VOLUME GRAPH MODEL FOR 3D FACIAL SURFACE EXTRACTION Lei Wu1, Houqiang Li1, Nenghai Yu1, Mingjing Li2 1

MOE-Microsoft Key Lab of MCC and Department of EEIS University of Science and Technology of China, Hefei 230027, China 2 Microsoft Research Asia, 49 Zhichun Road, Beijing 100080, China ABSTRACT 3D facial extraction from volume data is very helpful in virtual plastic surgery. Although the traditional Marching Cubes algorithm (MC) can be used for this purpose, it could not separate the facial surface from other tissue surfaces. This weakness greatly limited the accuracy of the facial model and its application in plastic surgery. In this paper a volume graph model is proposed, in which the facial surface extraction is formulated as a min-cut problem and can be solved by existing graph cut algorithm. Based on this model, irrelevant tissue surfaces are effectively excluded and a more accurate 3D virtual face can be built for plastic surgery.

1. INTRODUCTION In order to build an accurate 3D facial model for virtual plastic surgery [15], facial surfaces should be extracted from magnetic resonance images (MRI) or other volume data. However, this process is nontrivial. The main issue encountered is how to extract the facial surfaces accurately while exclude that of other surrounding tissues. Great efforts have been made to solve the problem of 3D surface extraction from volumetric representations [3][4][6][12][13]. Among various methods, Marching Cubes algorithm (MC) [8] is the most commonly used surface extraction method in medical visualization. To improve the performance of MC, some variants of this basic algorithm have been proposed [11][10][9], such as the octree technique [7], feature sensitive surface extraction [6], etc. However, all of those methods are unable to separate facial surfaces from other tissue surfaces in the volume data successfully. Volume data is usually organized as a 3D array, in which each element is called a voxel and contains the gray information of corresponding tissue. In MC algorithm, the 3D volume data is divided into little cubes of 𝑛 Γ— 𝑛 Γ— 𝑛 voxels. In each cube, the voxels at the corner are called vertexes. First, object vertexes are separated from the background vertexes by a proper threshold of gray values. Then, the cube is classified into one of 15 predefined modes

(a)

(b)

Fig.1. Marching Cubes algorithm. (a)Marching Cubes modes; (b) visualization of facial extraction results by MC.

by the number and position of its object vertexes. For each mode of the cube, a certain triangulation method is provided. After all cubes are triangulated, the object’s surfaces are formed by the triangles in these cubes as shown in Fig.1 (a). However, this algorithm cannot separate facial surface with surrounding tissues. Because it will ransack surfaces throughout the volume data, parts of the irrelevant tissue surfaces inside the head are also extracted. An example is illustrated in Fig.1 (b). To overcome the weakness of MC, we propose a volume graph model for 3D face extraction, in which the facial extraction task is formulated as a min-cut problem in the graph theory. This enables us to use the existing graph cut approach to solve the problem. In this way 3D face surface can be accurately extracted without irrelevant tissues. The rest of this paper is organized as follows. In Section 2, the graph cut theory is briefly overviewed. In Section 3, the proposed volume graph model is explained in detail. The comparison with other approaches is provided in Section 4. Finally, the conclusion is drawn in Section 5. 2. OVERVIEW OF THE GRAPH CUT APPROACH Graph cut approach [14][12] is an optimization method to locate the global minimal cut in a graph [5]. It derives from graph theory and changes the s-t minimum cut problem, which is NP problem, into the max-flow problem that can be solved by the existing max-flow algorithm [1]. 2.1. Minimum Cut Problem In graph theory, a graph is defined as 𝐺(𝑉, 𝐸) , 𝑉 = 𝑉1 , 𝑉2 , β‹― , 𝑉𝑛 , = 𝐸𝑖𝑗 , 𝐢 = 𝐢𝑖𝑗 , 𝑖, 𝑗 = 1,2, β‹― , 𝑛. 𝑉 is the graph node set and E is the set of graph edges which connect

nodes. 𝐸𝑖𝑗 represents the edge connecting node 𝑉𝑖 and node 𝑉𝑗 directly. 𝐢𝑖𝑗 = 𝐢(𝑉𝑖 , 𝑉𝑗 ) is the capacity of edge 𝐸𝑖𝑗 , which evaluates the connection. This theory is first proposed to solve the problem of network flow, in which graph nodes represent the sites, and graph edges denote the connections between these sites. Capacity corresponds to the bandwidth on each connection. Then the cuts are defined as disabled connections in the network. The cuts capacity is evaluated by the loss of bandwidth on the cuts. The capacity of min-cuts is the least loss of bandwidth in the network to disconnect site S to site T. The min-cuts problem can be described as follows.

𝐢𝑖𝑗 =

βˆ€S, T βŠ‚ V, S ∩ T = βˆ…, mincut S, T = min Cut Ai , Ai

𝐢𝑖𝑗 = 𝑉 𝑖 ∈𝐴,𝑉 𝑗 ∈𝐴

(1) 𝐢 𝑉𝑖 , 𝑉𝑗

𝑉 𝑖 ∈𝐴,𝑉 𝑗 ∈𝐴

(2)

𝐴𝑖 is a subset of node set V and 𝐴𝑖 consists of the rest of the nodes. The cut in a graph is defined as the sum of capacity values of cutting edges, removing which the graph is split into two disconnected sub-graphs. In s-t minimum cut problem, the goal is to find the smallest cut in graph G that can cut off all paths from note set S to note set T. 2.2. Maximum Flow Problem A flow F is defined as a certain kind of value that can be transported from a source 𝑠 ∈ 𝑉 to a sink 𝑑 ∈ 𝑉. The sum of flow infusing a node must equal the sum of flow that goes out of it. The flow on each edge must be less than or equal to the capacity of the edge. An edge on which the flow is equal to the capacity is called saturated. A maximum flow is defined as the maximized flow through the 𝑠 β†’ 𝑑 path. According to Ford-Fulkerson theorem [1], the search of maximum flow from vertex s to vertex t equals to the extraction of the minimum cuts separating s and t, for the flow saturated lies uniformly on the minimum cut. So the min-cut problem can be solved by the existing max-flow algorithm [5]. One of most general algorithms for max-flow problem is the Augmenting paths algorithm: Step 1: Initialization. Set Flow to zero on each edge; Step 2: Search for an S-T path along which more flow may be pushed; Step 3: If no such path exists, finish; otherwise, increase the flow uniformly along this path until at least one edge becomes saturated. Step 4: Repeat Step 2 and 3 till finish. Ford and Fulkerson proved that a maximum flow will be obtained when this algorithm converges. Minimum cuts are the saturated edges in the max flow search process. 3. VOLUME GRAPH MODEL

1 1 + 𝐺𝜎 βˆ— βˆ‡πΌ(𝑒𝑖𝑗 )

𝛼

(3)

, 𝑒𝑖𝑗 ∈ 𝐸

(4)

βˆ‡πΌ 𝑒𝑖𝑗 = 𝑉𝑖 βˆ’ 𝑉𝑗

i

s. t. S βŠ† Ai , T βŠ† Ai , i = 0,1, β‹― 𝑐𝑒𝑑 𝐴, 𝐴 =

The volume graph model is represented as 𝐺(𝑉, 𝐸, 𝐢, 𝐢𝑒𝑑), where 𝑉 represents the set of voxels in the volume data, and 𝐸 represents the edge set. We assume that there are edge connections 𝑒 ∈ 𝐸 between adjacent voxels. Nonadjacent voxels s and t are not directly connected to each other but through a chain of edges. These chain edges form a path 𝑝(𝑠, 𝑑) . Each edge is assigned a capacity 𝐢𝑖𝑗 which indicates the likelihood of the existence of object surface. Cut represents a subset of edges, cutting off which the graph can be divided into two separate sub-graphs. In this paper, we define the capacity function as Eq. (3).

In Eq. (3), 𝐺𝜎 is the Gaussian kernel function with deviation 𝜎,while 𝛼 is a constant parameter. βˆ‡πΌ(𝑒𝑖𝑗 ) is the difference of gray values between the adjacent voxels. The more likely a surface exists between the two voxels, the less capacity will be assigned to the edge. The function 𝐢𝑖𝑗 drops to the minimum when 𝑒𝑖𝑗 lies on the object’s surfaces. In the volume graph model, a closed surface B divides the graph into inside part and outside part. This surface is represented as a set of edges which form the connection between inside voxels and outside voxels. The capacity of surface B is defined as the sum of capacities of all edges in it. 1 𝑓 𝐡 = π‘’βˆˆπ΅ 𝛼 ,𝐡 βŠ‚ 𝐸 (5) 1+ 𝐺𝜎 βˆ—βˆ‡πΌ(𝑒)

As the definition of capacity function has determined the nearer to the surface the smaller capacity will be, the mincuts of the volume graph will be the object surface 𝐡 βˆ— . 𝑓 𝐡 βˆ— = min𝑗

𝑒 𝑖 βˆˆπΆπ‘—

𝑓 𝑒𝑖 (6)

= min𝑖 𝑐𝑒𝑑(𝐴𝑖 , 𝐴𝑖 ) , 𝐢𝑗 ∈ 𝐢𝑒𝑑

𝐴𝑖 is the subset of the voxel inside cut 𝐢𝑗 , and 𝐴𝑖 consists of the voxels outside. In order to prevent extraction of other tissue surfaces, the search of min-cut will be constrained inside a closed shell 𝐡𝑖 , defined in Eq. (7). Initially, the shell should be placed at any place outside the object in the volume data where no other tissue exists. However, the position of the shell can affect the search time of surfaces. The nearer to the object surface, the faster the search can be finished. 𝑖 βˆƒπ΅π‘– βŠ‚ 𝑉, βˆ€π‘£π‘˜ ∈ 𝐡𝑖 , 𝑠. 𝑑. π‘£π‘˜ βˆ’ πΆπ‘šπ‘–π‘›

β‰€πœ€

(7)

𝑖 πΆπ‘šπ‘–π‘› is the minimum cuts candidate on the graph in i-th 0 iteration. πΆπ‘šπ‘–π‘› is defined as a random cuts near the facial surface. βˆ™ represents the distance measurement. 𝐡𝑖 is not the facial surface but an approximate initial shell with 𝑖 predefined thickness πœ€, which covers πΆπ‘šπ‘–π‘› and divides the volume into approximate background region 𝑇0 , shell 𝐡𝑖 and approximate object region 𝑆0 . So far, the shell may not

contain the real facial surface. Then the local min-cuts will be searched inside the shell 𝐡𝑖 . When the local min-cuts are found inside the shell, the shell will be deformed according to the min-cuts shape with the invariant thickness Ξ΅. As the definition of the capacity function has determined that the nearer to the facial surface the smaller cuts will be, capacity will lead the local min-cuts moving towards the facial surface and the shell will deform accordingly. When the facial surface is covered by the shell, the min-cuts will be the facial surface and the shell will not invade into other tissue across facial surface. Because it is searching for mincuts, the more surface is covered, the smaller capacity will be. If it moves across the facial surface, few surfaces will be covered and the capacity will rise. The whole process can be described into the following steps. Step 1: Set initial shall 𝐡0 ⟹ 𝑆0 , 𝑇0 𝑖 Step 2: For the i th iteration, find πΆπ‘šπ‘–π‘› inside 𝐡𝑖 𝑖 Step 3: form new Shell 𝐡𝑖+1 from πΆπ‘šπ‘–π‘› , 𝑖 𝑠. 𝑑. βˆ€π‘£π‘˜ ∈ 𝐡𝑖+1 , π‘£π‘˜ βˆ’ πΆπ‘šπ‘–π‘› β‰€πœ€ Step 4: if 𝐡𝑖+1 equals 𝐡𝑖 , then 𝐡𝑖 is the object surface and return; otherwise go to step 2. 4. EXPERIMENT We conduct the comparison between MC and VGM on the common MRI dataset of half human head consisting of 138 colored MRI each with size of 600*800, which is widely used as the test bed for evaluation of MRI processing algorithms. 4.1. Experimental Setting In order to evaluate both approaches, we compared the precision and recall of both extraction results. The manually marked facial surface is used as the ground truth. These measurements are defined as follows. 𝑇𝑝+ π‘π‘Ÿπ‘’π‘π‘–π‘ π‘–π‘œπ‘› = (8) 𝑇 +𝐹 𝑝+

π‘‡π‘Ÿ+ π‘Ÿπ‘’π‘π‘Žπ‘™π‘™ = π‘‡π‘Ÿ+ + π‘‡βˆ’

+

(9)

As tiny distortion from the manual marking is allowed, we define a threshold on the minimum distance between an extracted pixel and a manually marked pixel to judge whether the extracted pixel is positive or negative. If the distance between an automatically extracted pixel and its nearest marked pixel is smaller than a predefined threshold, the extracted pixel is classified into truth positive 𝑇𝑝+ ; otherwise false positive 𝐹+ . On the contrary, if the distance between a manually marked pixel and its nearest extracted pixel is smaller than the threshold, the marked pixel is classified into true positive π‘‡π‘Ÿ+ ; otherwise true negative π‘‡βˆ’ . In the evaluation, we calculate precision, recall of these two methods under 10 different thresholds, from 1 pixel to 10

Table 1: Precision comparison under ten thresholds Threshold 1 2 3 4 5 6 7 8 9 10

MC16 8.82 22.20 33.20 42.38 48.76 52.01 53.46 54.41 55.61 56.45

MC8 3.95 14.82 26.99 37.69 43.21 45.49 46.76 47.46 48.12 49.00

MC4 1.46 7.48 18.88 29.12 33.68 35.54 36.37 37.02 37.78 38.80

MC2 1.01 5.61 15.63 24.26 28.35 30.02 30.76 31.45 32.31 33.39

VGM 18.25 78.97 95.34 97.44 98.19 98.50 98.66 98.77 98.85 98.91

Table 2: Recall comparison under ten thresholds Threshold 1 2 3 4 5 6 7 8 9 10

MC16 0.48 3.31 10.03 21.28 36.92 55.20 73.41 91.33 94.06 94.55

MC8 1.26 10.42 32.51 65.63 82.10 91.75 95.64 97.65 98.51 99.10

MC4 2.96 24.71 48.01 74.26 93.30 98.26 99.12 99.68 99.89 99.96

MC2 9.27 29.94 53.49 80.68 97.48 99.63 99.94 99.97 100 100

VGM 29.72 89.79 96.01 97.16 97.61 97.78 97.89 97.96 98.03 98.11

pixel interval. By using the threshold, we can better compare the two 3D extraction algorithms with the allowance of tiny distortion from the manual marking. Otherwise the comparison makes little sense, as shown in Table 1 when the threshold is set to one, because distortionfree surface extraction is unavailable. 4.2. Experimental Evaluation We compare the results for the proposed Volume Graph Model (VGM) based approach with the MC approach. As MC algorithm is sensitive to parameters, the results turn out to be variant according to the size of cube 𝑛 Γ— 𝑛 Γ— 𝑛. To find the best performance of MC, we tried four different sizes (n=2, 4, 8, 16) notated as MC2, MC4, MC8, MC16. The comparisons under different thresholds are listed in Table 1 and Table 2. Fig.2 illustrates the precision and recall of the two approaches. We can see that both VGM and MC perform better if we loosen the threshold. VGM has statistically better performance in precision and recall when the threshold is set under 5, above which the comparison has little meaning. The reason for MC’s bad precision is somehow due to too many irrelevant surface voxels that it extracts from the volume data. The number of irrelevant voxels in MC will increase when using smaller cube size. So the smaller the cube size is, the lower the precision will be and the more facial points will be extracted, which results higher recall.

MC16

MC8

MC4

MC2

VGM

100 90 80 70 60 50 40 30 20 10 0

MC16

MC8

MC4

MC2

VGM

recall

precision

100 90 80 70 60 50 40 30 20 10 0

1

2

3

4

5

6

Treshold

7

8

9

10

1

2

3

(a)

4

5

6

Threshold

7

8

9

10

(b)

Fig.2. Comparison between VGM and MC. (a) precision comparison under ten different thresholds; (b) recall comparison under ten different thresholds.

4.3. Visual Evaluation Results

[2] Boykov, Y., Veksler, O., and Zabih, R., β€œFast approximate energy minimization via graph cuts,” IEEE Transactions on Pattern Analysis and Machine Intelligence, 2001. [3] Cohen-Or, D., Kadosh, A., Levin, D. and Yagel, R., β€œSmooth boundary surfaces from binary 3D datasets,” Volume Graphics, 2000. [4] Huang, A. and Nielson, G. M., β€œA comparison of weighted average methods for computing normals for Marching Cubes isosurface,” Proceedings of Vision, Mathematics and Visualization, 2003. [5] Ishikawa H., β€œGlobal Optimization Using Embedded Graphs,” PhD thesis, New York University, 2000. [6] Kobbelt, L., Botsch, M., Schwanecke, U. and Seidel, H., β€œFeature sensitive surface extraction from volume data,” Proceedings of SIGGRAPH, 2001.

Fig.3. 3D facial extraction by VGM compared with MC. (a) Illustration of the test MRI dataset. (b) The visual result of VGM. (c) The visual result of MC8.

We choose MC8 because its F1 measurement performs best in all MC results. Still, lots of the irrelevant tissues’ voxels, which do not belong to the facial surface, exist in MC8’s result. This is the main reason for MC’s lower performance. 6. CONCLUSIONS In this paper, we have proposed a volume graph model for 3D facial surface extraction from volume data. This model formulates the surface extraction task as a min-cut problem in graph theory, so that the existing graph cut approach can be adopted for the searching of facial surface. We compared the proposed approach with MC by precision and recall. Experimental results demonstrate that VGM has significant better performance over the traditional MC method. Visual exhibition of the facial extraction results show that VGM is superior to MC in excluding the irrelevant tissues’ surfaces. The high accurate facial surface extracted by VGM can help synthesize 3D face for virtual plastic surgery. 7. REFERENCES [1] Ahuja, R., Magnanti, T., and Orlin, J., β€œNetwork Flows: theory, algorithms and applications,” Prentice-Hall, Inc. Englewood Cliffs, New Jersey, 1993.

[7] Livnat, Y., Shen, H., Johnson, C., β€œA near optimal isosurface extraction algorithm using span space,” IEEE Trans. Visualization and Computer Graphics, 1996. [8] Lorensen, W.E., Cline, H.E., β€œMarching Cubes: A High Resolution 3D Surface Construction Algorithm,” Computer Graphics, 1987. [9] Montani, C., Scateni, R., Scopigno, R., β€œA modified look-up table for implicit disambiguation of Marching Cubes,” The Visual Computer, 1994. [10] Nielson, G. M., β€œOn Marching Cubes”, Transactions on Computer Graphics and Visualization, 2003. [11] Nielson, G. M., and Hamann, B., β€œThe asymptotic decider: Resolving the ambiguity in Marching Cubes,” Proceedings of Visualization, 1991. [12] Paris, S., Sillion, F., and Quan, L., β€œA volumetric reconstruction method from multiple calibrated views using global graph cut optimization,” Technical Report, 2003. [13] Sethian, J., β€œLevel Set Methods and Fast Marching Methods,” Cambridge University Press, 1999. [14] Veksler, O., β€œEfficient Graph-Based Energy Minimization Methods in Computer Vision,” PhD thesis, Cornell University, 1999. [15] Wu L., Li, H. Q., Yu, N. H., Li, M. J. β€œAccurate 3D Facial Synthesis for Plastic Surgery Simulation,” The 13th Intl. Multimedia Modeling Conf. (MMM’07), 2007.

Author Guidelines for 8

3D facial extraction from volume data is very helpful in ... volume graph model is proposed, in which the facial surface ..... Mathematics and Visualization, 2003.

620KB Sizes 3 Downloads 249 Views

Recommend Documents

Author Guidelines for 8
nature of surveillance system infrastructure, a number of groups in three ... developed as a Web-portal using the latest text mining .... Nguoi Lao Dong Online.

Author Guidelines for 8
The resulted Business model offers great ... that is more closely related to the business model of such an .... channels for the same physical (satellite, cable or terrestrial) ... currently under way is the integration of basic Internet access andΒ .

Author Guidelines for 8
three structures came from the way the speaker and channel ... The results indicate that the pairwise structure is the best for .... the NIST SRE 2010 database.

Author Guidelines for 8
replace one trigger with another, for example, interchange between the, this, that is ..... Our own software for automatic text watermarking with the help of ourΒ ...

Author Guidelines for 8
these P2P protocols only work in wired networks. P2P networks ... on wired network. For example, IP .... advantages of IP anycast and DHT-based P2P protocol.

Author Guidelines for 8
Instant wireless sensor network (IWSN) is a type of. WSN deployed for a class ... WSNs can be densely deployed in battlefields, disaster areas and toxic regionsΒ ...

Author Guidelines for 8
Feb 14, 2005 - between assigned tasks and self-chosen Γ’Β€ΒœownҀ tasks finding that users behave ... fewer queries and different kinds of queries overall. This finding implies that .... The data was collected via remote upload to a server for laterΒ ..

Author Guidelines for 8
National Oceanic & Atmospheric Administration. Seattle, WA 98115, USA [email protected] .... space (CSS) representation [7] of the object contour is thus employed. A model set consisting of 3 fish that belong to ... two sets of descending-ordered l

Author Guidelines for 8
Digital circuits consume more power in test mode than in normal operation .... into a signature. Figure 1. A typical ..... The salient features and limitations of theΒ ...

Author Guidelines for 8
idea of fuzzy window is firstly presented, where the similarity of scattering ... For years many approaches have been developed for speckle noise ... only a few typical non- square windows. Moreover, as the window size increases, the filtering perfor

Author Guidelines for 8
Ittiam Systems (Pvt.) Ltd., Bangalore, India. ABSTRACT. Noise in video influences the bit-rate and visual quality of video encoders and can significantly alter theΒ ...

Author Guidelines for 8
to their uniqueness and immutability. Today, fingerprints are most widely used biometric features in automatic verification and identification systems. There exists some graph-based [1,2] and image-based [3,4] fingerprint matching but most fingerprin

Author Guidelines for 8
sequences resulting in a total or partial removal of image motion. ..... Add noise. Add targets. Performance Measurement System. Estimate. Residual offset.

Author Guidelines for 8
application requests without causing severe accuracy and performance degradation, as .... capacity), and (3) the node's location (host address). Each information ... service also sends a message to the meta-scheduler at the initialization stageΒ ...

Author Guidelines for 8
camera's operation and to store the image data to a solid state hard disk drive. A full-featured software development kit (SDK) supports the core acquisition and.

Author Guidelines for 8 - Research at Google
Feb 14, 2005 - engines and information retrieval systems in general, there is a real need to test ... IR studies and Web use investigations is a task-based study, i.e., when a ... education, age groups (18 Ҁ“ 29, 21%; 30 Ҁ“ 39, 38%, 40. Ҁ“ 49, 25%

Author Guidelines for 8
There exists some graph-based [1,2] and image-based [3,4] fingerprint matching but most fingerprint verification systems require high degree of security and areΒ ...

Author Guidelines for 8
Suffering from the inadequacy of reliable received data and ... utilized to sufficiently initialize and guide the recovery ... during the recovery process as follows.

Author Guidelines for 8
smart home's context-aware system based on ontology. We discuss the ... as collecting context information from heterogeneous sources, such as ... create pre-defined rules in a file for context decision ... In order to facilitate the sharing of.

Author Guidelines for 8
affordable tools. So what are ... visualization or presentation domains: Local Web,. Remote Web ... domain, which retrieves virtual museum artefacts from AXTEΒ ...

Author Guidelines for 8
*Department of Computer Science, University of Essex, Colchester, United Kingdom ... with 20 subjects totaling 800 VEP signals, which are extracted whileΒ ...

Author Guidelines for 8
that through a data driven approach, useful knowledge can be extracted from this freely available data set. Many previous research works have discussed the.

Author Guidelines for 8
Feb 4, 2010 - adjusted by the best available estimate of the seasonal coefficient ... seeing that no application listens on the port, the host will reply with anΒ ...

Author Guidelines for 8
based systems, the fixed length low-dimension i-vectors are extracted by estimating the latent variables from ... machines (SVM), which are popular in i-vector based SRE system. [4]. The remainder of this paper is .... accounting for 95% of the varia