Multi-Layer Sparse Coding: The Holistic Way

被引:18
|
作者
Aberdam, Aviad [1 ]
Sulam, Jeremias [2 ]
Elad, Michael [3 ]
机构
[1] Technion Israel Inst Technol, Elect Engn Dept, IL-3200003 Haifa, Israel
[2] Johns Hopkins Univ, Biomed Engn Dept, Baltimore, MD 21205 USA
[3] Technion Israel Inst Technol, Comp Sci Dept, IL-3200003 Haifa, Israel
来源
基金
欧洲研究理事会; 以色列科学基金会;
关键词
sparse representations; multi-layer representations; sparse coding; analysis and synthesis priors; neural networks; SIGNALS; REPRESENTATIONS; GUARANTEES;
D O I
10.1137/18M1183352
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
The recently proposed multi-layer sparse model has raised insightful connections between sparse representations and convolutional neural networks (CNNs). In its original conception, this model was restricted to a cascade of convolutional synthesis representations. In this paper, we start by addressing a more general model, revealing interesting ties to fully connected networks. We then show that this multi-layer construction admits a brand new interpretation in a unique symbiosis between synthesis and analysis models: while the deepest layer indeed provides a synthesis representation, the midlayer decompositions provide an analysis counterpart. This new perspective exposes the suboptimality of previously proposed pursuit approaches, as they do not fully leverage all the information comprised in the model constraints. Armed with this understanding, we address fundamental theoretical issues, revisiting previous analysis and expanding it. Motivated by the limitations of previous algorithms, we then propose an integrated-holistic-alternative that estimates all representations in the model simultaneously, and we analyze all these different schemes under stochastic noise assumptions. Inspired by the synthesis-analysis duality, we further present a Holistic Pursuit algorithm, which alternates between synthesis- and analysis-sparse coding steps, eventually solving for the entire model as a whole, with provable improved performance. Finally, we present numerical results that demonstrate the practical advantages of our approach.
引用
收藏
页码:46 / 77
页数:32
相关论文
共 50 条
  • [41] VECTOR COMPRESSION FOR SIMILARITY SEARCH USING MULTI-LAYER SPARSE TERNARY CODES
    Ferdowsi, Sohrab
    Voloshynovskiy, Slava
    Kostadinov, Dimche
    2018 IEEE DATA SCIENCE WORKSHOP (DSW), 2018, : 110 - 114
  • [42] Salient object detection via sparse representation and multi-layer contour zooming
    Hu, Zhengping
    Zhang, Zhenbin
    Sun, Zhe
    Zhao, Shuhuan
    IET COMPUTER VISION, 2017, 11 (04) : 309 - 318
  • [43] Fusion of infrared and visible images via multi-layer convolutional sparse representation
    Zhang, Zhouyu
    He, Chenyuan
    Wang, Hai
    Cai, Yingfeng
    Chen, Long
    Gan, Zhihua
    Huang, Fenghua
    Zhang, Yiqun
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2024, 36 (06)
  • [44] Semi-sparse algorithm based on multi-layer optimization for recommender system
    Hu Guan
    Huakang Li
    Cheng-Zhong Xu
    Minyi Guo
    The Journal of Supercomputing, 2013, 66 : 1418 - 1437
  • [45] Semi-sparse algorithm based on multi-layer optimization for recommender system
    Guan, Hu
    Li, Huakang
    Xu, Cheng-Zhong
    Guo, Minyi
    JOURNAL OF SUPERCOMPUTING, 2013, 66 (03): : 1418 - 1437
  • [46] Network Coding Schemes For Multi-Layer Video Streaming On Multi-Hop Wireless Networks
    Baccouch, Hana
    Ageneau, Paul-Louis
    Tizon, Nicolas
    Boukhatem, Nadia
    2017 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2017,
  • [47] Multi-layer coding strategy for multi-hop block fading channels with outage probability
    Keykhosravi, Simin
    Akhlaghi, Soroush
    ANNALS OF TELECOMMUNICATIONS, 2016, 71 (5-6) : 173 - 185
  • [49] Multi-layer Pointillism
    Chi, Dongxiang
    Li, Ming
    Zhao, Ying
    Liu, Wenhong
    Hu, Jing
    2013 6TH INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING (CISP), VOLS 1-3, 2013, : 1056 - 1060
  • [50] A Generalized Multi-layer Information Hiding Scheme Using Wet Paper Coding
    Bidokhti, Amir
    Ghaemmaghami, Shahrokh
    2014 11TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2014, : 210 - 213