remarkRemark \newsiamremarkhypothesisHypothesis \newsiamthmclaimClaim \newsiamthmproblemProblem \newsiamthmalgorithm2Algorithm \newsiamremarkexampleExample \headersLearning true monotone operatorsY. Belkouchi, J.-C. Pesquet, A. Repetti and H. Talbot
Learning truly monotone operators with applications to nonlinear inverse problems††thanks: Submitted to the editors DATE.
Abstract
This article introduces a novel approach to learning monotone neural networks through a newly defined penalization loss. The proposed method is particularly effective in solving classes of variational problems, specifically monotone inclusion problems, commonly encountered in image processing tasks. The Forward-Backward-Forward (FBF) algorithm is employed to address these problems, offering a solution even when the Lipschitz constant of the neural network is unknown. Notably, the FBF algorithm provides convergence guarantees under the condition that the learned operator is monotone.
Building on plug-and-play methodologies, our objective is to apply these newly learned operators to solving non-linear inverse problems. To achieve this, we initially formulate the problem as a variational inclusion problem. Subsequently, we train a monotone neural network to approximate an operator that may not inherently be monotone. Leveraging the FBF algorithm, we then show simulation examples where the non-linear inverse problem is successfully solved.
keywords:
Monotone operator, Optimization, Inverse Problem, Deep learning, Forward-Backward-Forward, Plug and Play (PnP)47H05, 47H04, 47H10, 49N45
1 Introduction
In many image processing tasks, the objective is to solve a variational problem of the form
(1) |
where is a nonempty closed convex subset of , , and are functions which may have different mathematical properties and various interpretations. This problem appears especially in inverse imaging problems when using Bayesian inference methods to define a maximum a posteriori (MAP) estimate from degraded measurements [8]. Basic choices for and are
(2) |
where and . Here, vector corresponds to measurements corrupted by an additive white Gaussian noise, represents a linear model for the acquisition process (e.g., convolution, under-sampled Fourier, or Radon transform), is a well-chosen linear operator mapping the image to a transformed domain (e.g., wavelet transform), and is an norm, with . When , (2) allows us to recover a least squares formulation with a Tikhonov regularization [5, 8], whereas promotes sparse solutions to the inverse problem. Both and may be unknown, or approximately known, and may require learning strategies to achieve high reconstruction quality.
In the last decades, proximal splitting methods [13, 15] have been extensively used to address convex or non-convex variational large-scale problems that encompass constraints, both differentiable and non-differentiable functions, as well as linear operators. Multiple classes of proximal algorithms have been designed to tackle various forms of optimization problems. Among these algorithms, one can cite first-order algorithms such as the proximal point algorithm, Douglas-Rachford algorithm [12], forward-backward (FB) algorithm (also known as proximal gradient algorithm) [4, 13], or the forward-backward-forward (FBF) algorithm (also known as Tseng’s algorithm) [35]. The first two mentioned algorithms allow us to handle non-smooth functions, through their proximity operators, while the last two algorithms mix gradient steps (i.e., explicit or forward steps) with proximal steps (i.e., implicit or backward steps). While both FB and FBF algorithms are capable of minimizing the sum of a differentiable function and a non-differentiable function, the former requires the differentiable function to have a Lipschitz-continuous gradient, which is not needed when using Tseng’s algorithm.
Lately, proximal algorithms have further gained attention for tackling inverse imaging problems, as their efficiency has been enhanced when paired with powerful neural networks (NNs). These hybrid methods consist in replacing some of the steps in the proximal algorithm by a NN that has been trained for a specific task, leading to the so-called “plug-and-play” (PnP) methods. Traditionally, the intuition behind PnPs was to see the proximity operator as a Gaussian denoiser associated with the regularization term to compute the MAP estimate. Such a denoiser can be hand-crafted (e.g., BM3D) [3] or learned (i.e., NNs) [10, 17, 21, 22, 27, 30]. However, recently, a few studies studies began incorporating different types of NNs into proximal algorithms. These NNs may be trained for various tasks (e.g., inpainting [32]) or used to replace other steps in the algorithm than the proximity operator [2, 7, 21, 20]. For example, the NN could be used to replace the gradient step [21]. In this work, the authors learn a denoiser that is not constrained, and use Proximal Gradient Descent (PGD) as the minimization algorithm. The gradient step is modeled by using a denoising NN, which then allowed them to solve various image restoration tasks by plugging the denoiser into PGD, while having a good performance. Although the method involves a modified PGD with a backtracking step search, it does not yield the true minimum of the considered objective function since the modeled prior is non-convex. As such, converging to a critical point is guaranteed (as is the best case in most non-convex settings). On the other hand, the same authors have proposed to learn Bregman proximal operators, which can simplify some computations in order to handle measurement corrupted with Poisson noise [2, 20]. Finally, the variational problem offers a more general setting, namely maximally monotone operator (MMO) theory, to enlarge the parameter space of the NN in a constrained setting, while still offering global convergence guarantees to an optimal solution. Indeed, most proximal algorithms are grounded on MMO theory, in the sense that convergence of the iterates can be investigated for solving monotone inclusions, instead of variational problems [15]. In this context, the authors in [18, 27, 34] proposed to learn the resolvent of a maximally monotone operator, i.e., a firmly-nonexpansive operator.
Motivated by the MMO approach developed in [27], we propose to generalize (1) to monotone inclusion problems. First, it can be obviously noticed that the constrained optimization problem (1) can be rewritten as
(3) |
where denotes the indicator function of (see definition at the end of this section). Then, assuming that and are proper convex and lower semi-continuous functions, under suitable qualification conditions, is a solution to (3) if and only if it is the solution to the variation inclusion
(4) |
where is the normal cone to . Consequently, solving (4) is a special case of the following monotone inclusion problem where we have specified our working assumptions.
Problem 1.1.
Let be a closed convex set of with a nonempty interior. Let be a proper lower-semicontinuous convex function. Assume that is continuously differentiable on . Let be a monotone continuous operator defined on . We want to
(5) |
While (1) is an instance of Problem 1.1 under suitable conditions, the latter provides a more general formulation, and is not restricted to any variational model. For instance, does not have to be the gradient of any function. We hence move from the Bayesian formulation of inverse problem to a monotone inclusion framework. Note that the main difference between [27] and this work is that the former approach is based on Minty’s theorem which characterizes a maximally monotone operator through its resolvent. In [27], the focus in terms of modeling and learning was thus put on the resolvent operator of . In contrast, in this work, we model and learn directly , a “true” monotone operator. We will see that this paradigm shift will also have consequences for the algorithm choice.
Recently, monotone operator theory has found its way in the study of normalizing flows. These generative methods focus on modeling complex probability distributions using simple and known distributions such as Gaussian ones using neural networks [23, 28]. One of the major properties of these neural networks is invertibility, as most models suppose that a tractable diffeomorphism exists between the mappings involving the variables of both densities, and as such, the inverse model can be computed or estimated using different methods. Invertibility was usually imposed by enforcing the non nullity of the determinant of the Jacobian of the mapping, either through re-parametrization or carefully chosen loss functions [24], recent studies have focused on imposing strong monotonicity as a surrogate to invertibility [1, 9]. Ahn et al. imposed monotonicity using the Cayley operator associated to a given operator. They rely on the property stating that the Cayley operator of a monotone mapping is nonexpansive, hence enforce this condition through spectral normalization and newly defined 1-Lipschitz activations. Chaudhari et al. propose two new neural network architectures, Cascaded Network and Modular Network. Both architectures are monotone, and model the gradient field of a convex function. The main difference with our approach is that we aim to learn any monotone operator, which may or may not be a gradient, and thus their proof of monotonicity can be viewed as a special case of the one provided later in this paper. Moreover, [9] present a sufficient condition for the monotonocity imposed by carefully-crafted layers in the proposed model, while our method applies to any architecture, provided that the learning process converges to an acceptable solution. Lastly, we choose to tackle an original nonlinear inverse problem in the context of image restoration, as an application of Problem 1.1, which constitutes a different problem from normalizing flows. Note that, although a lot of works have been dedicated to linear inverse problems, the investigation of nonlinear degradation models is more scarce [11].
In this article, our primary focus lies in scenarios where the operator is unknown. To address this challenge, our methodological contribution to the field is two-fold. First, we tailor an existing algorithm to effectively tackle the inclusion Problem 1.1. Second, we introduce a comprehensive framework that harnesses neural networks to learn and replace the monotone operator , leveraging their capabilities of universal approximation. Our contributions encompass both algorithmic adaptation and the establishment of a novel approach for monotone operator learning through neural networks. To demonstrate the potential of our approach, we define and analyze a non-linear inverse problem which is modeled as a monotone inclusion problem, and we show that we are able to solve it using a learned monotone operator.
This article is structured as follows. In Section 2, we introduce Tseng’s algorithm and adapt it to solve Problem 1.1. In Section 3, we propose a PnP framework based on Tseng’s iterations. To this end, we relate monotonicity of neural networks to the study of their Jacobian, and present the training approach for learning monotone neural networks. In Section 4, we formulate a non-linear inverse problem as a variational inclusion problem, and solve it using the presented tools. Lastly, conclusions are drawn in Section 5.
Notation
is a Euclidean space, where is the norm and is the associated inner product. Let , the interior of is denoted by . An operator is a set-valued map if it maps every to a subset . is single valued if, for every , , in which case we consider that can be identified with an application from to . The graph of the set valued operator is defined as . The reflected operator of is defined as .
The Moreau subdifferential of a convex function is a set valued operator denoted as . If is differentiable, then is single valued, in which case refers to its gradient: . In addition, if is proper and lower-semicontinuous, the proximity operator of associates to every the unique point such that . The indicator function of a subset of is defined as: if , and otherwise. The normal cone to a set at is defined as if , and otherwise. In particular, if is a nonempty closed convex set, and is the projector onto .
Let . Then is a monotone (resp. strictly monotone) operator if (resp. if ). Furthermore, is a -strongly monotone operator, with constant , if . As a limit case, a monotone operator can be considered as -strongly monotone. We say that is maximally monotone if there exists no monotone operator such that . When is convex, proper, and lower semi-continuous, then is maximally monotone. A is -cocoercive with constant , if .
Let be a single valued operator, and . If is Fréchet differentiable, we denote by the Jacobian of at which is defined as the matrix that verifies . If is Fréchet differentiable, then is Gâteaux differentiable and, for every . Further, we define the symmetric part of its Jacobian operator as .
Let be a symmetric matrix. We denote by the smallest eigenvalue of , and by the maximum absolute value of the eigenvalues of . Let . The Loewner order (resp. ) is defined as, for every , (resp. ). Then is positive definite (resp. positive semidefinite) if and only if (resp. ). An alternative definition is that is positive definite (resp. positive semidefinite) if and only if (resp. ).
For further background on convex optimization and MMO theory, we refer the reader to [4].
2 Tseng’s algorithms for monotone inclusion problems
The algorithm we propose in this work is grounded on the original work by Tseng in [35]. In this section, we first recall the relevant background, and then give our modified version of Tseng’s algorithm for solving (5).
2.1 Forward-Backward-Forward strategy
The following monotone inclusion problem is considered in [35].
Problem 2.1.
Let be a nonempty closed convex subset of . Let be a proper, lower-semicontinuous, convex function, and let be a maximally monotone operator, continuous on . We want to
(6) |
Tseng proposed to solve Problem 2.1 using the following algorithm. {algorithm2} Let and be a sequence in .
(7) |
This method, sometimes also called forward-backward-forward (FBF) algorithm, is reminiscent of extragradient methods. The step-size can be determined using Armijo-Goldestein rule, defined below.
Definition 2.2 (Armijo-Goldstein rule).
Let and . Let be a sequence generated by Section 2.1. At every iteration , the stepsize is chosen such that where
(8) |
We have the following convergence result [35, Theorem 3.4].
Proposition 2.3.
Consider Problem 2.1. Let be a sequence generated by Section 2.1. Assume that
-
(i)
there exists a solution to the problem;
-
(ii)
is maximally monotone;
-
(iii)
for every ,
(9) is locally bounded;
-
(iv)
satisfies the rule given by Definition 2.2.
Then converges to a solution to the problem.
A strength of this algorithm is that it does not require the operator to be cocoercive as in the standard FB algorithm. In the particular case when is -Lipschitzian with , the stepsize can be chosen such that and , which allows the use of a constant stepsize [35]. Unfortunately, this implies estimating , which may be difficult. For example, when is a standard neural network employing nonexpansive activation functions, it is indeed Lipschitzian, but computing a tight estimate of its Lischitz constant in an NP-hard problem [14].
2.2 Modified algorithm
In this section, we propose to use the results presented in Section 2.1 to derive an algorithm for solving Problem 1.1. The proposed algorithm is given below. {algorithm2} Let and be a sequence in .
(10) |
The convergence of Section 2.2 can then be deduced from Proposition 2.3, which yields the following result.
Proposition 2.4.
Consider Problem 1.1. Let be generated by Section 2.2. Assume that
-
(i)
there exists a solution to Problem 1.1;
-
(ii)
for every , satisfies the Armijo rule given in Definition 2.2, for , and .
Then converges to a solution to Problem 1.1.
Proof 2.5.
According to [4, Theorem 20.21], there exists a maximally monotone extension of on , and (5) has the form of (6) with and . Then is proper, lower semi-continuous, and convex. Further, since is also proper, lower semi-continuous, and convex, then is maximally monotone. Since is maximally monotone and , then is maximally monotone [4, Corollary 25.5(ii)]. In addition, is continuous on .
We have and thus . Consequently, Assumption (ii) in Proposition 2.3 holds [4, Corollary 25.5(ii)].
Let be defined on by (9). We have
(11) |
Since we have seen that is continuous on , is locally bounded on and Assumption (iii) in Proposition 2.3 is satisfied.
The convergence result thus follows from Proposition 2.3 by noticing that.
3 Proposed method using a monotone NN
The objective of this work is to develop a PnP version of the proposed Tseng’s algorithm described in Section 2.2. To this aim, we will approximate the operator in Problem 1.1 by a monotone neural network , with learned parameters belonging to some set . Then, the modified form of Section 2.2 is given below. {algorithm2} Let and be a sequence in .
(12) |
In this section, we will describe how to build such a monotone neural network.
3.1 Properties of differentiable monotone operators
As described in Proposition 2.4, to ensure convergence of a sequence generated by Section 3, the NN must be monotone and continuous on . As most standard neural networks are continuous, especially those that use non-expansive activation function [27, 14], we only need to focus on ensuring monotonicity of .
Before providing a characterization of (strongly) monotone operators, let us state the following algebraic property.
Lemma 3.1.
Let be a symmetric matrix, let , and let . Then
(13) |
Proof 3.2.
Let be the eigenvalues of sorted in decreasing order. is a symmetric matrix with eigenvalues
(14) |
Since , we have . Thus, , which yields (13).
The following conditions will be leveraged later to enforce monotonicity of the network during its training.
Proposition 3.3.
Let be Fréchet differentiable, and let, for every , be the Jacobian of evaluated at . Let be the reflected operator of , let , and let . The following properties are equivalent:
-
(i)
is -strongly monotone;
-
(ii)
For every , ;
-
(iii)
For every , ;
-
(iv)
For every ,
(15)
In addition, if , then is invertible.
Proof 3.4.
We first show that (i) (ii). By definition [4, Definition 22.1] of a -strongly monotone operator, we have, for every and ,
(16) |
As is Fréchet differentiable, we deduce that
(17) | ||||
(18) |
Hence, for every , .
We now show that (ii) (i). Let , and let be defined as
(19) |
We notice that is differentiable on and its derivative is such that
(20) |
According to (ii) and (17), we have, for every , . Thus is an increasing function and
(21) |
Hence is -strongly monotone.
By using the definition of positive (semi) definiteness, (ii) is equivalent to
(22) |
The equivalence with (iv) is a direct consequence of Lemma 3.1.
In addition, we have
(23) |
By using the definition of positive (semi) definiteness, (iii) is equivalent to
(24) |
The equivalence with (iv) is a direct consequence of Lemma 3.1.
The last statement straightforwarly follows from [4, Corollary 20.28] and [4, Proposition 22.11] (see also [1]). Since is strongly monotone, it is strictly monotone, hence injective. Moreover, is single valued, monotone and continuous and is thus maximally monotone. Lastly, a maximally strongly monotone operator is surjective.
Remark 3.5.
-
(i)
The previous proposition allows us to build more general operators than gradients of convex functions. For example, let be -strongly convex, and twice differentiable. Let be Fréchet differentiable and anti-symmetric, i.e., for every , . Then, as a direct consequence of Proposition 3.3, is -strongly monotone.
-
(ii)
The Fréchet differentiability assumption required in Proposition 3.3 is fulfilled by neural networks using differentiable activation functions (e.g., sigmoids or softmax). As highlighted in [6], properties satisfied for such activation functions generalize to standard non differentiable ones (e.g., ReLU).
-
(iii)
Proposition 3.3(iv) enables to characterize a differentiable (strongly) monotone operator through the maximum magnitude eigenvalue of some matrices, which can be easily computed by power iteration. Further details will be provided in the next section to train a monotone NN.
-
(iv)
The sufficient strong monotonicity condition for the invertibility of is restrictive. In [1], a sufficient condition for the strong monotonicity based on the Lipschitzianity of the Cayley operator associated to is employed. Nevertheless, these conditions are not necessary to guarantee the convergence of Section 3.
3.2 Proposed regularization approach for training monotone NNs
We will now leverage the results given in the previous sections to design a method for training monotone NNs. In a nutshell, we will make the assumption that, for every , is Fréchet differentiable (see Remark 3.5(ii)) and resort to the power iteration method to control the eigenvalues of the NN, in accordance with Remark 3.5(iii).
Subsequently, we will propose an optimization strategy to train monotone NNs. The basic principle for training a NN is to learn its parameters on a specific finite dataset consisting of pairs of input/groundtruth data denoted by . Then the objective is to
(25) |
where is a loss function. Such a problem can then be solved efficiently using stochastic first-order methods such as Stochastic Gradient Descent, Adagrad, or Adam [31]. In this paper, we are interested in training NNs that are monotone. In this case, (25) becomes a constrained optimization problem:
(26) |
Standard gradient-based optimization algorithms are not inherently tailored for solving problems with constraints. While it is possible to pair some of these algorithms with projection techniques (as in [26, 33]), there are cases when identifying an appropriate projection method can be challenging. Moreover, utilizing projection methods may introduce convergence issues, particularly in scenarios involving non-convex constraints or projection operators with no closed form.
In the literature, we can find two deep learning frameworks ensuring constraints to be satisfied by NNs: either using a specific architecture definition [9, 16], or enforcing the constraint iteratively during the training procedure, possibly by adopting a penalized approach rather than a constrained one [1, 27, 33]. The first method consists in modifying the architecture to ensure that the solution always satisfies the desired property (for example the output of a ReLU function is guaranteed to be nonnegative). The second method enables to constrain any NN architecture at the expense of a higher training complexity. In this work, we will adopt the second approach, and propose a training procedure imposing monotonicity to the NN independently of its architecture by solving a penalized problem.
First, according to LABEL:{prop:jacobianmonotony}(iii), we notice that (26) can be rewritten as
(27) |
Equivalently, we could use the constraint , but we observed that the former formulation leads numerically to a more stable training. In practice, imposing the constraint for all possible images in is not tractable. Instead, we impose it on a subset of images .
Further, as suggested earlier, we introduce an external penalization approach for solving (27) [25, Section 13.1]. Hence, we aim to
(28) |
where is the penalization factor and the penalty function is given by
(29) |
In the above definition, is a severity parameter used to control the enforcement of the constraint. Finally, we define
(30) |
In practice, we generate points in by choosing as a realization of a random variable with uniform distribution on .
3.3 Penalized training implementation
This section aims to present the practical procedure we employ for solving (28), so as to train a monotone neural network. We will thus provide pseudo-codes usable with deep learning frameworks such as Pytorch. In the following, we first describe how we handle the penalization function . We then explain how to leverage this to solve our constrained optimization problem.
Penalization computation
Let . We need to evaluate and subdifferentiate , and in particular . As mentioned in Remark 3.5(iii), (29) can be reexpressed by using maximum absolute eigenvalues instead of a minimum eigenvalue. Similarly to [27], we will use a power iterative method that is designed to provide the largest eigenvalue in absolute value of a given matrix. The power iteration makes the computation tractable since only vector products are necessary. In particular, in our simulations, we will use the Jacobian-vector product (JVP) in Pytorch, using automatic differentiation. It follows from (15) that we actually need to combine two power iterations. The pseudo-code of the resulting method is given in Algorithm 1. In particular, we first compute using power iterations in steps 3-7 of Algorithm 1, followed by a second run of the power iterative method to compute in steps 9-16 of Algorithm 1. Further, in steps 8, 12 and 16, the dot product between the Jacobian and a vector is computed using JVP as mentioned above. JVP is a function that takes three inputs: an operator and two vectors . It returns . Note that in order to compute , we use the double backward trick111https://j-towns.github.io/2017/06/12/A-new-trick.html and the transpose of the vector-Jacobian product.
Since all the operations used in Algorithm 1 are differentiable operations, a subgradient of can be estimated through auto-differentiation to enable its use in standard optimizers (see next paragraph). However, according to [36], the resulting gradient may be noisy and computationally heavy. To overcome these issues, we disable the track of the auto-differentiation of the forward operators (using torch.no_grad() function in Pytorch) to compute the needed eigenvalue and its corresponding eigenvector (steps 3-13). Then, we activate the auto-differentiation tracking to compute the Rayleigh quotient (step 14). Note that this approximation is equivalent to initializing the power method with the correct eigenvector and then perform one step of the algorithm. In Section 4.1.4, we will show that the current approximation is accurate enough to allow us to train networks such that the constraint is properly satisfied.
Remark 3.6.
-
(i)
The use of the power iteration has the advantage of bypassing the computation of the Jacobian at a given point, which can be huge depending on the input/output dimensions.
-
(ii)
As a reminder, we cannot decompose our operator into multiple monotone operators as in [29], as the composition of two monotone operators is not necessarily monotone. Thus, being able to enforce monotonicity on a large model in an end to end fashion is required.
-
(iii)
In order to accelerate the process, we only compute the monotonicity penalization on one random element of each batch, which experimentally yields similar results to using a batch of data, with the benefit of speeding up the training.
Generic training framework
We present the pseudo-code summarizing the overall learning procedure in Algorithm 2. At each epoch , we iteratively select from of size until all the data has been seen. The associated batch loss (see step 9 in Algorithm 2) is associated with a Pytorch object containing all the history of the operations (called computational graph)222https://pytorch.org/blog/computational-graphs-constructed-in-pytorch/ used to compute the loss value. It is obtained by simply running a forward step with the neural network , and the associated loss and penalization values. The computational graph is then used to compute the subgradient through auto-differentiation (step (11) in Algorithm 2). Finally, the optimizer step (see step 12 in Algorithm 2) updates the parameters of with the selected scheme (e.g., gradient descent with momentum, etc) 333For example, the Pytorch implementation of Adam can be found in https://pytorch.org/docs/stable/generated/torch.optim.Adam.html..
4 Learning non-linear model approximations
In this section, we will study the challenging problem of learning the unknown forward model in a non-linear inverse imaging problem and propose a method to solve this problem.
4.1 Imaging semi-blind non-linear inverse problem
We consider a non-linear inverse problem, where the objective is to find an estimate , with , of an original unknown image from degraded measurements obtained as
(31) |
where models a measurement operator (possibly unknown) , and is a realization of an additive i.i.d. white Gaussian random variable with zero-mean and standard deviation .
In this section, we assume that the measurement operator is unknown. In turn, we have access to a collection of pairs of true images and associated measurements , that we will use to learn . Further, since the objective is to estimate , we will see next that it is judicious to learn a monotone approximation of . In the following, we will assume that is closed convex with a nonempty interior.
4.1.1 Measurement operator setting
In the remainder, we assume that the measurement operator is a sum of simple non-linear composite functions, where the inner terms correspond to linear convolution filters. Precisely, we consider
(32) |
where is a saturation function (e.g. Hyperbolic tangent function) with parameter and, for every , (e.g., may correspond to a convolution operator).
In our experiments, we consider model (31)-(32) with either or motion blur kernels, of size , generated randomly using the motionblur toolbox444https://github.com/LeviBorodenko/motionblur. The generated kernels are displayed in Figure 1. These kernels are all positive and are normalized so that the sum of the components is equal to . In addition, we choose to be a modified function (more details are given in Appendix A), with . Finally, we will consider two noise levels with standard deviation .
Note that there is no guarantee that model (32) is monotone. Solving inverse problems with such an operator can appear to be challenging, especially due to the non-linearity . A standard practice in such an inverse problem context consists in replacing by its first-order approximation expressed as
(33) |
For simplicity, when the parameter is assumed to be unknown, we can use instead the following linear approximation:
(34) |
Such a linearization of the model is standard in inverse problems. Note that it does not introduce any bias when .
Since the convolution filters are in practice unknown, represents the linear oracle. For this purpose, we will be approximating using a single linear operator , in order to compare our method to a more realistic result. More details about the results of this approximation are provided in Appendix B.
An example is provided in Figure 2, for the case when , , and is chosen as in LABEL:{s:SaturationFunction}. From left to right, the figure shows the true image , the observed image , and the approximated linear degradation obtained as . It can be observed that the light background behind the penguin is darker when using the true acquisition model than with the linear version , due to the saturation function .
4.1.2 Monotone inclusion formulation to solve (31)
The objective of this section is to find an estimate of from , solving the inverse problem (31), i.e., inverting . Note that the approach described below is not restricted to the particular choice of operator described in Section 4.1.1.
The problem of interest is equivalent to
(35) |
We propose two approaches to solve this problem.
Direct regularized approach
We propose to define as a solution to a regularized monotone inclusion problem of the form:
(36) |
where is a continuous monotone approximation to on , , and is a differentiable and convex regularization function.
Interestingly, (36) is an instance of Problem 1.1, where
(37) |
We have the following result concerning the existence of a solution to (36).
Proposition 4.1.
Assume that one of the following statements holds:
-
(i)
and is strongly convex,
-
(ii)
is bounded.
Then there exists a solution to (36).
Proof 4.2.
Since is monotone on , it admits a maximally monotone extension on . Problem (36) is thus equivalent to find a zero of . By proceeding similarly to the proof of Proposition 2.4 we can show that this operator is maximally monotone. In addition, if and is strongly convex, it is strongly monotone. The existence of a solution to (36) follows then from [4, Proposition 23.36(ii)] and [4, Corollary 23.37(ii)]
To solve (36) numerically, we can make use of Section 3. The convergence of this algorithm is guaranteed by Proposition 2.4, as soon as condition (ii) on the choice of the step-size is satisfied.
Least-squares regularized approach
In addition to the direct approach described above, we will investigate an original reformulation of problem (36) as
(38) |
where and is a continuous approximation to on . This approach is potentially less restrictive than (36) as it does not impose the approximation to the linear model to be monotone, but requires only to be monotone. Interestingly, when , (38) corresponds to the standard least-squares formulation. Then the existence of a solution to (38) is guaranteed similarly to Proposition 4.1. Section 2.2 can be rewritten for solving (38), similarly to (7).
Remark 4.4.
-
(i)
Similarly to Remark 4.3, operator can be inverted using (38) by setting and .
-
(ii)
According to [4, Prop. 20.10], when , is monotone.
Learned approximations to
In this work, we assume that neither the kernels nor the parameter are known in (32). Then, we leverage both the direct and the least-squares formulations described above to derive our learned approximation strategies for . The different considered approaches are described below:
-
(i)
The first classical strategy consists in learning a linear approximation of .
-
(ii)
We leverage the training approach developed in Section 3.2 to learn a monotone approximation of .
-
(iii)
To show the necessity of the proposed constrained training approach to obtain a monotone operator, we also consider an approximation of , that is learned without the proposed regularization (i.e., in (28)).
-
(iv)
We finally leverage the least-squares formulation (38) combined with the training approach developed in Section 3.2 to learn a monotone operator . Since is unknown, we use the learned linear operator , and learn under the constraint that is monotone. In the remainder, we will use the notation when referring to this approximation strategy.
Remark 4.5.
-
(i)
In the last restoration approach based on the least-squares strategy (38), is replaced by and .
-
(ii)
We emphasize that none of the proposed restoration procedures can be used with without losing theoretical guarantees, since neither nor are monotone.
4.1.3 Model and training procedure
In this section we describe the learning procedures adopted for the considered approximations to described in the previous section, focusing on non-linear approximations. The learning procedure of the linear operator is given in Appendix B.
NN architecture
We use a Residual Unet [37] consisting of blocks where the output of each down convolution have , , , , and feature maps, respectively. LeakyReLU activations were used for the intermediate layers. No activation was used in the last layer, so the learned NN must model the saturation using its weights and biases.
Training dataset
For , we use patches of size , randomly extracted from the BSD500 dataset, with pixel-values scaled to the range .
The couples in are linked through model (31)-(32). To investigate the stability against noise, we consider two cases for the training set: (i) training without noise (i.e., ), and (ii) training with noise level .
For , we crop the images of to smaller patches of size .
We set images from the dataset as test images (corresponding to BSD68), and use the other images for training.
Training procedure
The NN is trained using Adam optimizer with a learning rate of for epochs to solve (28) with an loss function:
(39) |
We use a learning rate scheduler that decreases the learning rate by a factor of when the training loss reaches a plateau. Model is trained by setting in (28) and , and Model is obtained by setting in (28) at start and . Finally, is chosen equal to in (29).
Filters | Noise | Model | ||
() | () | |||
for in (32) | ||||
1.5658 ( 0.58) | 1.67 | |||
0.2932 ( 0.11) | -29.99 | |||
0.6822 ( 0.25) | ||||
2.1474 ( 1.38) | -24.69 | |||
1.1575 ( 0.42) | 1.10 | |||
0.3020 ( 0.11) | -27.72 | |||
0.5351 ( 0.19) | ||||
2.1607 ( 1.37) | -25.87 | |||
0.5272 ( 0.20) | 1.18 | |||
0.2795 ( 0.10) | -22.06 | |||
0.6108 ( 0.22) | ||||
2.1473 ( 1.38) | -13.86 | |||
0.9414 ( 0.34) | 1.80 | |||
0.2714 ( 0.09) | -25.48 | |||
0.6591 ( 0.25) | ||||
2.1594 ( 1.37) | -16.55 | |||
for in (32) | ||||
1.2816 ( 0.53) | 1.91 | |||
0.2376 ( 0.09) | -18.73 | |||
0.4311 ( 0.14) | ||||
8.2009 ( 2.70) | -42.79 | |||
1.1689 ( 0.45) | 1.65 | |||
0.2275 ( 0.08) | -23.35 | |||
0.4679 ( 0.17) | ||||
8.1993 ( 2.69) | -43.18 | |||
0.7720 ( 0.30) | 1.52 | |||
0.1435 ( 0.05) | -17.38 | |||
0.4327 ( 0.14) | ||||
8.1920 ( 2.70) | -39.61 | |||
0.6867 ( 0.25) | 0.66 | |||
0.1788 ( 0.06) | -19.04 | |||
0.4809 ( 0.15) | ||||
8.1969 ( 2.70) | -35.39 |
PSNR | MAE() | MAE() |
MAE() | MAE() | MAE() |
PSNR | MAE() | MAE() |
MAE() | MAE() | MAE() |
PSNR | MAE() | MAE() |
MAE() | MAE() | MAE() |
PSNR | MAE() | MAE() |
MAE() | MAE() | MAE() |
4.1.4 Training results
In this section, we assess the abilities of the learned NNs in approximating the measurement operator , as well as satisfying the monotonicity constraint necessary to the reconstruction problem. The results are provided in Table 1. For each model, the average MAE values and the smallest eigenvalue are reported in the table, where are cropped images of size from the test set BSD68. Results are provided for the two considered training noise levels . For , the smallest eigenvalue was computed for the whole operator . To ensure the monotonicity of the model, the smallest eigenvalue must be non-negative. The MAE values are computed between the non-noisy true output , and the output obtained through the learned network .
On the one hand, we observe that slightly performs better in terms of MAE value than , in particular when filter is used. This behaviour is expected since the monotonicity constraint reduces the flexibility of the model. We further observe that the noise level added during the training does not appear to impact much the results. On the other hand, the learned model corresponding to seems to better reproduce the true model , with MAE values closer to the non-monotone model. This is certainly due to the weaker constraint on its structure. Finally, is the worst approximation of , and is not monotone.
Figure 3 and Figure 4 show the output images obtained when using different versions of the measurement operator, for two image examples, for with and , respectively. Output images are provided for the true unknown operator , as well as for approximated operators (true unknown linear approximation), , , , and . Results are shown for models trained without noise (i.e., ). For each image, we give the MAE between the output from the approximated operator and the output from the true operator. Furthermore, values are reported. We can observe that for all operators apart from the monotone network and the relaxed version . The true model , the linear approximation , and the learned linear approximation are all non-monotone. This shows that our method enables approximating a non-monotone operator using a monotone network.
Problem | Operator | |||||
---|---|---|---|---|---|---|
PSNR | SSIM | PSNR | SSIM | |||
(36) | ||||||
(38) | ||||||
(38) | ||||||
(36) | ||||||
(38) | ||||||
(38) | ||||||
(36) | ||||||
(38) | ||||||
(38) | ||||||
(36) | ||||||
(38) | ||||||
(38) |
Problem | Operator | |||||
---|---|---|---|---|---|---|
PSNR | SSIM | PSNR | SSIM | |||
(36) | ||||||
(38) | ||||||
(38) | ||||||
(36) | ||||||
(38) | ||||||
(38) | ||||||
(36) | ||||||
(38) | ||||||
(38) | ||||||
(36) | ||||||
(38) | ||||||
(38) |
4.1.5 Restoration results
In this section, we consider the original inverse problem (31), with model (32) for four cases: . We further consider two noise levels on the inverse problem: (low noise level) and (high noise level). Simulations are run on images from the BSD68 dataset. We compare the three methods described in Section 4.1.2 that hold convergence guarantees. Precisely, we solve (36) with , (38) with , and (38) with . For the regularization , we choose a smoothed Total Variation term [19] (See Appendix C for details), and we manually choose the regularization parameter to achieve the best reconstruction quality for each method.
Quantitative results with average PSNR and SSIM values obtained for each method, in each setting, are reported in Tables 2 and 3, for and , respectively. We can observe overall that the proposed least-squares approach always outperforms its linear counterpart . It also performs better than for , and similarly for . Regarding the noise level for training and , either choice or lead to very similar reconstruction results. Hence, the learned monotone approximation of does not seem affected by the noise level on the training dataset.
Qualitative results are presented in Figures 5 and 6 for the low noise level (), with and , respectively. Each figure shows results for two images, obtained by selecting the regularization parameter leading to the best reconstruction quality. Observations for these two images validate the quantitative results reported in Table 2. The linear least squares procedure using leads to the worst performance due to method failing to correct for the saturation function. For the high saturation case , we see that leads to slightly sharper reconstructions, while both least-squares versions and seem to over-smooth the reconstruction, possibly due to the bias introduced with respect to the true saturation model.
We also present the convergence profiles with respect to the iterations of the restored images using the three considered models , and , with two training noise levels . We observe that all methods exhibit a converging behaviour. The oscillations are due to the Goldstein-Armijo rule that introduces a backtracking line search procedure in the algorithms to find the optimal step size. Smoother curves can be obtained by lowering the parameters in (2.2), with the caveat of more processing time due to the additional steps performed within the backtracking line search procedure.
– | – | ||
– | – | – | – |
– | – | – | – |
– | – | – | – |
– | – | ||
– | – | – | – |
– | – | – | – |
– | – | – | – |
5 Conclusions
In this article, we introduced a novel approach for training monotone neural networks, by designing a penalized training procedure. The resulting monotone networks can then be embedded in the FBF algorithm, within a PnP framework, yet ensuring the convergence of the iterates of the resulting algorithm. This method can be leveraged for addressing a wide range of monotone inclusion problems, including in imaging, as demonstrated in the context of solving non-linear inverse imaging problems.
The proposed PnP-FBF method enables solving generic constrained monotone inclusion problem. Its convergence is ensured even if the involved operators are not cocoercive. Hence the proposed method can be used for a wider class of operators compared to other similar iterative schemes such as the (PnP) forward-backward method. Moreover, combined with the Armijo-Goldstein rule, the proposed FBF-PnP algorithm is guaranteed to converge without needing explicit computation of the Lipschitz constant of the neural network.
The proposed penalized training procedure enables to learn monotone neural networks. To do so, we designed a differentiable penalization function, relying on properties of the network Jacobian, that can be implemented efficiently using auto-differentiation tools. The proposed training approach is very flexible and can be applied to a wide range of network architectures and training paradigms.
We finally illustrated the benefit of the proposed framework in learning monotone operators for semi-blind non-linear deconvolution imaging problems. Our methodology demonstrated an accurate monotone approximation of the true non-monotone degradation function. We show that the monotonocity of the learned network is further instrumental within the proposed PnP-FBF scheme for inverting the network, and solving the image recovery problem.
The versatility of our methodology allows its potential extension to various imaging problems involving a nonlinear model, including super-resolution. The practical utility of monotone operators has already been explored in normalizing flows, offering possibilities for extending our work to monotone normalizing flows [1]. Further investigations into style transfer tasks, leveraging the invertibility property, could yield stable neural networks for image-to-image mapping problems. Finally, the application of non-linear inverse problems in tomography, acknowledging the inherent saturation in tissue absorption of X-rays, offers a promising avenue for future exploration.
Acknowledgments
We would like to thank DATAIA institute from University Paris-Saclay for funding the thesis of YB. The work of JCP was founded by the ANR Research and Teaching Chair in Artificial Intelligence, BRIDGEABLE. The work of AR was partly funded by the Royal Society of Edinburgh; EPSRC grant EP/X028860/1; the CVN, Inria/OPIS, and CentraleSupélec.
References
- [1] B. Ahn, C. Kim, Y. Hong, and H. J. Kim, Invertible monotone operators for normalizing flows, Adv. Neural Inf. Process. Syst., 35 (2022), pp. 16836–16848.
- [2] A. H. Al-Shabili, X. Xu, I. Selesnick, and U. S. Kamilov, Bregman plug-and-play priors, in Proc. - Int. Conf. Image Process. ICIP, IEEE, 2022, pp. 241–245.
- [3] M. S. C. Almeida and M. A. T. Figueiredo, Blind image deblurring with unknown boundaries using the alternating direction method of multipliers, in Proc. - Int. Conf. Image Process. ICIP, Sept. 2013, pp. 586–590.
- [4] H. H. Bauschke and P. L. Combettes, Convex Analysis and Monotone Operator Theory in Hilbert Spaces, Springer, 2017.
- [5] M. Benning and M. Burger, Modern regularization methods for inverse problems, Acta Numer., 27 (2018), pp. 1–111.
- [6] J. Bolte and E. Pauwels, Conservative set valued fields, automatic differentiation, stochastic gradient methods and deep learning, Math. Prog., 188 (2021), pp. 19–51.
- [7] C. A. Bouman and G. T. Buzzard, Generative plug and play: Posterior sampling for inverse problems, arXiv preprint arXiv:2306.07233, (2023).
- [8] D. Calvetti and E. Somersalo, Inverse problems: From regularization to Bayesian inference, Wiley Interdiscip. Rev.: Comput. Stat., 10 (2018).
- [9] S. Chaudhari, S. Pranav, and J. M. Moura, Learning Gradients of Convex Functions with Monotone Gradient Networks, in Proc. - ICASSP IEEE Int. Conf. Acoust. Speech Signal Process., June 2023, pp. 1–5.
- [10] R. Cohen, M. Elad, and P. Milanfar, Regularization by denoising via fixed-point projection (RED-PRO), SIAM J. Imaging Sci., 14 (2021), pp. 1374–1406.
- [11] F. Colibazzi, D. Lazzaro, S. Morigi, and A. Samoré, Deep-plug-and-play proximal gauss-newton method with applications to nonlinear, ill-posed inverse problems, Inverse Probl. Imaging, (2023), pp. 1226–1248.
- [12] P. L. Combettes and J.-C. Pesquet, A Douglas–Rachford Splitting Approach to Nonsmooth Convex Variational Signal Recovery, IEEE J. Sel. Top. Signal Process., 1 (2007), pp. 564–574.
- [13] P. L. Combettes and J.-C. Pesquet, Proximal Splitting Methods in Signal Processing, in Fixed-Point Algorithms for Inverse Problems in Science and Engineering, H. H. Bauschke, R. S. Burachik, P. L. Combettes, V. Elser, D. R. Luke, and H. Wolkowicz, eds., Springer Optimization and Its Applications, Springer, New York, NY, 2011, pp. 185–212.
- [14] P. L. Combettes and J.-C. Pesquet, Lipschitz Certificates for Layered Network Structures Driven by Averaged Activation Operators, SIAM J. Math. Data Sci., 2 (2020), pp. 529–557.
- [15] P. L. Combettes and J.-C. Pesquet, Fixed Point Strategies in Data Science, IEEE Trans. Signal Process., 69 (2021), pp. 3878–3905.
- [16] H. Daniels and M. Velikova, Monotone and Partially Monotone Neural Networks, IEEE Trans. Neural Netw. Learn. Syst., 21 (2010), pp. 906–917.
- [17] R. Fermanian, M. L. Pendu, and C. Guillemot, Learned gradient of a regularizer for plug-and-play gradient descent, arXiv preprint arXiv:2204.13940, (2022).
- [18] C. S. Garcia, M. Larchevêque, S. O’Sullivan, M. Van Waerebeke, R. R. Thomson, A. Repetti, and J.-C. Pesquet, A primal-dual data-driven method for computational optical imaging with a photonic lantern, arXiv preprint arXiv:2306.11679, (2023).
- [19] P. Getreuer, Rudin-Osher-Fatemi Total Variation Denoising using Split Bregman, Image Process. Line, 2 (2012), pp. 74–95.
- [20] S. Hurault, U. Kamilov, A. Leclaire, and N. Papadakis, Convergent bregman plug-and-play image restoration for poisson inverse problems, Adv. Neural Inf. Process. Syst., 36 (2024).
- [21] S. Hurault, A. Leclaire, and N. Papadakis, Gradient step denoiser for convergent plug-and-play, arXiv preprint arXiv:2110.03220, (2021).
- [22] S. Hurault, A. Leclaire, and N. Papadakis, Proximal denoiser for convergent plug-and-play optimization with nonconvex regularization, in International Conference on Machine Learning, PMLR, 2022, pp. 9483–9505.
- [23] D. P. Kingma, T. Salimans, R. Jozefowicz, X. Chen, I. Sutskever, and M. Welling, Improving Variational Inference with Inverse Autoregressive Flow, arXiv:1606.04934 [cs, stat], (2017).
- [24] J. Kruse, L. Ardizzone, C. Rother, and U. Köthe, Benchmarking invertible architectures on inverse problems, arXiv preprint arXiv:2101.10763, (2021).
- [25] D. G. Luenberger, Y. Ye, et al., Linear and nonlinear programming, vol. 2, Springer, 1984.
- [26] A. Neacşu, J.-C. Pesquet, and C. Burileanu, EMG-based automatic gesture recognition using lipschitz-regularized neural networks, ACM Trans. Intell. Syst. Technol., 15 (2024).
- [27] J.-C. Pesquet, A. Repetti, M. Terris, and Y. Wiaux, Learning maximally monotone operators for image recovery, SIAM J. Imaging Sci., 14 (2021), pp. 1206–1237.
- [28] D. J. Rezende and S. Mohamed, Variational Inference with Normalizing Flows, arXiv:1505.05770 [cs, stat], (2016).
- [29] D. Runje and S. M. Shankaranarayana, Constrained monotonic neural networks, in International Conference on Machine Learning, PMLR, 2023, pp. 29338–29353.
- [30] E. Ryu, J. Liu, S. Wang, X. Chen, Z. Wang, and W. Yin, Plug-and-play methods provably converge with properly trained denoisers, in International Conference on Machine Learning, PMLR, 2019, pp. 5546–5557.
- [31] R. M. Schmidt, F. Schneider, and P. Hennig, Descending through a crowded valley-benchmarking deep learning optimizers, in International Conference on Machine Learning, PMLR, 2021, pp. 9367–9376.
- [32] M. Tang and A. Repetti, A data-driven approach for bayesian uncertainty quantification in imaging, arXiv preprint arXiv:2304.11200, (2023).
- [33] M. Terris, A. Repetti, J.-C. Pesquet, and Y. Wiaux, Building firmly nonexpansive convolutional neural networks, in Proc. - ICASSP IEEE Int. Conf. Acoust. Speech Signal Process., Proc. - ICASSP IEEE Int. Conf. Acoust. Speech Signal Process., Barcelona, Spain, May 2020, pp. 8658–8662.
- [34] M. Terris, A. Repetti, J.-C. Pesquet, and Y. Wiaux, Enhanced Convergent PNP Algorithms For Image Restoration, in Proc. - Int. Conf. Image Process. ICIP, Sept. 2021, pp. 1684–1688.
- [35] P. Tseng, A Modified Forward-Backward Splitting Method for Maximal Monotone Mappings, SIAM J. Control Optim., 38 (2000), pp. 431–446.
- [36] W. Wang, Z. Dang, Y. Hu, P. Fua, and M. Salzmann, Backpropagation-friendly eigendecomposition, Adv. Neural Inf. Process. Syst., 32 (2019).
- [37] Z. Zhang, Q. Liu, and Y. Wang, Road Extraction by Deep Residual U-Net, IEEE Geosci. Remote Sens. Lett., 15 (2018), pp. 749–753.
Appendix A Saturation function
We modify the classical Tanh function to be centered on 0.5 and to take as input images with pixel values in the range . We also introduce a scaling factor to accentuate the non-linearity of the tanh (Figure 7). The resulting function is then used for saturation, and is defined as
(40) |
where
(41) |
Examples for are shown in Figure 7.
Appendix B Linear approximation of a convolution filter
As explained in Section 4.1.2, we compare our model to a learned linear approximation of . To this aim, we define as a 2D convolution layer, with convolution kernel . Then, we train by solving
(42) |
where
(43) |
This parametrization is introduced as we assume that the true convolution kernels in (32) are normalized and nonnegative.
Problem (42) is then solved using Adam optimizer for 200 epochs, with a learning rate of . The size of the kernels was chosen equal to the size of the true kernels in (32) for simplicity (i.e., ). The learned kernels are displayed in Figure 8. We can observe that for the normal saturation levels (), the approximated kernels are almost equal to the true ones, with or without noise. For the high saturation level () however, the learned kernels are very different from the true ones, certainly to try to compensate for the nonlinear saturation function.
True kernel | |||||
---|---|---|---|---|---|
|
|||||
|
Appendix C Total variation regularization
We provide here the details of the smoothed approximation used in the manuscript for the Total Variation [19] function. We define
(44) |
where and model the linear horizontal and vertical gradient operators, respectively, and is a smoothing parameter. Then, the gradient of is given by
(45) |