

Step 2: To choose the corresponding details of wavelet transform coeffi-cients, so that the requirement of the smoothness is satisfied(Notethat, the less is the value of j, the better the smoothness is). Tofix some chosen details from one layer or more layers to be zero,generating new details D′j .

Step 3: To obtain a new curve γ′(t) by wavelet reconstruction using changeddetails D′j and C0.

Algorithm 3 (Edition of the Shape and Details of the Curve)For this algorithm, we will only give some conclusion. The detailed

discussion and inference can be found in [stollnitz et al., 1996]. A curve,which has CJ control points, can be described by wavelet coefficients C0 andD0, D1, · · · , DJ−1, or the control points C0, C1, · · · , CJ−1 at the differentlayers. Two methods can be used to edit such a curve:

• In the first method, the global shape of the curve is changed, whilethe details of it are kept.• The second method is just opposite the above method. The details

of the curve are only altered, while the elementary shape of curveis nearly the same as the original one.

We will discuss these methods as follows.

Method 1:The basic idea of this method is that: firstly some of Cj at some layers

are modified, then the original details D0, D1, · · · , DJ−1, (0 < j < J) areadded to the modified Cj , finally the global shape of the whole curve canbe changed.

We shall describe the modified control points by writing: Cj = Cj +∆Cj , where Cj and Cj denote the original points and modified ones re-spectively. The ∆Cj indicates the difference between them. At the same

Page 440: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Generation of Chinese Type Style Based on Wavelet Transform 421

time, some modification appears in CJ through reconstruction, i.e.,

CJ = CJ + ∆CJ . (11.14)

Here the j value mainly affects the above modification. Precisely, the less isj value, the wider the influenced range of the control points is, furthermore,the stronger the effect to the whole curve is. Otherwise, the closer to J thej value is, the more narrow the influenced range of the control points is, atthe same time, the less the effect to the whole curve is. This method canbe extended to the non-integer layers. Suppose a non-integer-layer curveγj+µ satisfies (11.13), and it contains control points Cj+µ, we have

γj+µ(t) = Φj+1(t) · Cj+µ. (11.15)

If we modify a particular point cj+µi in curve Cj+µ, the positions of theneighboring points of cj+µi will be changed. The size of the influenced rangeand degree is inverse proportion to µ, namely:

• If µ closes to zero, then all control points at the j + µ layer will besimultaneously moved. In other words, every points at the j layerwill be edited.• If µ approximates 1, the neighboring points will not be moved.

Only a single point at the j + 1 layer will be edited.

Let the ∆Cj+µ be the values of the modifications at the j+µ non-integerlayer. Here the ∆cj+µi , which is one of the ith point in ∆Cj+µ, is selectedby the user. The ∆Cj+µ can be considered as two parts, namely, ∆Cj and∆Dj at the jth layer. We can define: ∆Dj = Bj+1 ·∆Cj+1. Therefore, themodified ∆Cj+µ of the whole curve is represented as follows:

∆CJ = P JP J−1 · · ·P j+2(P j+1∆Cj +Qj+1∆Dj). (11.16)

Furthermore, from (11.13), (11.15) and Φj−1(u) = Φj(u) · P j .We obtain

∆Cj+µ = (1 − µ)P j+1 ·∆Cj + µ∆Cj+1. (11.17)

Considering the filter equation

Cj = P j · Cj−1 +Qj ·Dj−1,

Page 441: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

422 Chinese Character Processing with B-Spline Wavelet Transform

where P j and Qj are metrics of the filters. By replacing ∆Cj+1 with both∆Cj and ∆Dj , we can rewrite (11.17) as

∆Cj+µ = P j+1 ·∆Cj + µQj+1∆Dj . (11.18)

From (11.18), it is clear that the modified control points at the non-integerlayer can be described by two components: (1) the modified control pointsat the lower layer, and (2) the modified details at the lower layer. The entiremodified curve can be determined by both (11.16) and (11.14). If ∆Cj+µ isknown, it is quite difficult to calculate directly ∆Cj and ∆Dj from (11.18).In practice, we can denote: ∆Cj+µ := (0, · · · ,∆cj+µi , 0, · · · , 0)T , and define

∆Cj = (1− µ)Aj+1 ·∆Cj+µ∆Dj = µBj+1 ·∆Cj+µ, (11.19)

The main editing procedure can be implemented as follows:

Step 1: To determine editing vector Cj+µ = (0, · · · ,∆cj+µi , 0, · · · , 0)T .Step 2: To compute corresponding ∆Cj and ∆Dj , according to (11.19).Step 3: To obtain the bias of the curve, according to (11.16).Step 4: To compose the new curve, according to (11.14).

Method 2:This method is just the opposite process to that described above. In

Method 1, the global shape of the curve is altered, but the detail of it canbe kept. However, in this method, the details of the curve are changed, andthe basic shape of it is nearly the same as the original curve. The basic ideaof this method is that, we only modify the details Dj , Dj+1, · · · , DJ−1, (0 <j < J), and preserve the low-resolution components of the curve, C0, C1,

· · · , Cj , (0 < j < J). Here the original details Dj , Dj+1, · · · , DJ−1, (0 < j <

J) are replaced by a group of new details Dj , Dj+1, · · · , DJ−1, (0 < j <

J). This editing method needs to establish a library, which stores variouscontent about curve details. They are samples of the standard curves suchas folding line, spiral and snake line, etc. When the object curve is to beedited, we can perform the edition by the following steps:

Step 1: To choose some standard samples from the library, in accordancewith the requirement of the edition.

Step 2: To decompose these curves by the wavelet transform.

Page 442: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Generation of Chinese Type Style Based on Wavelet Transform 423

Step 3: To extract the details, Dkn, from one or several layers. They can

represent the details of the shape efficiently, and we have Dji =

ζ(Dkk , l, k).

Step 4: To add these details to the original low-frequency coefficients, toobtain the designed curve, i.e., CJ = P J · CJ−1 +QJ · DJ−1

180 × 80 bitmap images of Chinese characters are chosen as the basicsamples in this experiment. The coordinate x and y in the contour of acharacter is considered to be the control points, i.e., Cnx and Cny . Accordingto the above method, we can process Chinese character by the local edition.Figs. 11.10 and 11.11 show the experimental results.

Fig. 11.10 Results of modifying the typeface of Chinese character “ji”. (a) originalcharacter, where 1, 2 and 3 describe three closed curves, which can be transformed withwavelet transform, (b),(c),(d) the result of the local edition.

Fig. 11.11 Results of modifying the typeface of Chinese character “shu”. (a) originalcharacter, where 1, 2 and 3 describe three closed curves, which can be transformed withwavelet transform, (b),(c),(d) the result of the local edition.

In Figs. 11.10 and 11.11, each character consists of three contours, whichare labeled by the numbers 1, 2 and 3 as shown in the figure. The result ofthe local edition is displayed in Fig. 11.10 using the following procedure:

• For label one, the point c3i at the third layer is tensioned in both xand y directions;• For label two, the point c4i at the forth layer is tensioned;• For label three, the point c73 at the seventh layer is tensioned.

Page 443: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

424 Chinese Character Processing with B-Spline Wavelet Transform

Due to the extent of the modification, there is a little difference among(b),(c) and (d) in Fig. 11.10.

For the Chinese character in Fig. 11.11, the following modification isdone:

• For label one, the control point c8i at the eighth layer is tensionedtowards the directions of down-left and up-right. So an italic typestyle is obtained. The result show in Fig. 11.11(b).• For label two, the high-frequency component (details)will be re-

moved. T he result is shown in Fig. 11.11(c).• The character is modified in accordance with the above two oper-

ations. Fig. 11.11(d) illuminates the result.

11.3.2 Composition

Another way of creating new fonts is to compose the details of two or moreexisting fonts with different ratios. The new type style, which containsthe mixture of details, can be restored by wavelet reconstruction. Thecomposition algorithm based on the cubic B-spline wavelet transform ispresented as follows:

Step-1 To divide each Chinese character into many separate connecteddomains(strokes). Then, extract the edge of each connected domainto produce a contour, and thereafter process each contour by Step2∼Step 6.

Step-2 To represent a contour by a cubic B-spline curve with 2n+3 controlpoints by re-sample, where n is the number of the decompositionlevels.

Step-3 To apply wavelet decomposition to control points Cn with thecubic B-spline wavelet transform, so that the detail informationD0, D1, · · · , Dn−1 at different layers and the control points C0 atthe lowest layer can be obtained.

Step-4 To compose the details of m (m ≥ 1) fonts at certain layers, andthe detail information can be found as follows:

DjNew =

m∑i=1

riDji ,

where Dji (i = 1, 2, · · · ,m) are the font details at the jth layer, and

Page 444: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Generation of Chinese Type Style Based on Wavelet Transform 425

ri(i = 1, 2, · · · ,m) are ratio factors, 0 ≤ ri ≤ 1(i = 1, 2, · · · ,m).Step-5 To reconstruct a new set of control points CnNew with new details

DjNew and a set of control points Cj at the jth layer by wavelet

reconstruction. The length of CnNew is L = 2n + 3.Step-6 To re-sample the B-spline curve FnNew(u) formed by control points

CnNew. It is said to convert the B-spline curve FnNew(u) to a curve(contour) with the length of M again. Here, the sample interval is∆′t = 2n−1

N .Step-7 To fill in all the connected domains surrounded by the contours.

The new Chinese type style is completed.

Two examples can be found in Figs. 11.12 and 11.13. Four Chinesetype styles are presented in these examples, namely, Song (the first row inFig. 11.12), Hei (the last row in Fig. 11.12), Fang Song (the first row inFig. 11.13) and Kai (the last row in Fig. 11.13). The size of the images is200× 200.

In Fig. 11.12:

• Characters in groups (A) and (B) are obtained by removing thedetails of Song and Hei at the 1 ∼ 4th layers, respectively.• Ones in (C) and (D) are the resulting fonts, which are composed

by the type style of Song and Hei.

In Fig. 11.13:

• Characters in the group (A) are the composition results of threefonts, namely, Fang Song, Kai and Song, with ratios r1 = 0.2,r2 = 0.4, r3 = 0.4, and the control points Cn−4 at the lowestdecomposition layer is in the style of Fang Song.• Ones in the group (B) are the composition results of the four fonts

with ratios r1 = 0.1 (Fang Song), r2 = 0.3 (Kai), r3 = 0.3 (Song),r4 = 0.3 (Hei), and Cn−4 is in Fang Song.• The group (C) are the composition results of the four fonts with

ratios r1 = 0.1 (Kai), r2 = 0.3 (Fang Song), r3 = 0.3 (Song),r4 = 0.3 (Hei), and Cn−4 is in the font of Kai.• The type styles in the group (D) are the composition results of three

fonts with ratios r1 = 0.2 (Kai), r2 = 0.4 (Fang Song), r3 = 0.4(Song), Cn−4 is in the type style of Kai.

Page 445: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

426 Chinese Character Processing with B-Spline Wavelet Transform

Fig. 11.12 Results of combining two typefaces. The first row and the last row areoriginal typefaces.

Page 446: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Generation of Chinese Type Style Based on Wavelet Transform 427

Fig. 11.13 Results of combining several typefaces. The first row and the last row areoriginal typefaces.

Page 447: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

This page intentionally left blankThis page intentionally left blank

Page 448: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Chapter 12

Classifier Design Based onOrthogonal Wavelet Series

Conceptually speaking, the methology of statistical pattern recognitiondraws on classic Bayesian statistical decision theory. It essentially dealswith two categories of problem; one is concerned with the identificationand extraction of significant features for describing features, and anotherwith the design of classifiers for discriminating and recognizing patterns.In this chapter, we shall provide an in-depth examination of the classifierdesign problem. First, we shall present an overview of the fundamentalsin pattern classifier design. In so doing, our emphasis will be on minimumaverage-loss classifier design and minimum error-probability classifier de-sign. Next, we shall specifically describe and discuss the use of orthogonalwavelet series in classifier design.

12.1 Fundamentals

Without lose of generality, we shall only consider two-class pattern recogni-tion problems. That is to say, the complete set of patterns to be classified,Ω, is composed of patterns of two classes, Ω1 and Ω2. For instance, Ω maycontain samples of human cells, and Ω1 and Ω2 may correspond to non-cancer and cancer cells, respectively. In other words, Ω1 ∪ Ω2 = Ω, andΩ1∩Ω2 = ∅. If based on some medical statistics, we observe that the prioriprobabilities of not having and having cancers in a certain region are P1

and P2, respectively, then we also know that the probabilities of Ω1 and Ω2

occurances much be P1 and P2, and furthermore, P1 + P2 = 1. In orderto classify these samples (e.g., to identify cancer cells), it is a common ap-proach that we select a set of features to form a feature vector, X , which

429

Page 449: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

430 Classifier Design Based on Orthogonal Wavelet Series

may be symbolically expressed as follows:

X = (X1, X2, · · · , Xn) (12.1)

where X denotes an n-dimensional random vector that defines the followingmapping:

(Ω,F , P )X(ω)−→ (Rn,Bn, PX−1) (12.2)

where Ω and Rn correspond to the domain and range of X . Rn is ann-dimensional Euclidean space. F denotes a σ- field constructed by thesubsets of Ω. P denotes a probability measure defined over F and deter-mined by priori probabilities. Bn denotes a Borel σ-field in Rn. PX−1

is a probability measure derived from random variable X in feature vec-tor space (Rn,Bn); whose probability density function is denoted as p(x),x = (x1, x2, · · · , xn) ∈ Rn. Suppose that p(x | j), the conditional proba-bility density function of each pattern Ωj , is given. Thus, we can have thefollowing expression:

p(x) = P1p(x | 1) + P2p(x | 2). (12.3)

In what follows, we shall introduce the notion of decision function.

Definition 12.1 Function d(ω) is called a decision function if and onlyif it satisfies the following conditions: d(ω) is defined in domain Ω, and itscorresponding values are given in set 1, 2. In other words,

(Ω,F , P )d(ω)−→1, 2 (12.4)

In addition, d−1(i) ∈ F , i = 1, 2, where d−1(·) denotes the inverse of d(·)and i denotes a single-number set.

From Definition 12.1, we note that d(ω) is a discrete random variable.When d(ω) = i, we say that ω belongs to the ith pattern, Ωi.

Notice that here we make a decision on whether or not a pattern belongsto a specific class depends on the value of the feature vector. In other words,we have to consider a Borel measurable function c(x) in feature vector spaceRn, whose value is given by 1, 2:

(Rn,Bn)c(x)−→1, 2. (12.5)

Page 450: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Fundamentals 431

The above-mentioned decision function d(ω) is merely the composite ofrandom feature vector X and the Borel measurable function c(x), i.e.,

d(ω) = c(X(ω)). (12.6)

When x, the observed sample value of the feature vector for pattern ω,satisfies c(x) = i, we can arrive at the conclusion that pattern ω ∈ Ωi. Inthis respect, we usually also refer to medium function c(x) as a decisionfunction.

It can noted that since classifications based on c(x) are in essence statis-tical decisions, they are inevitably subject to statistical errors. In real-lifeapplications, misclassifications can cause damages of varying degrees. Forinstance, in character recognition, it is sometimes possible to misclassifyletter c into letter d and vice versa. In both cases, the damages causedmay not seem to be as serious as misclassifying non-cancer cells into cancerones in cancer diagnosis. The misclassification of cells could make patientsdevastated, who may spend a fortunes on their medication. The situationcan be even worse if we misclassify cancer cells into non-cancer ones. Insuch a case, we may delay necessary medical treatments for the patients.And as a result of that, the patients may lose their lives. Owning to theabove considerations, it is important to explicitly define a lose function inorder reflect the degree of damage caused by misclassification. Before weformally define a lose function, let us first introduce the notion of a classfunction as follows:

Definition 12.2 J(ω) is called a class function if and only if it satisfiesthe following:

(Ω,F , P )J(ω)−→1, 2 (12.7)

where

J(ω) =

1 if ω ∈ Ω1

2 if ω ∈ Ω2

J(ω) is a discrete random variable.

We can now give the formal definition of a lose function, based on thoseof decision function d(ω) and class function J(ω).

Definition 12.3 Let bivariate function L(i, j) be defined as follows:

L(i, j) = cij , i, j ∈ 1, 2, cij ∈ (−∞,+∞)

Page 451: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

432 Classifier Design Based on Orthogonal Wavelet Series

If we compose L(i, j) with the random vector made of decision function d(ω)and class function J(ω), i.e., (d(ω), J(ω)), we will have composite randomvariable L(d(ω), J(ω)). This variable is referred to as a lose function. cij isreferred to as the lose caused by misclassifying pattern Ωj into pattern Ωi.

Since d(ω) is the composite of medium function c(x) and feature vectorx(ω), we can write the following:

L(d(ω), J(ω)) = L(c(X(ω)), J(ω)). (12.8)

In this way, we can also view L(c(X), J) as the composite of functionL(c(·), ·) and random vector (X, J). The joint distribution of (x, J) canbe given as follows:

p(x, j) = Pjp(x | j) j = 1, 2. (12.9)

Based on the above interpretation of lose function, it becomes quiteconvenient to calculate an average lose.

Definition 12.4 The mathematical expectation of L(c(x), J) is referredto as an average lose, which can be written as:

R = E[L(c(X), J)]

=2∑j=1

∫Rn

L(c(x), J)p(x, j)dx

=2∑j=1

∫Rn

L(c(x), J)Pjp(x | j)dx

From the above definition, it can be noted that given the priori prob-ability of a pattern, Pj , and the conditional probability, p(x | j), selectingdifferent decision function c(x) can result in different average lose. Practi-cally speaking, we hope to have the average lose as little as possible. There-fore, we are particularly interested in the problem of how to find c0(x) suchthat the average lose is the minimum. In what follows, we shall attempt toprovide a detailed solution to this problem.

For ease of description, for the ease of description, we shall consider onlytwo-class pattern recognition problems, and assume that priori probabilityPi, conditional probability density function p(x | j), and the value of a losefunction, cij , are known.

Page 452: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Minimum Average Lose Classifier Design 433

12.2 Minimum Average Lose Classifier Design

In statistical pattern recognition, since the feature vector for a pattern isa random variable, there is always a probability of committing errors nomatter which decision scheme we choose to apply in classifications. Toput it more accurately, the problem that we shall focus on here is howto compare the strengths and weakness of various decision methods fromthe point of view of certain statistical criteria, and thereafter under suchcriteria to find the best solution to our problem.

In order to make our discussions more concise, apart from the assump-tion that Pj , p(x | j), and cij are known, we will further assume that thedamage caused by misclassifications is greater than that by correct classifi-cations, that is, c12 > c22 and c21 > c11. Under these assumptions, we shallattempt to find the optimal decision function, c0(x), such that the criterionof minimizing R = E[L(c(X), J)] is satisfied, i.e.,

R0 = E[L(c0(X), J)]

= minc(x)

E[L(c(X), J)]

where decision function c0(x) is referred to as the minimum average losedecision function.

Since decision function c(x) is essentially a Borel measurable functionwhose value is given by 1, 2, that is:

(Rn,Bn)c(x)−→1, 2 (12.10)

Now let Bi = c−1(i), i = 1, 2 where c−1(·) denotes the inverse of c(·).Thus, we can have B1 ∩B2 = ∅, B1 ∪B2 = Rn. As a result, we can reducethe problem of finding decision function c(x) to that of decomposing thecomplete pattern feature vector space, Rn, into two non-intersecting Borelmeasurable sets, B1 and B2. B1 and B2 are called decision regions; whenx ∈ Bi, we define c(x) = i. Once decision region Bi is determined, theaverage lose can be rewritten as follows:

R =2∑j=1

2∑i=1

∫Bi

L(c(x), J)Pjp(x | j)dx

Page 453: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

434 Classifier Design Based on Orthogonal Wavelet Series

=2∑j=1

2∑i=1

∫Bi

cijPjp(x | j)dx

= c11P1

∫B1

p(x | 1)dx+ c12P2

∫B1

p(x | 2)dx

+c21P1

∫B2

p(x | 1)dx+ c22P2

∫B2

p(x | 2)dx

Since

∫B2

p(x | j)dx = 1−∫B1

p(x | j)dx j = 1, 2, (12.11)

it is obvious that

R = c21P1 + c22P2

+∫B1

[P2(c12 − c22)p(x | 2)]− [P1(c21 − c11)p(x | 1)]dx

Note that in the above expression, c21P1 + c22P2 is a constant, and Pj ,p(x | j), and cij are given. The only thing changeable in the integral termis the region of integral, B1. In other words, we can only change B1 inorder to change average lose R. At the same time, we may also observethat two integrands P2(c12− c22)p(x | 2) and P1(c21− c11)p(x | 1) are bothnon-negative. If we are to change B1 in order to find the minimum averagelose, we must realize that B1 will include only those feature vectors x atwhich integrands P2(c12 − c22)p(x | 2) is smaller than P1(c21− c11)p(x | 1).That is to say, the selected B1 and the corresponding B2 (B2 = R

n −B1)will allow to establish the following relationships:

P2(c12 − c22)p(x | 2) < P1(c21 − c11)p(x | 1) when x ∈ B1

P2(c12 − c22)p(x | 2) ≥ P1(c21 − c11)p(x | 1) when x ∈ B2

Based on the above, we can readily have the following decision rules:Let x is the feature vector of a certain sample, ω, thus:

if p(x|2)p(x|1) < P1(c21−c11)

P2(c12−c22) then x ∈ B1, hence ω ∈ Ω1

if p(x|2)p(x|1) ≥ P1(c21−c11)

P2(c12−c22) then x ∈ B2, hence ω ∈ Ω2

(12.12)

In Rule 12.12, p(x|2)p(x|1) an P1(c21−c11)

P2(c12−c22) are referred to as likelihood ratio anddecision threshold, respectively. The selected decision regions, B1 and B2,

Page 454: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Minimum Error-Probability Classifier Design 435

together with the above decision rule will enable us to design a minimumaverage lose classifier.

12.3 Minimum Error-Probability Classifier Design

Recall that in the above discussion on minimum average lose classifiers, weassume that the values of lose function c(x) satisfy the following:

c11 = c22 = 0, c21 = c12 = 1

From the decision rule of minimum average lose classifiers, we know thatif x denotes the value of a feature vector for some pattern ω, then:

if p(x|2)p(x|1) < P1

P2then x ∈ B1, hence ω ∈ Ω1

if p(x|2)p(x|1) ≥ P1

P2then x ∈ B2, hence ω ∈ Ω2

(12.13)

The above decision rule can be rewritten as follows:

if P2p(x | 2) < P1p(x | 1) then x ∈ B1, hence ω ∈ Ω1

if P2p(x | 2) ≥ P1p(x | 1) then x ∈ B2, hence ω ∈ Ω2(12.14)

As pointed out earlier, in statistical pattern recognition feature vector xof a certain sample is a random vector, and hence decision function d(c(X))is also a random function. Therefore, it cannot be guaranteed that allclassifications based on such a decision function are correct. To evaluatethe effectiveness and features of a certain decision rule, we need to considerthe probability of misclassifying one pattern into another. In the problemsinvolving two classes of patterns, the feature vectors of patterns Ω1 and Ω2

are to be classified into regions B1 and B2, respectively. In such a case, twotypes of error may be committed; namely, (1) misclassification of samplesfrom pattern Ω1 as pattern Ω2, and (2) misclassification of samples frompattern Ω2 as pattern Ω1. The probability of total error will be equal tothe sum of the probabilities of the two errors, that is:

R =∫B2

P1p(x | 1)dx+∫B1

P2p(x | 2)dx (12.15)

In order to give a graphical illustration of the above-mentioned proba-bilities, let us suppose that feature vector x of a certain sample is a one-dimensional random variable satisfying a normal distribution. Figure 12.3shows the illustration of the error probabilities in the two-pattern problems.

Page 455: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

436 Classifier Design Based on Orthogonal Wavelet Series

1

P p(x|1)1

x0

B1

x

P p(x|2)

B2

2

x

Fig. 12.1 The error probabilities in the two-pattern problems.

From Figure 12.1, we readily note that dividing point x0 between deci-sion regions B1 and B2 satisfies the following:

P1p(x0 | 1) = P2p(x0 | 2). (12.16)

Also, we know that if the dividing point (i.e., decision threshold) is shiftedto an arbitrary point, x1, the total error probability will consequently beincreased. This can be confirmed from the following calculations:∫

B1P2p(x | 2)dx +

∫B2P1p(x | 1)dx

=∫ x0

−∞ P2p(x | 2)dx +∫ +∞x0

P1p(x | 1)dx≤ ∫ x1

−∞ P2p(x | 2)dx +∫ +∞x1

P1p(x | 1)dx(12.17)

Therefore, decision rule 12.14 has the minimum error probability. It isbecause of this reason that people often refer to the classifiers built usingdecision rule minimum error probability classifiers.

Based on the above discussion, we may notice that a minimum errorprobability classifier is a special case of a minimum average lose classifier.To be more specific, a minimum average lose classifier is called a minimumerror probability classifier when lose function c(x) satisfies c11 = c22 = 0and c12 = c21 = 1.

In addition, it should be pointed out that in the above discussion onclassifier design, we have assumed that priori probability Pi and conditionalprobability density function p(x | j) are both given. The two probabilitiesare used in decision rules 12.13 and 12.14 for the minimum average lose and

Page 456: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Probability Density Estimation Based on Orthogonal Wavelet Series 437

the minimum error probability classifiers. However, in real-life applications,it may not be the case that both Pi and p(x | j) are known beforehand.In this book, we shall not deal with the cases of unknown priori probabil-ity. Interested readers may find discussions about such cases from othersources. As far as the problems of unknown p(x | j) are concerned, weshall discuss how to estimate p(x | j) by applying a method of orthogonalseries approximation from the theory of statistical non-parametric estima-tion. In particular, we shall discuss how to use orthogonal wavelet series inestimating conditional probability density function p(x | j).

12.4 Probability Density Estimation Based on OrthogonalWavelet Series

In the preceding sections, we have assumed that conditional probabilitydensity function p(x | j) is known. From such an assumption, we haveshown how to design classifiers. In the case where p(x | j) is unknown,we have to estimate p(x | j) based on a set of sample feature vectors,X1, X2, · · · , XN . Since the estimation of p(x | j) is the same as the esti-mation of general probability density function p(x). In order to simplifythe notations, in what follows we shall deal only with the non-parametricestimation of general density function p(x).

12.4.1 Kernel Estimation of a Density Function

In density function estimation, the easiest as well as most commonly-usedmethod is the Histogram method. In this method, we use a series of points,· · · < a−1 < a0 < a1 < · · · to subdivide a real domain into a set of disjointintervals (ai, ai+1). At each interval, a probability value can be estimatedbased on the following calculation:

# (j; 1 ≤ j ≤, ai ≤ Xj < ai+1) /N (12.18)

where #(A) returns the numbers of elements in set A. Thus, density func-tion p(x) in [ai, ai+1) can be estimated as follows:

# (j; 1 ≤ j ≤, ai ≤ Xj < ai+1) /N(ai+1 − ai) (12.19)

Page 457: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

438 Classifier Design Based on Orthogonal Wavelet Series

Using the above-mentioned method can be dated back to as early asthe seventh century. In the middle of the twentieth century, statisticiansmade several significant progresses in the area of non-parametric estimationof density functions. The most pioneering contributions during that timeproposed and developed an important density estimator, known as kernelestimator. In this way, for each x, we can construct a small region [x −hN , x+ hN), and then use the following to provide an estimate:

pN (x) = # (j; 1 ≤ j ≤ N, x− hN ≤ Xj < x+ hN) /2NhN (12.20)

where pN (x) denotes an estimate. hN is a pre-defined positive constantrelated to N .

The kernel estimation method can be viewed as an improvement overthe earlier mentioned histogram method. Now let us define a uniform prob-ability density function, K(x), over [−1, 1), as follows:

K(x) = 12I[−1,1)(x)

=

12 −1 ≤ x < 10 otherwise

(12.21)

Using K(x), we can rewrite Eq. 12.20 as follows:

pN (x) =1

NhN

N∑i=1

K(x−Xi

hN) (12.22)

As a matter of fact, K(x) can be changed to any density functionsor even other general functions. Thus, we can readily give the followingdefinition:

Definition 12.5 Let K(y) be a Borel measurable function in a 1-D Eu-clidean space. Thus, we call

pN(x) =1

NhN

N∑i=1

K(x− xihN

) (12.23)

a kernel estimator of probability density function p(x) for pattern featurevector X . K(y) is a kernel function and hN is a window width.

From Eq. 12.23, we can observe the following geometric interpretationfor the estimate of p(x), pN(x): For each sample Xi, we construct stepfunction 1

hNK(x−Xi

hN) of window width 2hN . The average for N such step

Page 458: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Probability Density Estimation Based on Orthogonal Wavelet Series 439

functions will become the estimate of density function p(x). Note thatlimN→∞ hN = 0; that is, when the number of samples, N , increases, thestep function is gradually becoming an impulse function.

Since the pioneering work on kernel estimation, statisticians have fur-ther studied the characteristics of large sample size in density functionkernel estimation, and examined the asymptotically unbiasedness, meansquare consistency, asymptotical properties of mean square error, and uni-formly convergence in probability. Many interesting theoretical results havebeen obtained from such efforts. Nevertheless, when they apply the large-sample-size kernel estimation in solving practical problems, they immedi-ately face a difficulty, that is, how to determine window width hN giventhe actual number of samples, so that the estimation error of pN(x) withrespect to p(x) is smaller than a threshold.

12.4.2 Orthogonal Series Probability Density Estimators

As an alternative to the above-mentioned density function kernel estima-tion, we can also use the orthogonal series of a function in the L2(Rn) spaceas an asymptotical estimator for density function p(x).

Since most probability density functions are square integrable, i.e., p(x) ∈L2(Rn), it is possible to expand p(x) using the orthogonal basis of L2(Rn).For the sake of brevity, here we shall consider square integrable functionspace L2(R) on one-dimensional real space R.

Let φj(x) be an orthonormal basis (ONB) in L2(R) and p(x) denotean estimator of density function p(x). Since p(x) ∈ L2(R), we have:

p(x) =+∞∑j=−∞

cjφj(x) (12.24)

Generally speaking, we can use

p(x) =m∑j=1

cjφj(x) (12.25)

that is, part of the orthogonal series summation for p(x),∑m

j=1 cjφj(x),to approximate p(x). In such a case, the mean square error of estimation

Page 459: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

440 Classifier Design Based on Orthogonal Wavelet Series

becomes

γe =∫ +∞−∞ |p(x) − p(x)|2dx

=∫ +∞−∞ |p(x) −

∑mj=1 cjφj(x)|2dx

(12.26)

The necessary condition for minimizing the above mean square error canbe stated as follows:

∂γe∂ck

= 0, k = 1, 2, · · · ,m (12.27)

That is, ∫ +∞

−∞2(p(x)−

m∑j=1

cjφj(x))φk(x)dx = 0 (12.28)

Hence,m∑j=1

cj

∫ +∞

−∞φj(x)φk(x)dx =

∫ +∞

−∞φk(x)p(x)dx (12.29)

Since φj(x) is a orthogonal system, the above expression is essentiallythe following:

ck =∫ +∞

−∞φk(x)p(x)dx (12.30)

The right hand side of Eq. 12.30, as the mathematical expectation of ran-dom variable φ(x), can be estimated using the mean value of N samples.Hence, we can write:

ck =1N

N∑i=1

φk(Xi) (12.31)

Therefore,

p(x) =m∑j=1

cjφj(x) (12.32)

There exist many orthonormal bases in L2(R). The commonly-usedones include Hermite orthogonal system, Laguerre orthogonal system, andLegendre orthogonal system, etc.. No matter which system is chosen inasymptotical series expression

∑mj=1 cjφj(x) to approximate density func-

tion p(x), we are inevitably facing the next difficult problem. As we know,

Page 460: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Probability Density Estimation Based on Orthogonal Wavelet Series 441

the quality of estimator p(x) is closely related to the term number, m, inthe base function of φj(x). Our problem here is how to determine m ac-cording to the number of samples, N , such that p(x) =

∑mj=1 cjφj(x) can

best represent p(x) − if so, any pattern classifier based on p(x) will be ableto function effectively. Theoretically speaking, there is no explicit decisionrule for determining such an m. The best way to do so is through empiricalexperimentation.

12.4.3 Orthogonal Wavelet Series Density Estimators

In order to derive, from a theoretical point of view, a theorem about thelarge sample size in the case of orthogonal wavelet series density estima-tion, we shall first of all introduce notions of slowly increasing generalizedfunctions space and Sobolev space.

Definition 12.6 Rapidly decreasing function space S is composed offunctions, C∞(Rn), that satisfy the following condition:

supRn

|xαDβθ(x)| <∞, ∀α, β ∈ Nn (12.33)

C∞(Rn) denotes infinitely differentiable real functions in Rn.

From the above definition, it can be noted that any function in space Sis a C∞ function that will approach to 0 when | x |→ ∞, at a speed fasterthan any power of 1

|x| . Because of this reason, S is normally referred to asrapidly decreasing function space. In S, it is possible to several countablesemi norm.

γα,β(θ) = supRn

|xαDβ(θ)|, α, β ∈ Nn (12.34)

Thus space S becomes a linear topological space, which means when θv → θ,for any exponents α, β, we have:

limv→∞xαDβ (θv(x)− θ(x)) = 0, uniformly x ∈ R

n (12.35)

Definition 12.7 The space composed of all continuous linear functionalson rapidly decreasing function space S is called slowly increasing generalizedfunctions space or tempered distributions space, denoted by S′.

Page 461: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

442 Classifier Design Based on Orthogonal Wavelet Series

In addition, we use Sγ to denote the space composed of C∞(Rn) func-tions that satisfy the following conditions:

supRn

|xαDβθ(x)| <∞, ∀α, β ∈ Nn, | β |≤ γ (12.36)

Definition 12.8 Sobolev space HS(Rn) is defined as follows:

HS(Rn) = u(x);u(x) ∈ S′, (1+ | ω |2)S/2u(ω) ∈ L2 (12.37)

In Sobolev space, with Hermite inner product:

(u, v)S =1

(2π)n

∫(1+ | ω |2)S u(ω)v(ω)dω (12.38)

it is possible to show that this inner product can make HS(Rn) becomeHilbert space.

In what follows, we shall introduce the notion of reproducing kernelHilbert space. The multiresolution analysis Vm in wavelet analysis theoryis in fact a sequence in reproducing kernel Hilbert space.

Definition 12.9 Let a bivariate function L(x, y) : R×R→ R be symmet-ric and nonnegative. It is known that there exists a unique Hilbert space,H(R), such that ∀x ∈ R, L(x, ·) ∈ H(R). Furthermore, ∀g(y) ∈ H(R), thefollowing holds:

(g(·),L(x, ·))H(R) = g(x) (12.39)

The space, H(R) is called a reproducing kernel Hilbert space (RKHS), andbivariate function L(x, y) is called a reproducing kernel (RK) for H(R).

In fact, each space, Vm, in multiresolution analysis is a reproducingkernel Hilbert space, and the reproducing kernel, L(x, y), of V0 can bewritten as follows:

L(x, y) =+∞∑−∞

φ(x − n)φ(y − n) (12.40)

where φ(x) is a scaling function. The reproducing kernel, Lm(x, y), of Vmis given in the following:

Lm(x, y) = 2mL(2mx, 2my) (12.41)

Page 462: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Probability Density Estimation Based on Orthogonal Wavelet Series 443

In order to study the asymptotical properties of reproducing kernelLm(x, y), we need to further introduce the property, Zλ, of scaling functionφ(x).

Definition 12.10 Let scaling function φ(x) ∈ Sr. φ(x) is said to satisfyproperty Zλ if and only if it satisfies the following:

(i) φ(ω) = 1 +O(| ω |λ) as ω → 0 (12.42)

(ii) Zφ(x, ω) = e−iωx(1 +O(| ω |λ)) uniformly as ω → 0(12.43)

where Zφ(x, ω)=∑+∞

k=−∞ e−iωkφ(x−k) is called the Zak transform of scal-ing function φ(x).

Having introduced the Zλ property for scaling function φ(x), in whatfollows we shall state a related theorem without giving its proof.

Theorem 12.1 Let scaling function φ(x) ∈ Sr, and for a certain λ > 0satisfying the Zλ, Lm(x, y) is a reproducing kernel for space Vm. Thus, wehave:

‖Lm(x, ·)− δ(x − ·)‖−α = O(2−mλ)uniformly for y ∈ R (12.44)

where ‖ · ‖−α is a Sobolev norm, and α > λ+ 12

With the above preparation, we can now address the issue of how toderive a probability density estimate based on orthogonal wavelet series.

As we have mentioned earlier, common density function p(x) ∈ L2(R).From the multiresolution theory in wavelet analysis, it is know that:

L2(R) =⋃

mVm (12.45)

Let pm(x) denote the orthogonal project of p(x) in space Vm. Thus,

(L2) limm→∞ pm(x) = p(x) (12.46)

where

pm(x) =+∞∑

n=−∞amn2m/2φ(2mx− n) (12.47)

Page 463: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

444 Classifier Design Based on Orthogonal Wavelet Series

The minimum mean square error estimator of pm(x) will be written asfollows:

pm(x) =+∞∑

n=−∞amn2m/2φ(2mx− n) (12.48)

where

amn =1N

N∑i=1

2m/2φ(2mXi − n) (12.49)

Thus, we can have the following:

pm(x) =+∞∑

n=−∞[1N

N∑i=1

2m/2φ(2mXi − n)]2m/2φ(2mx− n)

=1N

N∑i=1

+∞∑n=−∞

2mφ(2mx− n)φ(2mXi − n)

=1N

N∑i=1

Lm(x,Xi) (12.50)

Comparing 12.50 with 12.22, we note that orthogonal wavelet seriesdensity estimator pm(x) and kernel estimator pN(x) are quite similar. Fromthe geometrical point of view, Lm(x,Xi) is an impulse function scaled fromL(x,Xi). The mean of N impulse functions corresponds to the densityestimator, pm(x).

The theorem given below further indicates that when scaling functionφ(x) and unknown density function p(x) satisfy certain specific properties,orthogonal wavelet series density estimator pm(x) will converge to p(x).

Theorem 12.2 Let scaling function φ(x) ∈ Sr, and for a certain λ ≥ 1, itsatisfies property Zλ. Let X be a continuous bounded density function ran-dom variable, and X1, X2, · · · , XN be N independent identically distributedsamples of X. Thus, if p(x) ∈ Hα, α > λ+ 1

2 , m ≈ lgN/(2λ+ 1)lg2, then:

E|pm(x) − p(x)|2 ≤ O(2−2mλ) (12.51)

Page 464: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Probability Density Estimation Based on Orthogonal Wavelet Series 445

Proof: First, we have

E|pm(x) − p(x)|2= E|(pm(x)− pm(x)) + (pm(x)− p(x))|2= E|pm(x) − pm(x)|2 + E|pm(x)− p(x)|2

+2E[(pm(x)− pm(x))(pm(x)− p(x))]Note that

Epm(x) = E( 1N

∑Ni=1 Lm(x,Xi))

= 1N

∑Ni=1 ELm(x,Xi)

=∫ Lm(x, y)p(y)dy

= pm(x)

(12.52)

Hence,

E[(pm(x)− pm(x))(pm(x)− p(x))] = 0 (12.53)

Therefore, we can have:

E|pm(x) − p(x)|2= E|pm(x) − pm(x)|2 + |pm(x)− p(x)|2 (12.54)

where

E|pm(x)− pm(x)|2

= E| 1N

N∑i=1

[Lm(x,Xi)− pm(x)]|2

=1N

[∫L2m(x, y)p(y)dy − p2

m(x)]

≤ 1N

∫L2m(x, y)p(y)dy

≤ 1N‖p(·)‖∞Lm(x, x)

=2m

N‖p(·)‖∞Lm(2mx, 2mx)

= O(2m

N) (12.55)

where ‖p(·)‖∞ is a constant, Lm(2mx, 2mx) is an impulse function that hasthe same magnitude as L(x, x). If we let m = O(lgN), then when m→∞,

Page 465: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

446 Classifier Design Based on Orthogonal Wavelet Series

L(2mx, 2mx) will gradually become a point impulse. Furthermore, sincelimm→∞ 2m

N = 0, we have limm→∞ E|pm(x) − pm(x)|2 = 0. On the otherhand,

|pm(x) − p(x)|= |

∫Lm(x, y)p(y)dy − p(x)|

= |∫

[Lm(x, y)− δ(x− y)]p(y)dy|≤ ‖Lm(x, ·) − δ(x− ·)‖−α‖p‖α (12.56)

Inequality 12.56 is a Schwarz inequality in the Sobolev space. From Theo-rem 12.1, we know that:

‖Lm(x, ·) − δ(x− ·)‖−α = O(2−mλ) (12.57)

Therefore,

|pm(x) − p(x)|2 ≤ O(2−2mλ) (12.58)

If we let N = 2m(2λ+1), we can write m = lgN/(2λ + 1)lg2 = O(lgN).Since 2m

N = 2−2mλ, we have limm→∞ 2m

N = limm→∞ 2−2mλ = 0.Hence, based on the above derivations, we can arrive at the following

expression:

E|pm(x) − p(x)|2 ≤ O(2−2mλ) (12.59)

This concludes our proof.

Let us now recall the orthogonal wavelet series density estimator, pm(x),

pm(x) =1N

N∑I=1

Lm(x,Xi) (12.60)

Based on Theorem 12.2, we know that if the number of samples Xi forfeature vector X is given, as denoted by N , m can be rewritten as m ≈lgN/(2λ+ 1)lg2. Once m is known, the window width of impulse functionLm(x,Xi) can accordingly be determined. In other words, Theorem 12.2provides a criterion for determining the window width of impulse functionLm(x,Xi) from the number of samples, N , which is exactly what the early-mentioned kernel estimator is lacking of.

Page 466: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Probability Density Estimation Based on Orthogonal Wavelet Series 447

From the above discussions, we can note that the orthogonal waveletseries estimator differs from the kernel estimator and the traditional or-thogonal series density estimator. Its basic idea shares some similarities tothat of the traditional orthogonal series density estimator. However, it alsosatisfies several key properties of kernel estimator and exhibits some addi-tional features. Generally speaking, the orthogonal wavelet series densityestimator represents a new non-parametric way of estimating density func-tions, which has a great potential for practical applications. For instance,in pattern classifier design, sometimes, the probability density function,p(x), of a certain feature vector may not be available. In such a case, wecan readily replace p(x) with pm(x) using the above-described orthogonalwavelet series density estimator, and thus, effectively design the classifiers.

Page 467: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

This page intentionally left blankThis page intentionally left blank

Page 468: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

List of Symbols

• R: the set of all the real numbers;• N: the set of all the natural numbers;• Z: the set of all the integers;• Z+: the set of all the negative integers;• Rd: d-dimensional Euclidean space;• T: the quotient group R/2πZ;• Re(z): the real part x of complex number z = x+ iy;• Im(z): the imaginary part y of complex number z = x+ iy;• For sets A and B, A\B := x|x ∈ A and x ∈ B;• a.e.: almost everywhere;• Let M be a matrix, its transposed matrix is denoted by M t; If M is

invertible, its inverse matrix is denoted byM−1 and its determinantis denoted by det(M);• Lp, Lp(R) (1 ≤ p < ∞): the space of all the p-power integrable

functions, i.e.:

Lp := Lp(R) :=f

∣∣∣∣ ∫R

|f(x)|pdx <∞.

• Lp, Lp(T) (1 ≤ p < ∞): the space of all the p-power integrable,2π-periodic functions, i.e.:

Lp := Lp(T) :=f

∣∣∣∣ ∫T

|f(x)|pdx <∞.

• lp, lp(Z) (1 ≤ p < ∞): the space of all the p-power sumable

449

Page 469: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

450 List of Symbols

sequences, i.e.:

lp := lp(Z) :=

ck

∣∣∣∣∣ ∑k∈Z

|ck|p <∞.

• The Fourier transform of f ∈ L1(R) is defined by

f(ξ) :=∫

R

f(x)e−ix·ξdx,

and the Inverse Fourier is defined by

f =12π

∫R

f(x)eix·ξdx.

• The inner product of f, g ∈ L2(R) is defined by

〈f, g〉 :=∫

R

f(x)g(x)dx,

and the following equality holds always:

〈f, g〉 = 12π〈f , g〉.

• The Fourier coefficients of f ∈ L1(T) are defined by

ck(f) :=∫

T

f(x)e−ik·xdx.

It is always true that f(x) ∼∑k∈Z

ck(f)eik·x.• Let φ(x) is a function defined on R, denote

φj,k(x) := 2j/2φ(2jx− k) (∀j ∈ Z, k ∈ Z).

• The support of a complex sequence ckk∈Z is defined by

suppckk∈Z := k ∈ Z | ck = 0.

Page 470: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Bibliography

Aghajan, H. K. and Kailath, T. (1994). SLIDE: Subspace-based line detec-tion. IEEE Transactions on Pattern Analysis and Machine Intelligence,16(11):1057–1073.

Auslander, L., Kailath, T., and Mitter, S., editors (1990). Signal Processing I:Signal Processing Theory. Springer-Verlag, New York.

Beylkin, G., Coifman, R., Daubechies, I., Mallat, S., Meyer, Y., Raphael, L., andRuskai, B. (1991). Wavelets and their Applications. MA, MA: Jones andBartlett.

Blum, H. (1967). A Transformation for Extracting New Desxriptors of Shape, W.Wathen-Dunn, Eds., Models for the Perception of Speech and Visual Form.The MIT Press, Massachusetts.

Bow, S. T. (1992). Pattern Recognition and Image Preprocessing. Marcel-Dekker,Marcel-Dekker: New York.

Brady, M. (1983). Criteria for Representation of Shape, J. Beck and B. Hope andA. Rosenfeld, Eds., Human and Machine Vision. Academic Press, NewYork.

Brady, M. and Asada, H. (1993). Smoothed local symmetries and their imple-mentation. Int’l J. Robotics Res., 15:973–981.

Canny, J. (1986). A computational approach to edge detection. IEEE Transac-tions on Pattern Analysis and Machine Intelligence, 8(6):679–698.

Chambolle, A., DeVore, R. A., Lee, N. Y., and Lucier, B. J. (1998). Nonlinearwavelet image processing: Variational problems, compression, and noise re-moval through wavelet shrinkage. IEEE Transactions on Image Processing,7(3):319–335.

Chang, H. S. and Yan, H. (1999). Analysis of stroke structures of handwrittenchinese characters. IEEE Transactions on Systems, Man, and Cybernetics(B), 29:47–61.

Chaohao, G. (1992). Mathematics Dictionary. Shanghai Dictionary Press, Shang-hai, China.

451

Page 471: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

452 Bibliography

Chen, C., Lee, J., and Sun, Y. (1995). Wavelet transformation for gray-levelcorner detection. Pattern Recognition, 28(6):853–861.

Chen, G. and Yang, Y. H. H. (1995). Edge detection by regularized cubic B-splinefitting. IEEE Transactions on Systems, Man, and Cybernetics, 25(4):636–643.

Chuang, G. C. H. and Kuo, C. C. J. (1996). Wavelet descriptor of planar curves:Theory and applications. IEEE Transactions on Image Processing, 5(1):56–70.

Chui, C. K. (1992). An Introduction to Wavelets. Academic Press, Boston.Combettes, P. L. (1998). Convex multiresolution analysis. IEEE Transactions on

Pattern Analysis and Machine Intelligence, 20(12):1308–1318.Combettes, P. L. and Pesquet, J. C. (2004). Wavelet-constrained image restora-

tion. International Journal of Wavelets, Multiresolution and InformationProcessing, 2(4):371–389.

Connell, J. H. and Brady, M. (1987). Generating and generalizing models ofvisual objects. Artifial Intelligence, 31:159–183.

Daubechies, I. (1988). Orthonormal bases of compactly supported wavelets.Comm. on Pure & Applied Mathematics, 41(7):909–996.

Daubechies, I. (1990). Wavelet transform, time-frequency localization and signalanalysis. IEEE Transactions on Information Theory, 36:961–1005.

Daubechies, I. (1992). Ten Lectures on Wavelets, volume 61. CBMS - ConferenceLecture Notes, SIAM Philadelphia.

Daugman, J. (2003). Demodulation by complex-valued wavelets for stochasticpattern recognition. International Journal of Wavelets, Multiresolution andInformation Processing, 1(1):1–317.

de Wouwer, G., Scheunders, P., Livens, S., and Dyck, D. V. (1999a). Wavelet cor-relation signatures for color texture characterization. Pattern Recognition,32:443–451.

de Wouwer, G. V., Schenuders, P., and Dyck, D. V. (1999b). Statistical texturecharacterization from discrete wavelet representation. IEEE Transactionson Image Processing, 8:592–598.

Deng, W. and Lyengar, S. S. (1996). A new probability relaxation scheme andits application to edge detection. IEEE Transactions on Pattern Analysisand Machine Intelligence, 18(4):432–443.

Edgar, G. A. (1990). Measure, Topology, and Fractal Geometry. Springer-Verlag,New York.

El-Khamy, S. E., Hadhoud, M. M., Dessouky, M. I., Salam, B. M., and El-Samie,F. E. A. (2006). Wavelet fusion: A tool to break the limits on lmmse imagesuper-resolution. International Journal of Wavelets, Multiresolution andInformation Processing, 4(1):105–118.

Falconer, K. L. (1985). The Geometry of Fractal Sets. Cambridge UniversityPress.

Falconer, K. L. (1990). Fractal Geometry: Mathematical Foundation and Appli-cations. New York: Wiley.

Page 472: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Bibliography 453

Gabor, D. (1946). Theory of communication. Journal Inst. Elect. Engr., 93:429–457.

Ge, Y. and Fitzpatrick, J. M. (1996). On the generation of skeletons from dis-crete euclidean distance maps. IEEE Transactions on Pattern Analysis andMachine Intelligence, 18:1055–1066.

Gilbarg, D. and Trudinger, N. S. (1977). Elliptic Partial Differential Equationsof Second Order. Berlin ; New York : Springer.

Grossmann, A. and Morlet, J. (1984). Decomposition of Hardy function intosquare integrable wavelets of constant shape. SIAM J. Math. Anal., 15:723–736.

Grossmann, A. and Morlet, J. (1985). Decomposition of functions into waveletsof constant shape, and related transforms. In Streit, L., editor, Lectureon Recent Results, Mathematics and Physics. World Scentific publishing,Signapore.

Grossmann, A., Morlet, J., and Paul, T. (1985). Transforms associated to squareintegrable group representations I. General results. J. Math. Phys., 26:2473–2479.

Haley, G. M. and Manjunath, B. S. (1999). Rotation-invariant texture classifica-tion using a gomplete space-frequency model. IEEE Transactions on ImageProcessing, 8(2):255–269.

Hsieh, J.-W., Liao, H.-M., Ko, M.-T., and Fan, K.-C. (1995). Wavelet-based shapeform shading. Graphical Models and Image Processing, 57(4):343–362.

IEEE (1992). Special issue on wavelet transforms and multiresolution signalanalysis. IEEE Transactions on Information Theory, 38(2):529–924.

IEEE (1993). Special issue on wavelets and signal processing. IEEE Transactionson Signal Processing, 41(12):3213–3600.

Jain, P. and Merchant, S. N. (2004). Wavelet-based multiresolution histogramfor fast image retrieval. International Journal of Wavelets, Multiresolutionand Information Processing, 2(1):59–73.

Janssen, R. D. T. (1997). Interpretation of Maps: from Bottom-up to Model-based,H. Bunke and P. S. P. Wang, Eds., Handbook of Character Recognition andDocument Image Analysis. World Scientific, Singapore.

Kouzani, A. Z. and Ong, S. H. (2003). Lighting-effects classification in facialimages using wavelet packets transform. International Journal of Wavelets,Multiresolution and Information Processing, 1(2):199–215.

Kovesi, P. (1995). Image features from phase congruency. Technical report,University of Western Australia, Robotics and Vision Group, Australia.

Kovesi, P. (1997). Symmetry and asymmetry from local phase. In Tenth Aus-tralian Joint Converence on Artificial Intelligence, pages 2–4.

Ksantini, R., Ziou, D., Dubeau, F., and Harinarayan, P. (2006). Image retrievalbased on region separation and multiresolution analysis. International Jour-nal of Wavelets, Multiresolution and Information Processing, 4(1):147–175.

Kubo, M., Aghbari, Z., and Makinouchi, A. (2003). Content-based image retrievaltechnique using wavelet-based shift and brightness invariant edge feature.

Page 473: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

454 Bibliography

International Journal of Wavelets, Multiresolution and Information Pro-cessing, 1(2):163–178.

Kumar, S. and Kumar, D. K. (2005). Visual hand gestures classification usingwavelet transforms and moment based features. International Journal ofWavelets, Multiresolution and Information Processing, 3(1):79–101.

Kumar, S., Kumar, D. K., Sharma, A., and McLachlan, N. (2003). Visual handgestures classification using wavelet transforms. International Journal ofWavelets, Multiresolution and Information Processing, 1(4):373–392.

Kunte, R. S. and Samuel, R. D. S. (2007). Wavelet descriptors for recognition ofbasic symbols in printed kannada text. International Journal of Wavelets,Multiresolution and Information Processing, 5(2):351–367.

Lai, J. H., Yuen, P. C., and Feng, G. C. (1999). Spectroface: A Fourier-basedapproach for human face recognition. Proc. of ICMI ’99, pages VI115–120.

Lam, L., Lee, S. W., and Suen, C. Y. (1992). Thinning methodologies - a com-prehensive survey. IEEE Transactions on Pattern Analysis and MachineIntelligence, 14:869–885.

Law, T., Iton, H., and Seki, H. (1996). Image filtering, edge detection, and edgetracing using fuzzy reasoning. IEEE Transactions on Pattern Analysis andMachine Intelligence, 18(5):481–491.

Lee, S. W., Kim, C. H., Ma, H., and Tang, Y. Y. (1996). Multiresolution recog-nition of unconstrained handwritten numerals with wavelet transform andmultilayer cluster neural network. Pattern Recognition, 29:1953–1961.

Leyton, M. (1988). Symmetry, Causality, Mind. The MIT Press, Massachusetts.Li, H. (2006). Wavelet-based weighted average and human vision system image

fusion. International Journal of Wavelets, Multiresolution and InformationProcessing, 4(1):97–103.

Li, S. (2008). Multisensor remote sensing image fusion using stationary wavelettransform: Effects of basis and decomposition level. International Journalof Wavelets, Multiresolution and Information Processing, 6(1):37–50.

Liang, K. H., Chang, F., Tan, T. M., and Hwang, W. L. (1999). MultiresolutionHadamard representation and its application to document image analysis.In Proc. of The Second Int. Conf. on Multimodel Interface (ICMI’99), pagesV1–V6, Hong Kong.

Liang, K. H. and Tjahjadi, T. (2006). Adaptive scale fixing for multiscale texturesegmentation. IEEE Transactions on Image Processing, 15(1):249–256.

Liao, Z. and Tang, Y. Y. (2005). Signal denoising using wavelets and block hiddenmarkov model. International Journal of Pattern Recognition and ArtificialIntelligence, 19(5):681–700.

Long, R. (1995). High-Dimensional Wavelet Analysis. World Books Co. Pte. Ltd,Beijing.

Ma, H., Xi, D. H., Mao, X. G., Tang, Y. Y., and Suen, C. Y. (1995). Docu-ment analysis by fractal signatures. In Spitz, A. L. and Dengel, A., editors,Document Analysis Systems. World Scientific Publishing Co. Pte, Ltd., Sin-gapore.

Page 474: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Bibliography 455

Mallat, S. (1989a). Multiresolution approximations and wavelet orthonormalbases of L2(R). Trans. Amer. Math. Soc., 315:69–87.

Mallat, S. (1989b). A theory of multiresolution signal decomposition: The waveletrepresentation. IEEE Transactions on Pattern Analysis and Machine In-telligence, 11:674–693.

Mallat, S. (1998). Wavelet Tour of Signal Processing. Academic Press, San Diego,USA.

Mallat, S. and Hwang, W. L. (1992). Singularity detection and processing withwavelets. IEEE Transactions on Information Theory, 38:617–643.

Mallat, S. and Zhong, S. (1992). Characterization of signals from multiscaleedges. IEEE Transactions on Pattern Analysis and Machine Intelligence,14(7):710–732.

Mallat, S. G. (1989c). Multifrequency channel decompositions of images andwavelet models. IEEE Transactions on Acoust. Speech Signal Process.,37(12):2091–2110.

Mandelbrot, B. B. (1982). The Fractal Geometry of Nature. New York: Freeman.Marr, D. and Hildreth, E. C. (1980). Theory of edge detection. In Proc. of Roy.

Soc., pages 187–217, London.Matalas, L., Benjamin, R., and Kitney, R. (1997). An edge detection technique

using the facet model and parameterized relaxation labeling. IEEE Trans-actions on Pattern Analysis and Machine Intelligence, 19(4):328–341.

Meyer, Y. (1990). Ondelettes et Operatewrs, volume I, II. Hermann, Paris.Moghaddam, H. A., Khajoie, T., Rouhi, A. H., and Tarzjan, M. S. (2005). Wavelet

correlogram: A new approach for image indexing and retrieval. PatternRecognition., 38(12):2506–2518.

Morlet, J., Arens, G., Fourgeau, E., and Giard, D. (1982a). Wave propogationand sampling theory-Part 1: Complex signal and scattering in multilayeredmedia. Geophysics, 47:203–221.

Morlet, J., Arens, G., Fourgeau, E., and Giard, D. (1982b). Wave propogation andsampling theory-Part 2: Sampling theory and complex waves. Geophysics,47:222–236.

Muneeswaran, K., Ganesan, L., Arumugam, S., and Harinarayan, P. (2005). Anovel approach combing gabor wavelet transforms and moments for tex-ture segmentation. International Journal of Wavelets, Multiresolution andInformation Processing, 3(4):559–572.

Munkres, J. R. (1975). Topology, A First Course. New Jersey: Prentice-Hall Inc.Murtagh, F. and Starck, J. L. (1998). Pattern clustering based on noise modeling

in wavelet space. Pattern Recognition, 31:847–855.Nastar, C. and Ayache, N. (1996). Frequency-based non-rigid motion analysis.

IEEE Transactions on Pattern Analysis and Machine Intelligence, 18(11).Ogniewicz, R. L. and Kubler, O. (1995). Hierarchic voronoi skeletons. Pattern

Recognition, 28:343–359.O’Toole, A., Abdi, H., Deffenbacher, K., and Valentin, D. (1993). Low-

dimensional representation of faces in higher dimensions of the face space.

Page 475: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

456 Bibliography

J. Opt. Soc. Am. A., 10(3):405–411.Pavlidis, T. (1986). Vectorizer and feature extractor for document recognition.

Computer Vision, Graphics, Image Processing, 35:111–127.Procter, P. (1993). Longman English-Chinese Dictionary of Contemporary En-

glish. Hong Kong: Longman Asia Limited.Rom, H. and Medioni, G. (1984). Hierarchical decomposition and axial shape

description. IEEE Transactions on Pattern Analysis and Machine Intelli-gence, 3:36–61.

Rudin, W. (1973). Functional Analysis. McGraw-Hill, Inc., New York.Rudin, W. (1974). Real and Complex Analysis. McGraw-Hill Book Company,

2nd edition.Saint-Marc, P., Rom, H., and Medioni, G. (1993). B-spline contour representa-

tion and symmetry detection. IEEE Transactions on Pattern Analysis andMachine Intelligence, 15:1191–1197.

Shankar, B. U., Meher, S. K., and Chosh, A. (2007). Neuro-wavelet classifier formultispectral remote sensing images. International Journal of Wavelets,Multiresolution and Information Processing, 5(4):589–611.

Sharnia, A., Kumart, D. K., and Kumar, S. (2004). Wavelet directional his-tograms of the spatio-temporal templates of human gestures. InternationalJournal of Wavelets, Multiresolution and Information Processing, 2(3):283–298.

Shen, D. and Ip, H. H. S. (1999). Discriminative wavelet shape descriptors forrecognition of 2-D pattern. Pattern Recognition, 32:151–165.

Shensa, M. J. (1992). The discrete wavelets: Wedding the atrous and Mallatalgorithms. IEEE Transactions on Signal Processing, 40:2464–2482.

Sirovich, L. and Kirby, M. (1987). Low-dimensional procedure for the character-ization of human faces. J. of Opt. Soc. Amer. A., 4(3):519–524.

Smeulders, A. W. M., Worring, M., Santini, S., Gupta, A., and Jain, R. (2000).Content-based image retrieval at the end of early years. IEEE Transactionson Pattern Analysis and Machine Intelligence, 22:1349–13805.

Smith, R. W. (1987). Computer processing of line images: A survey. PatternRecognition, 20:7–15.

Special-Issue-Digital-Library (1996). IEEE Transactions on Pattern Analysis andMachine Intelligence, 18.

SPIE (1994). Special issue on wavelet applications. In Szu, H. H., editor, Proc.of SPIE 2242.

Starck, J. L., Bijaoui, A., and Murtagh, F. (1995). Multiresolution support ap-plied to image filtering and deconvolution. Graphical Models Image Pro-cessing, 57:420–431.

stollnitz, E. J., Derose, T. D., and Salesin, D. H. (1996). Wavelets for ComputerGraphics: Theory and Applications. Morgan Kaufmann Publishers.

Swets, D. L. and Weng, J. (1996). Using discriminant eigenfeatures for imageretrieval. IEEE Transactions on Pattern Analysis and Machine Intelligence,18(8):831–836.

Page 476: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Bibliography 457

Tang, Y. Y., Cheng, H. D., and Suen, C. Y. (1991). Transformation-ring-projection (TRP) algorithm and its VLSI implementation. InternationalJournal of Pattern Recognition and Artificial Intelligence, 5(1 and 2):25–56.

Tang, Y. Y., Li, B., Ma, H., and Liu, J. (1998a). Ring-projection-wavelet-fractalsignatures: A novel approach to feature extraction. IEEE Transactions onCircuits and Systems II.

Tang, Y. Y., Lihua, Q. S., Yang, and Feng, L. (1998b). Two-dimensional overlap-save method in handwriting recognition. In Proc. of 6th International Work-shop on Frontiers in Handwriting Recognition(IWFHR’98), pages 627–633,Taejon, Korea.

Tang, Y. Y., Liu, J., Ma, H., and B.Li (1996a). Two-dimensional wavelet trans-form in document analysis. In Proc. of 1st Int. Conf. on Multimodal Inter-face, pages 274–279, Beijing, China.

Tang, Y. Y., Liu, J., Ma, H., and Li, B. F. (1999). Wavelet orthonormal decompo-sition for extracting features in pattern recognition. International Journalof Pattern Recognition and Artificial Intelligence, 13(6):803–831.

Tang, Y. Y. and Ma, H. (2000). Classifier design based on orthogonal waveletseries. Technical report, Hong Kong Baptist.

Tang, Y. Y., Ma, H., B.Li, and Liu, J. (1996b). Character recognition based onDoubechies wavelet. In Proc. of 1st Int. Conf. on Multimodal Interface,pages 215–220, Beijing, China.

Tang, Y. Y., Ma, H., Liu, J., Li, B., and Xi, D. (1997a). Multiresolution analysisin extraction of reference lines from documents with graylevel background.IEEE Transactions on Pattern Analysis and Machine Intelligence, 19:921–926.

Tang, Y. Y., Ma, H., Xi, D., Cheng, Y., and Suen, C. Y. (1995a). Extractionof reference lines from document with grey-level background using sub-image of wavelets. In Proc. of 3-nd Int. Conf. on Document Analysis andRecognition, pages 571–574, Montreal, Canada.

Tang, Y. Y., Ma, H., Xi, D., Cheng, Y., and Suen, C. Y. (1995b). A newapproach to document analysis based on modified fractal signature. InProc. of 3-rd Int. Conf. on Document Analysis and Recognition, pages 567–570, Montreal, Canada.

Tang, Y. Y., Ma, H., Xi, D., Mao, X., and Suen, C. Y. (1997b). Modified frac-tal signature (MFS): A new approach to document analysis for automaticknowledge acquisition. IEEE Transactions on Knowledge and Data Engi-neering, 9(5):747–762.

Tang, Y. Y., Suen, C. Y., and Yan, C. D. (1994). Document processing forautomatic knowledge acquisition. IEEE Transactions on Knowledge andData Engineering, 6(1):3–21.

Tang, Y. Y., Yan, C. D., Cheriet, M., and Suen, C. Y. (1995c). Financial docu-ment processing based on staff line and description language. IEEE Trans-actions on Systems, Man, and Cybernetics, 25(5):738–754.

Page 477: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

458 Bibliography

Tang, Y. Y., Yang, L., and Liu, J. (2000). Characterization of dirac-structureedges with wavelet transform. IEEE Transactions on Systems, Man, andCybernetics (B), 30(1):93–109.

Tang, Y. Y., Yang, L. H., and Feng, L. (1998c). Characterization and detectionof edges by Lipschitz exponent and MASW wavelet transform. In Proc.of the 14th Int. Conf. on Pattern Recognition, pages 1572–1574, Brisbane,Australia.

Tang, Y. Y., Yang, L. H., and Feng, L. (1998d). Contour detection of handwritingby modular-angle-separated wavelets. In Proc. of the 6-th Inter. Workshopon Frontiers of Handwriting Recognition (IWFHR-VI), pages 357–366, Tae-jon, Korea.

Tang, Y. Y., Yang, L. H., Feng, L., and Liu, J. (1998e). Scale-independent waveletalgorithm for detecting step-structure edges. Technical report, Hong KongBaptist University University.

Tang, Y. Y., Yang, L. H., and Liu, J. (1997c). Wavelet-based edge detection inchinese document. In Proc. of the 17th Int. Conf. on Computer Processingof Oriental Languages, volume 1, pages 333–336.

Tang, Y. Y. and You, X. G. (2003). Skeletonization of ribbon-like shapes basedon a new wavelet function. IEEE Transactions on Pattern Analysis andMachine Intelligence, 25:1118–1133.

Thune, M., Olstad, B., and Thune, N. (1997). Edge detection in noisy data usingfinite mixture distribute analysis. Pattern Recognition, 30(5):685–699.

Tieng, Q. M. and Boles, W. W. (1997a). Recognition of 2D object contours usingthe wavelet transform zero-crossing representation. IEEE Transactions onPattern Analysis and Machine Intelligence, 19:910–916.

Tieng, Q. M. and Boles, W. W. (1997b). Wavelet-based affine invariant repre-sentation: A tool for recognizing planar objects in 3D space. IEEE Trans-actions on Pattern Analysis and Machine Intelligence, 19:846–857.

Tombre, K. (1998). Analysis of Engineering Drawings: State of the Art andChallenges, K. Tombre and A. K. Chhabra, Eds.,Graphics Recognition: Al-gorithm and Systems, volume 1389 of Lecture Notes in Computer Science.Springer-Verlag, Berlin.

Tou, J. T. and Gonzalez, R. C. (1974). Pttern Recognition Principles. Addison-Wesley, London.

Turk, M. and Pentland, A. (1991). Eigenfaces for recognition. Journal of CognitiveNeuroscience, 3(1):71–86.

Unser, M., Aldroubi, A., and Eden, M. (1992). On the asymptotic convergence ofB-spline wavelets to Gabor functions. IEEE Transactions on InformationTheory, 38:864–872.

Unser, M., Aldroubi, A., and Eden, M. (1993). A family of polynomial splinewavelets transforms. Signal Processing, 30:141–162.

Venkatesh, S. and Owens, R. (1990). On the classification of image features.Pattern Recognition Letters, 11:339–349.

Wunsch, P. and Laine, A. F. (1995). Wavelet descriptors for multiresolution

Page 478: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Bibliography 459

recognition of handprinted characters. Pattern Recognition, 28(8):1237–1249.

Yang, F., Wang, Z., and Yu, Y. L. (1998). Chinese typeface generation andcomposition using B-Spline wavelet transform. In Proc. of SPIE, WaveletApplications V Orlando, Florida, 1998, pages 616–620.

Yang, L., Suen, C. Y., and Tang, Y. Y. (2003a). A width-invariant property ofcurves based on wavelet transform with a novel wavelet function. IEEETransactions on Systems, Man, and Cybernetics (B), 33(3):541–548.

Yang, L. H., Bui, T. D., and Suen, C. Y. (2003b). Image recognition basedon nonlinear wavelet approximation. International Journal of Wavelets,Multiresolution and Information Processing, 1(2):151–161.

Yang, L. H., You, X., Haralick, R. M., Phillips, I. T., and Tang, Y. (2001).Characterization of dirac edge with new wavelet transform. In Proc. of 2thInt. Conf. Wavelets and its Application, volume 1, pages 872–878, HongKong.

Yoon, S. H., Kim, J. H., Alexander, W. E., Park, S. M., and Sohn, K. H. (1998).An optimum solution for scale-invariant object recognition based on themulti-resolution approximation. Pattern Recognition, 31:889–908.

You, X., Chen, Q., Fang, B., and Tang, Y. Y. (2006). Thinning character usingmodulus minima of wavelet transform. International Journal of PatternRecognition and Artificial Intelligence, 20(3):361–376.

You, X. and Tang, Y. Y. (2007). Wavelet-based approach to character skeleton.IEEE Transactions on Image Processing, 16:1220–1231.

Young, R. K. (1993). Wavelet Theory and its Applications. Kluwer AcademicPublishers, Boston.

Yuen, P. C., Dai, D. Q., and Feng, G. C. (1998). Wavelet-based PCA for hu-man face recognition. Proceeding of IEEE Southwest Symposium on ImageAnalysis and Interpretation, pages 223–228.

Zhang, G. (1986). Lecture of Functional Analysis, volume 1. Beijing UniversityPress.

Zou, J. J. and Yan, H. (2001). Skeletonization of ribbon-like shapes based onregularity and singularity analyses. IEEE Transactions on Systems, Man,and Cybernetics (B), 31(3):401–407.

Page 479: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

This page intentionally left blankThis page intentionally left blank

Page 480: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Index

C∞ functionfast decreasing, 112

admissibilityadmissible wavelet, 75condition, 75

algorithm, 116, 239, 241, 252, 272,274, 301, 305, 306, 314, 330, 331,383, 386, 388, 391, 392, 394, 404,406, 409, 411–413, 416, 419, 420

B-spline, 143, 399bank cheque, 381basic condition, 128basic condition I, 120, 128basic condition II, 120, 128basic condition III, 128basic smooth condition, 143, 144basic wavelet, 75, 83, 85, 88, 98basic window

center of, 78radius of, 78

biorthonormality, 109

cardinal splines, 181character processing, 399characteristic function, 137class function, 431classification, 19, 31classifier, 31, 32

classifier design, 429

minimum average lose, 433

minimum error-probability, 435

clustering, 19, 33

continuous multiresolutionapproximation (CMA), 52, 53

decision function, 430

dilation, 76

document

analysis, 19, 37–39, 381

form, 38, 387

processing, 38, 381

downsample, 151

edge

detection, 45, 201

Dirac, 226, 229, 236, 251, 252, 255,257, 258, 268, 272, 274, 275,279, 284, 285, 287, 294, 301

pixel, 206

roof, 226, 229, 236, 251

signal, 202

step, 45, 226, 229, 236, 251, 275

estimator

kernel, 438

Euler-Frobenius polynomials, 184,193

even function, 285, 317

461

Page 481: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

462 Index

filter function, 108Fourier transform, 5, 8, 16, 75

frequency window, 78

Gaussian, 80, 284, 296generalized function

slowly increasing, 112support of, 117

handprinted character, 48, 56

Heisenberg, 80

imagefusion, 20, 70

indexing, 20, 67retrieval, 20, 67

Indian language, 59invariant

grey-level, 251, 259, 265, 279, 286

moment, 50representation, 20, 49rotation, 49, 50, 62, 345, 349scale-, 52

slope, 251, 259, 263, 279, 287width, 280, 287, 294

limit function, 120, 128

linear phase, 93generalized, 93

Lipschitz exponent, 95, 225, 227Lipschitz regularity, 94, 226

uniformly, 94, 95, 225

local maximum modulus, 258, 262,264, 273, 274, 276, 285, 294, 299,305, 307, 329

Mallat algorithm, 148, 383, 387decomposition, 149, 150discrete form, 150reconstruction, 149, 151

mask, 108matrix, 135

eigenpolynomial of, 135eigenvalue of, 135

eigenvector of, 135, 141

maximum moduli, 322, 325–327,329–334, 336, 339

MMAWT, 331, 332

modulus-angle-separated wavelets(MASW), 233–235, 237, 242, 245,252

motion history image (MHI), 28, 29

multiresolution analysis, 69, 105, 107,383

biorthonormal, 109, 127

orthonormal, 107, 109, 132, 133

multiresolution feature, 56, 59multiresolution Hadamard

representation (MHR), 39–41

new wavelet, 284, 314, 316

odd function, 285, 316

orthonormality, 109

pattern recognition, 7, 18, 201, 202,222, 252, 311, 343–345, 356, 358,365, 381, 399, 429, 432, 435

quadratic spline, 317

recognition

character, 20, 47, 56, 59

face, 18, 22, 24, 27

hand gesture, 18, 28–30

handwritten, 20iris, 18, 21

reconstruction, 85

reference line, 381

Ribbon-like shape, 311, 316–318, 331,332

Riesz basis, 106, 107lower bound of, 107

upper bound of, 107

ring-projection, 49, 344–346, 349,350, 356, 367, 368

scaling function, 107

Page 482: Wavelet Approach to Pattern RecognitionWavelet Approach to Pattern Recognition

March 17, 2009 10:26 WorldScientific/ws-b8-5x6-0 wavelet

Index 463

singularity, 20, 43skeleton, 311, 318, 322, 325, 327, 331

CYM, 336, 337, 341ZSM, 336, 337, 341

smoothness function, 285symmetry, 311, 314, 315, 318, 319

PISA, 311SAT, 311SLS, 311

Tang-Yang wavelet, 284, 314–316texture, 62

analysis, 20, 61classification, 20, 61, 62color, 62rotation-invariant, 62segmentation, 66statistical, 62, 64

threshold, 204time window, 78time-frequency window, 78

area of, 80transform

Haar, 14, 16transition operator, 120

restriction of, 120eigenvalue of, 123, 126

eigenvector of, 123, 126spectral radius of, 120, 121,

123translation, 76two-scale equation, 106, 108

solution of, 112

two-scale relation, 127

uncertainty principle, 80upsampled, 151

vanishing moment, 95, 98

wavelet, 2complex-valued, 22descriptor, 20, 46–48, 56, 59directional histograms, 30

Gaussian, 99, 295Haar, 13, 14, 56, 101Mexico hat-like, 99nonlinear, 24quadratic splin, 251quadratic spline, 101, 214,

256–259, 263, 264, 267, 268,273, 284, 295, 300

spline, 100wavelet basis, 143

Battle-Lemare-spline, 162biorthonaoral, 144cardinal spline, 181compactly supported spline, 196Daubechies, 166, 171Haar, 156Littlewood-Paley, 158Meyer, 160orthonormal, 154–156

wavelet transform, 16, 22, 24, 27–29,202, 205, 208, 209, 222, 228, 238,239, 242, 244, 245, 251–253, 258,263, 264, 271, 273, 276, 279–281,285, 294, 299, 301, 305, 314–318,322, 325, 327–329, 334, 415, 417,420, 422, 424calculation, 211

one-dimensional, 213two-dimensional, 215

continuous, 75integral, 75inverse, 85, 88modulus of, 203

local maximal, 203, 205packets, 27scale, 91, 253, 282, 283

width light-dependent, 251, 259, 267,279

window function, 77

zero-crossing, 205