Skip to main content
Log in

Efficient iterative implementation of regularized solutions for image and signal reconstruction problems

  • Research Article
  • Published:
Journal of Optics Aims and scope Submit manuscript

Abstract

Regularized signal and image reconstruction is one of the powerful tools to acquire original signals or images from the versions degraded with convolution and noise effects. The main problem encountered in regularized reconstruction of images is the estimation of the regularization parameter, as the quality and fidelity of the reconstructed images and their details are affected with this parameter. The problem is less severe with signals. A more global regularization parameter can be used for signal reconstruction from convolution and noise degradations. There are several methods for evaluation of this parameter in image reconstruction. This process requires knowledge of the noise variance in the degraded image. After evaluating this parameter, regularized restoration is implemented by applying a regularization filter on the degraded image. In this paper, we have two contributions. The first one is investigation of an iterative method for evaluation of the regularization parameter, and this process is implemented on images. This method depends on the maximization of the power of the restored image by the coincidence of the passband of the regularization filter with the frequency band in which most of the image power exists. It does not necessitate a priori knowledge about the noise variance. We come to a conclusion about the range of the regularization parameter that is most appropriate for solving the deconvolution problem in the presence of noise as an inverse problem. According to the obtained solution, we can solve the problem in a general sense for other types of signals such as speech signals. Hence, the other contribution is the generalization of the obtained conclusion about the regularization problem solution for speech deconvolution.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22
Fig. 23
Fig. 24
Fig. 25
Fig. 26
Fig. 27
Fig. 28
Fig. 29

Similar content being viewed by others

References

  1. W. El-Shafai, I. Almomani, A. Alkhayer, Optical bit-plane-based 3D-JST cryptography algorithm with cascaded 2D-FrFT encryption for efficient and secure HEVC communication. IEEE Access 2(9), 35004–35026 (2021)

    Article  Google Scholar 

  2. A. Alarifi, M. Amoon, M. Aly, W. El-Shafai, Optical PTFT asymmetric cryptosystem-based secure and efficient cancelable biometric recognition system. IEEE Access 3(8), 221246–221268 (2020)

    Article  Google Scholar 

  3. O. Faragallah, A. Afifi, H. El-Sayed, M. Alzain, J. Al-Amri, F. Abd El-Samie, W. El-Shafai, Efficient HEVC integrity verification scheme for multimedia cybersecurity applications. IEEE Access 7(8), 167069–167089 (2020)

    Article  Google Scholar 

  4. I. Elashry, W. El-Shafai, E. Hasan, S. El-Rabaie, A. Abbas, A. El-Samie, O. Faragallah, Efficient chaotic-based image cryptosystem with different modes of operation. Multimed. Tools Appl. 79(29), 20665–20687 (2020)

    Article  Google Scholar 

  5. N. Soliman, M. Khalil, A. Algarni, S. Ismail, R. Marzouk, W. El-Shafai, Efficient HEVC steganography approach based on audio compression and encryption in QFFT domain for secure multimedia communication. Multimed. Tools Appl. 80(3), 4789–4823 (2021)

    Article  Google Scholar 

  6. W. El-Shafai, Joint adaptive pre-processing resilience and post-processing concealment schemes for 3D video transmission. 3D Res. 6(1), 1–13 (2015)

    Article  Google Scholar 

  7. K. Abdelwahab, A. El-atty, M. Saied, W. El-Shafai, S. El-Rabaie, A. El-Samie, Efficient SVD-based audio watermarking technique in FRT domain. Multimed. Tools Appl. 79(9), 5617–5648 (2020)

    Article  Google Scholar 

  8. A. Algarni, G. El Banby, S. Ismail, W. El-Shafai, F. El-Samie, N.F. Soliman, Discrete transforms and matrix rotation based cancelable face and fingerprint recognition for biometric security applications. Entropy 22(12), 1361 (2020)

    Article  ADS  MathSciNet  Google Scholar 

  9. N. El-Hag, A. Sedik, W. El-Shafai, H. El-Hoseny, A. Khalaf, A. El-Fishawy, G. El-Banby, Classification of retinal images based on convolutional neural network. Microsc. Res. Tech. 84(3), 394–414 (2021)

    Article  Google Scholar 

  10. L. Abou Elazm, S. Ibrahim, M. Egila, H. Shawky, M. Elsaid, W. El-Shafai, F. Abd El-Samie, Cancellable face and fingerprint recognition based on the 3D jigsaw transform and optical encryption. Multimed. Tools Appl. 7(9), 14053–14078 (2020)

    Article  Google Scholar 

  11. W. El-Shafai, S. El-Rabaie, M. El-Halawany, F. El-Samie, Enhancement of wireless 3d video communication using color-plus-depth error restoration algorithms and Bayesian Kalman filtering. Wireless Pers. Commun. 97(1), 245–268 (2017)

    Article  Google Scholar 

  12. O. Faragallah, W. El-Shafai, A. Sallam, I. Elashry, E. EL-Rabaie, A. Afifi, H. El-sayed, Cybersecurity framework of hybrid watermarking and selective encryption for secure HEVC communication. J. Ambient Intell. Human. Comput. 13(2), 1215–1239 (2022)

    Article  Google Scholar 

  13. I. Badr, A. Radwan, E. El-Rabaie, L. Said, G. El Banby, W. El-Shafai, F. Abd El-Samie, Cancellable face recognition based on fractional-order Lorenz chaotic system and Haar wavelet fusion. Digital Signal Process. 11(6), 103103 (2021)

    Article  Google Scholar 

  14. W. El-Shafai, F. Mohamed, H. Elkamchouchi, M. Abd-Elnaby, A. Elshafee, Efficient and secure cancelable biometric authentication framework based on genetic encryption algorithm. IEEE Access 2(9), 77675–77692 (2021)

    Article  Google Scholar 

  15. F. Abd El-Samie, R. Nassar, M. Safan, M. Abdelhamed, A. Khalaf, G. El Banby, W. El-Shafai, Efficient implementation of optical scanning holography in cancelable biometrics. Appl. Opt. 60(13), 3659–3667 (2021)

    Article  ADS  Google Scholar 

  16. S. Ibrahim, M. Egila, H. Shawkey, M. Elsaid, W. El-Shafai, F. Abd El-Samie, Hardware implementation of cancellable biometric systems, in Fourth IEEE International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC), 1145–1152, (2020, October).

  17. H. El-Hameed, N. Ramadan, W. El-Shafai, A. Khalaf, H. Ahmed, S. El-Khamy, F. El-Samie, Cancelable biometric security system based on advanced chaotic maps. Visual Comput. 38(6), 2171–2187 (2021)

    Article  Google Scholar 

  18. I. Almomani, W. El-Shafai, A. AlKhayer, A. Alsumayt, S. Aljameel, Proposed biometric security system based on deep learning and chaos algorithms. Comput. Mater. Continua 74(2), 3515–3537 (2023)

    Article  Google Scholar 

  19. L. Elazm, W. El-Shafai, S. Ibrahim, M. Egila, H. Shawkey, Efficient hardware design of a secure cancellable biometric cryptosystem. Intell. Autom. Soft Comput. 36(1), 929–955 (2023)

    Article  Google Scholar 

  20. W. El-Shafai, M. Elsayed, M. Rashwan, M. Dessouky, A. El-Fishawy, Optical ciphering scheme for cancellable speaker identification system. Comput. Syst. Sci. Eng. 45(1), 563–578 (2023)

    Article  Google Scholar 

  21. A. Ayoup, A. Khalaf, W. El-Shafai, F. Abd El-Samie, F. Alraddady, S. Eldin, Cancellable multi-biometric template generation based on Arnold cat map and aliasing. CMC-Comput. Mater. Continua 72(2), 3687–3703 (2022)

    Article  Google Scholar 

  22. S. El-Gazar, W. El Shafai, G. El Banby, H. Hamed, G. Salama, M. Abd-Elnaby, F. Abd El-Samie, Cancelable speaker identification system based on optical-like encryption algorithms. Comput. Syst. Sci. Eng. 43(1), 87–102 (2022)

    Article  Google Scholar 

  23. A. Ayoup, A. Khalaf, F. Alraddady, F. Abd El-Samie, W. El-Shafai, Cancelable multi-biometric template generation based on dual-tree complex wavelet transform. Intell. Autom. Soft Comput. 33(2), 1289–1304 (2022)

    Article  Google Scholar 

  24. I. Almomani, A. AlKhayer, W. El-Shafai, Novel Ransomware Hiding Model Using HEVC Steganography Approach. CMC Comput. Mater. Contin 70(2), 1209–1228 (2021)

    Google Scholar 

  25. A. Alarifi, S. Sankar, T. Altameem, K. Jithin, M. Amoon, W. El-Shafai, A novel hybrid cryptosystem for secure streaming of high efficiency H. 265 compressed videos in IoT multimedia applications. IEEE Access 8(2), 128548–128573 (2020)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marwa A. Elsayed.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Elsayed, M.A., El-Shafai, W., Rashwan, M.A. et al. Efficient iterative implementation of regularized solutions for image and signal reconstruction problems. J Opt (2023). https://doi.org/10.1007/s12596-023-01179-w

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s12596-023-01179-w

Keywords

Navigation