Next Article in Journal
Self-Powered Smart Insole for Monitoring Human Gait Signals
Next Article in Special Issue
A Neuron-Based Kalman Filter with Nonlinear Autoregressive Model
Previous Article in Journal
Method for Classifying Behavior of Livestock on Fenced Temperate Rangeland in Northern China
Previous Article in Special Issue
Reverse Dispersion Entropy: A New Complexity Measure for Sensor Signal
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Stable Tensor Principal Component Pursuit: Error Bounds and Efficient Algorithms

1
Department of Computer Science and Technology, Huaibei Vocational and Technical College, Huaibei 235000, China
2
School of Physics and Electronic Electrical Engineering, Huaiyin Normal University, Huaian 223300, China
3
Mathematics Teaching and Research Group, Nanjing No.9 High School, Nanjing 210018, China
*
Author to whom correspondence should be addressed.
Sensors 2019, 19(23), 5335; https://doi.org/10.3390/s19235335
Submission received: 13 November 2019 / Revised: 28 November 2019 / Accepted: 29 November 2019 / Published: 3 December 2019
(This article belongs to the Special Issue Sensor Signal and Information Processing III)

Abstract

:
The rapid development of sensor technology gives rise to the emergence of huge amounts of tensor (i.e., multi-dimensional array) data. For various reasons such as sensor failures and communication loss, the tensor data may be corrupted by not only small noises but also gross corruptions. This paper studies the Stable Tensor Principal Component Pursuit (STPCP) which aims to recover a tensor from its corrupted observations. Specifically, we propose a STPCP model based on the recently proposed tubal nuclear norm (TNN) which has shown superior performance in comparison with other tensor nuclear norms. Theoretically, we rigorously prove that under tensor incoherence conditions, the underlying tensor and the sparse corruption tensor can be stably recovered. Algorithmically, we first develop an ADMM algorithm and then accelerate it by designing a new algorithm based on orthogonal tensor factorization. The superiority and efficiency of the proposed algorithms is demonstrated through experiments on both synthetic and real data sets.

1. Introduction

In recent years, different types of tensor data have emerged with the significant progress of modern sensor technology, such as color images [1], videos [2], functional MRI data [3], hyper-spectral images [4], point could data [5], traffic stream data [6], etc. Thanks to its multi-way nature, tensor-based methods have natural superiority over vector and matrix-based methods in analyzing and processing ubiquitous modern multi-way data, and have found extensive applications in computer vision [1,7], data mining [5], machine learning [2], signal processing [8], to name a few. In real applications, the acquired tensor data may often suffer from noises and gross corruptions owing to many different reasons such as sensor failure, lens pollution, communication interference, occlusion in videos, or abnormalities in a sensor network [9], etc. At the same time, many real-world tensor data, such as face images or videos, have been shown to have some low-dimensional structure and can be well approximated by a smaller number of “principal components” [8]. Then, a question naturally arises: how to pursue the principal components of an observed tensor data in the presence of both noises and gross corruptions? We will answer this question in this paper and refer to the proposed methodology as Stable Tensor Principal Component Pursuit (STPCP).
The tensor low-rankness is an ideal model of the property that a tensor data can be well approximated by a small number of principal components [8]. In the last decade, low-rank tensor models have attracted much attention in many fields [10]. There are multiple low-rank tensor models since there exist different definitions of tensor rank. Among these models, the low CP rank model [11] and the low Tucker rank model [1] should be the most famous two. The low CP rank model approximates the underlying tensor by the sum of a small number of rank-1 tensors, whereas the low Tucker rank model assumes the unfolding matrix along each mode are low rank. To estimate an unknown low-rank tensor from corrupted observations, it is a natural option to consider the rank minimization problem which chooses the tensor of lowest rank as the solution from a certain feasible set. However, tensor rank minimization, even in its 2-way (matrix) case, is generally NP-hard [12] and even harder in higher-way cases [13]. For tractable solutions, researchers turn to a variety of convex surrogates for tensor rank  [1,14,15,16,17,18] to replace the tensor rank in rank minimization problem. Methods based on surrogates for the tensor CP rank and Tucker rank have been extensively explored in both the theoretical side and the application side [14,17,19,20,21,22,23,24].
Recently, the low-tubal-rank model [16,25] has shown better performance than traditional tensor low-rank models in many tensor recover tasks such as image/video inpainting/denoising/ sensing [2,25,26], moving object detection [27], multi-view learning [28], seismic data completion [29], WiFi fingerprint [30], MRI imaging [16], point cloud data inpainting [31], and so on. The tubal rank is a new complexity measure of tensor defined through the framework of tensor singular value decomposition (t-SVD) [32,33]. At the core of existing low-tubal-rank models is the tubal nuclear norm (TNN) which is a convex surrogate for the tubal rank. In contrast to CP-based tensor nuclear norms or Tucker-based tensor nuclear norms which models low-rankness in the original domain, TNN models low-rankness in the Fourier domain. It is pointed out in [25,34,35] that TNN has superiority over traditional tensor nuclear norms in exploiting the ubiquitous “spatial-shifting” property in real-world tensor data.
Inspired by the superior performance of TNN, this paper adopts TNN as a low-rank regularizer in the proposed STPCP model. Specifically, the proposed STPCP aims to estimate the underlying tensor data L _ 0 R n 1 × n 2 × n 3 from an observation tensor M _ polluted by both small dense noises and sparse gross corruptions as follows:
M _ = L _ 0 + S _ 0 + E _ 0 ,
where S _ 0 is a tensor denoting the sparse corruptions and E _ 0 is a tensor representing small dense noises. Model (1) is also known as robust tensor decomposition in [36,37].
Our STPCP model is first formulated as a TNN-based convex problem. Then, our theoretical analysis gives upper bound on the estimation error of L _ 0 and S _ 0 . In contrast to the analysis in [37], the proposed STPCP can exactly recovery the underlying tensor L _ 0 and the sparse corruption tensor S _ 0 when the noise term E _ 0 vanishes. For efficient solution of the proposed STPCP model, we develop two algorithms with extensions to a more challenging scenario where missing observations are also considered. The first algorithm is an ADMM algorithm and the second algorithm accelerates it using tensor factorization. Experiments show the effectiveness and the efficiency of the designed algorithms.
We organize the rest of this paper as follows. In Section 2, we briefly introduce basic preliminaries for t-SVD and some related works. The proposed STPCP model is formulated and analyzed theoretically in Section 3. We design two algorithms in Section 4 and report experimental results in Section 5. This work is concluded in Section 6. The proofs of theorems, propositions, and lemmas are given in the appendix.

2. Preliminaries and Related Works

In this section, some preliminaries of t-SVD are first introduced. Then, the related works are presented.
Notations. We denote vectors by bold lower-case letters, e.g.,  a R n , matrices by bold upper-case letters, e.g.,  A R n 1 × n 2 , and tensors by underlined upper-case letters, e.g.,  A _ R n 1 × n 2 × n 3 . For a given 3-way tensor, we define its fiber as a vector given through fixing all indices but one, and its slice as a matrix obtained by fixing all indices but two. For a given 3-way tensor A _ , we use A _ i j k to denote its ( i , j , k ) -th element; A ( k ) : = A _ ( : , : , k ) is used to denote its k-th frontal slice. A _ ˜ is used to denote the tensor after performing 1D Discrete Fourier Transformation (DFT) on all tube fibers A _ ( i , j , : ) of T _ , i = 1 , 2 , , n 1 , j = 1 , 2 , , n 2 , which can be efficiently computed by the Matlab command A _ ˜ = fft ( A _ , [ ] , 3 ) . We use dft 3 ( · ) and idft 3 ( · ) to represent the 1D DFT and inverse DFT along the tube fibers of 3-way tensors, i.e.,  dft 3 ( A _ ) : = fft ( A _ , [ ] , 3 ) , idft 3 ( A _ ) : = ifft ( A _ , [ ] , 3 ) .
For a given matrix M R n 1 × n 2 , define the nuclear norm and spectral norm of M respectively as:
M : = i = 1 p σ i ( M ) , and M sp : = max { σ i ( M ) } ,
where p = min { n 1 , n 2 } , and  σ 1 ( M ) σ p ( M ) are the singular values of M in a non-ascending order. The l 0 -norm, l 1 -norm, Frobenius norm, l -norm of a tensor A _ R n 1 × n 2 × n 3 is defined as:
A _ 0 : = i j k 1 ( A _ i j k 0 ) , A _ 1 : = i j k | A _ i j k | , A _ F : = i j k A _ i j k 2 , A _ : = max i j k | A _ i j k | ,
where 1 ( C ) is an indicator function whose value is 1 if the condition C is true, and 0 otherwise.
Given two matrices A = ( a i j ) C n 1 × n 2 , B = ( b i j ) C n 1 × n 2 , we define their inner product as follows:
A , B = tr ( A H B ) = i j a ¯ i j b i j ,
where A H denotes conjugate transpose of matrix A and a ¯ i j denotes the conjugation of complex number a i j . Given two 3-way tensors A _ , B _ R n 1 × n 2 × n 3 , we define their inner product as follows:
A _ , B _ : = i j k A _ i j k B _ i j k .

2.1. Tensor Singular Value Decomposition

We first define 3 operators based on block matrices which are introduced in [33]. For a given 3-way tensor A _ R n 1 × n 2 × n 3 , we define its block vectorization bvec ( · ) and the inverse operation bvfold ( · ) in the following equation:
bvec ( A _ ) : = A ( 1 ) A ( 2 ) A ( n 3 ) R n 1 n 3 × n 2 , bvfold ( bvec ( A _ ) ) = A _ .
We further define the block circulant matrix bcirc ( · ) of any 3-way tensor A _ R n 1 × n 2 × n 3 as follows:
bcirc ( A _ ) : = A ( 1 ) A ( n 3 ) A ( 2 ) A ( 2 ) A ( 1 ) A ( 3 ) A ( n 3 ) A ( n 3 1 ) A ( 1 ) C n 1 n 3 × n 2 n 3
Equipped with above defined operators, we are now in a position to define the t-product of 3-way tensors.
Definition 1
(t-product [33]). Given two tensors A _ R n 1 × n 2 × n 3 and B _ R n 2 × n 4 × n 3 , the t-product of A _ and B _ is a new 3-way tensor C _ with size n 1 × n 4 × n 3 :
C _ = A _ B _ = : bvfold bcirc ( A _ ) bvec ( B _ ) .
A more intuitive interpretation of t-SVD is as follows [33]. If we treat a 3-way tensor A _ R n 1 × n 2 × n 3 as a matrix of size n 1 × n 2 whose entries are the tube fibers, then the tensor t-product can be analogously understood as the “matrix multiplication” where the standard scalar product is replaced with the vector circular convolution between the tubes (i.e., vectors):
C _ = A _ B _ C _ ( i , j , : ) = k = 1 n 2 A _ ( i , k , : ) B _ ( k , j , : ) , i = 1 , 2 , , n 1 , j = 1 , 2 , , n 4 ,
where ⋆ represent the operation of circular convolution [33] of two vectors a , b R n 3 defined as ( a b ) j = k = 1 n 3 a k b 1 + ( j k ) mod n 3 .
We also define the block diagonal matrix bdiag ( · ) of any 3-way tensor A _ R n 1 × n 2 × n 3 and its inverse bdfold ( · ) as follows:
bdiag ( A _ ) : = A ( 1 ) A ( n 3 ) R n 1 n 3 × n 2 n 3 , bdfold ( bdiag ( A _ ) ) = A _ .
We also use A ¯ (or A _ ¯ ) to denote the block diagonal matrix of tensor A _ ˜ = dft 3 ( A _ ) (i.e., the Fourier version of A _ ) i.e.,
A ¯ = bdiag ( A _ ˜ ) : = A ˜ ( 1 ) A ˜ ( n 3 ) C n 1 n 3 × n 2 n 3 .
Then the relationship between DFT and circular convolution further indicates that the conducting t-product in the original domain is equivalent to performing standard matrix product on the Fourier block diagonal matrices [33]. Since matrix product on the Fourier block diagonal matrices can be parallel written as matrix product of all the frontal slices in the Fourier domain, we have the following relationships:
C _ = A _ B _ C ¯ = A ¯ B ¯ C ˜ ( k ) = A ˜ ( k ) B ˜ ( k ) , k = 1 , 2 , , n 3 .
The relationship between the t-product and FFT also indicates that the inner product of two 3-way tensors A _ , B _ R n 1 × n 2 × n 3 and the inner product of their corresponding Fourier block diagonal matrices A _ ¯ , B _ ¯ C n 1 n 3 × n 2 n 3 satisfy the following relationship:
A _ , B _ = 1 n 3 A _ ˜ , B _ ˜ = 1 n 3 A ¯ , B ¯ .
When A _ = B _ = X _ , one has:
X _ F = 1 n 3 X _ ¯ F .
We further define the concepts of tensor transpose, identity tensor, f-diagonal tensor and orthogonal tensor as follows.
Definition 2
(tensor transpose [33]). Given a tensor A _ R n 1 × n 2 × n 3 , then define its transpose tensor A _ of size n 2 × n 1 × n 3 which can be formed through first transposing all the frontal slices of A _ and then exchanging each k-th transposed frontal slice with the ( n 3 + 2 k ) -th transposed frontal slice for all k = 2 , 3 , , n 3 .
For example, consider 3-way tensor A _ = [ A ( 1 ) | A ( 2 ) | A ( 3 ) | A ( 4 ) ] R n 1 × n 2 × 4 with 4 frontal slices, the tensor transpose A _ of A _ is:
A _ = [ ( A ( 1 ) ) | ( A ( 4 ) ) | ( A ( 3 ) ) | ( A ( 2 ) ) ] R n 2 × n 1 × 4 .
Definition 3
(identity tensor [33]). The identity tensor I _ R n × n × n 3 is a tensor whose first frontal slice is the n-by-n identity matrix with all other frontal slices are zero matrices.
Definition 4
(f-diagonal tensor [33]). We call a 3-way tensor f-diagonal if all the frontal slices of it are diagonal matrices.
Definition 5
(orthogonal tensor [33]). We call a tensor Q _ R n × n × n 3 an orthogonal tensor if the following equations hold:
Q _ Q _ = Q _ Q _ = I _ .
Then, the tensor singular value decomposition (t-SVD) can be given as follows.
Definition 6
(Tensor singular value decomposition, and Tensor tubal rank [38]). Given any 3-way tensor X _ R n 1 × n 2 × n 3 , then it has the following factorization called tensor singular value decomposition (t-SVD):
X _ = U _ _ V _ ,
where the left and right factor tensors U _ R n 1 × n 1 × n 3 and V _ R n 2 × n 2 × n 3 are orthogonal, and the middle tensor _ R n 1 × n 2 × n 3 is a rectangular f-diagonal tensor.
A visual illustration for the t-SVD is shown in Figure 1. It can be computed efficiently by FFT and IFFT in the Fourier domain according to Equation (4). For more details, see [2].
Definition 7
(Tensor tubal rank [38]). The tensor tubal rank of any 3-way tensor X _ R n 1 × n 2 × n 3 is defined as the number of non-zero tubes of _ in its t-SVD shown in Equation (5), i.e.,
r tubal ( A _ ) : = i 1 ( _ ( i , i , : ) 0 ) .
Definition 8
(Tubal average rank [38]). The tubal average rank r a ( A _ ) of any 3-way tensor A _ R n 1 × n 2 × n 3 is defined as the averaged rank of all frontal slices of A _ ˜ as follows,
r a ( A _ ) : = 1 n 3 k = 1 n 3 error A ˜ ( k ) .
Definition 9
(Tensor operator norm [2,38]). The tensor operator norm F _ op of any 3-way tensor F _ R n 1 × n 2 × n 3 is defined as follows:
F _ op : = sup A _ F 1 F _ A _ F .
The relationship between t-product and FFT indicates that:
F _ op : = sup A _ F 1 F _ A _ F = sup A ¯ F n 3 F ¯ · A _ ¯ F = A ¯ sp .
Definition 10
(Tensor spectral norm [38]). The tensor spectral norm A _ sp of any 3-way tensor F _ R n 1 × n 2 × n 3 is defined as the matrix spectral norm of A ¯ , i.e., 
A _ sp : = A ¯ sp .
We further define the tubal nuclear norm.
Definition 11
(Tubal nuclear norm [2]). For any tensor A _ R n 1 × n 2 × n 3 with t-SVD A _ = U _ _ V _ , the tubal nuclear norm (TNN) of A _ is defined as:
A _ TNN : = _ , I _ = i = 1 r _ ( i , i , 1 ) ,
where r = r t u b a l ( A _ ) .
To understand the tubal nuclear norm, first note that:
r tubal ( A _ ) = i 1 ( _ ( i , i , : ) 0 ) = ( i ) i 1 ( _ ˜ ( i , i , : ) 0 ) = ( i i ) i 1 ( _ ˜ ( i , i , : ) 1 0 ) = ( i i i ) i 1 ( _ ( i , i , 1 ) 0 ) ,
where (i) holds because of the definition of DFT [2], (ii) holds by the property of l 1 -norm, and (iii) is a result of DFT [2]. Thus, the tubal rank of A _ is also the number of non-zero diagonal elements of _ ( i , i , 1 ) , i.e., the first frontal slice of tensor _ in the t-SVD of A _ . Similar to the matrix singular values, the values _ ( i , i , 1 ) , i = 1 , 2 , , n 3 are also called the singular values of tensor A _ . As the matrix nuclear norm is the sum of matrix singular values, the tubal nuclear norm can be similarly understood as the sum of tensor singular values.
One can also verify by the property of DFT [2] that:
A _ TNN = i = 1 r _ ( i , i , 1 ) = k = 1 n 3 i = 1 r _ ˜ ( i , i , k ) = 1 n 3 k = 1 n 3 A ˜ ( k ) = 1 n 3 A ¯ ,
which indicates that the TNN of A _ R n 1 × n 2 × n 3 is also the averaged nuclear norm all frontal slices of A _ ˜ . Thus, TNN indeed models the low-rankness of Fourier domain.
Now, we will show that the low-tubal-rank model is ideal to some real-world tensor data, such as color images and videos.
First, we consider a natural image of size 256 × 256 × 3 , shown in Figure 2a. In Figure 2b, we plot the distribution of its singular values, i.e., the values of _ ( i , i , 1 ) along with the index i. As can be seen from Figure 2b, there are only a small number of singular values with large magnitude, and most of the singular values are close to 0. Then, we can say that some natural color images are approximately low tubal rank.
Then, consider a commonly used YUV sequence Mother-daughter_qcif (These data can be download from the following link https://sites.google.com/site/subudhibadri/fewhelpfuldownloads.) whose first frame is shown in Figure 3a. We use the Y components of the first 30 frames, and get a tensor of size 144 × 176 × 30 and show the distribution of tensor singular values in Figure 3b. We can see from Figure 3b that similar to Figure 2b, there are only a small number of singular values with large magnitude, and most of the singular values are close to 0. Then, we can say that some videos can be well approximately low tubal rank.
For TNN and tensor spectral norm, we highlight the following two lemmas.
Lemma 1.
[2] TNN is the convex envelop of the tensor average rank in the unit ball of tensor spectral norm { T _ R n 1 × n 2 × n 3 | T _ sp 1 } .
Lemma 2.
[2] The TNN and the tensor spectral norm are dual norms to each other.

2.2. Related Works

In this subsection, we briefly introduce some related works. The proposed STPCP is tightly related to the Tensor Robust Principal Component Analysis (TRPCA) which aims to recover a low-rank tensor L _ 0 and a sparse tensor S _ 0 from their sum M _ = L _ 0 + S _ 0 . This is a special case of our measurement Model (1) where the noise tensor E _ 0 is a zero tensor.
In [39], the SNN-based TRPCA model is proposed by modeling the underlying tensor as a low Tucker rank one:
min L _ , S _ L _ SNN + S _ 1 s . t . L _ + S _ = M _ ,
where SNN (Sum of Nuclear Norms) is defined as L _ SNN : = i = 1 K α k L ( k ) , where α k > 0 and L ( k ) is the mode-k matricization of L _ [40].
Model (14) indeed assumes the underlying tensor to be low Tucker rank, which can be too strong for some real tensor data. The TNN-based TRPCA model uses TNN to impose low-rankness in the final solution L _ as follows:
min L _ , S _ L _ TNN + λ S _ 1 s . t . L _ + S _ = M _ .
As shown in [2], when the underlying tensor L _ 0 satisfy the tensor incoherent conditions, by solving Problem (15), one can exactly recover the underlying tensor L _ 0 and S _ 0 with high probability with parameter λ = 1 / max { n 1 , n 2 } n 3 .
When the noise tensor E _ 0 is not zero, the robust tensor decomposition based on SNN is proposed in [36] as follows:
min L _ , S _ 1 2 M _ L _ S _ F + λ 1 L _ SNN + λ 2 S _ 1 ,
where λ 1 and λ 2 are positive regularization parameters. The estimation error on L _ and S _ is analyzed with an upper bound in [36].
In [37], the TNN-based RTD model is proposed as follows:
min L _ , S _ 1 2 M _ L _ S _ F + λ 1 L _ TNN + λ 2 S _ 1 , s . t . L _ α ,
where α is an upper estimate of l -norm of the underlying tensor L _ 0 . An upper bound on the estimation error is also established. However, in the analysis of Model (17), the error does not vanish as the noise tensor E _ 0 vanishes which means the analysis cannot guarantee exact recovery in the noiseless setting (which can be provided by the analysis of TNN-based TRPCA (15) by Lu et al. [2]).
The Bayesian approach is also used for robust tensor recovery. The CP decomposition under sparse corruption and small dense noise is considered [41], and tensor rank estimation is achieved using Bayesian approach. In [42], CP decomposition under missing value and small dense noise is considered with rank estimation similar to [41]. A sparse Bayesian CP model is proposed in [43] to recover a tensor with missing value, outliers and noises. In [44], a fully Bayesian treatment is proposed to recover a low-tubal-rank tensor corrupted by both noises and outliers.

3. Theoretical Guarantee for Stable Tensor Principal Component Pursuit

In this section, we formulate the proposed STPCP model and give the main theoretical result which upper bounds the estimation error and guarantees exact recovery in the noiseless setting.

3.1. The Proposed STPCP

As for the measurement Model (1), we further assume that the noise tensor E _ 0 has bounded energy measured in F-norm, i.e., E _ 0 F δ . Please note that the limited energy assumption is very mild, since most signals are of limited energy.
To recover the low-rank tensor L _ 0 and the sparse tensor S _ 0 , we first produce the following optimization problem:
( L _ ^ , S _ ^ ) = argmin L _ , S _ L _ TNN + λ S _ 1 , s . t . M _ L _ S _ F δ ,
where λ is a positive parameter balancing the two regularizers. The motivation is to use TNN as a low-rank regularization term to exploit the low-dimensional structure in the signal tensor, whereas tensor l 1 -norm is used to impose sparsity in the corruption tensor (since we assumes it to be sparse).
The relationship between Model (18) and existing models are discussed in Remark 1 and Remark 2.
Remark 1.
The following models can be seen as special cases as the proposed STPCP Model (18);
(I).
When δ = 0 , i.e., in the noiseless case, the proposed model degenerates to the TRPCA Model (15) [2].
(II).
When n 3 = 1 , then the stable tensor PCP Model (18) degenerates to the Stable Principal Component Pursuit (SPCP) [45] which aims to pursuit the principal components modeled by low-rank matrix L _ 0 from it observation M corrupted by both noises E 0 and sparse corruptions S 0 . The SPCP is formulated as follows:
min L , S L + λ S 1 , s . t . M L S F δ .
(III).
When n 3 = 1 and δ = 0 , the proposed STPCP further degenerates to Robust Principal Component Analysis (RPCA) [46] given as follows:
min L , S L + λ S 1 , s . t . L + S = M .
Remark 2.
The differences from the proposed Model (18) and TNN-based RTD Model ((17) [37]) is as follows. First, our model does not need to upper estimate the l -norm of the underlying tensor. Second, our model is a constrained optimization problem, whereas Model (17) is an unconstrained optimization problem.

3.2. A Theorem for Stable Recovery

To analyze the statistical performance of Model (18), we should assume on the underlying low-rank tensor L _ 0 that it is not sparse. Only by this assumption, L _ 0 can be identified from its mixture with sparse S _ 0 . Such an assumption can be described by the tensor incoherence condition [2,47], which is used to provide an identifiablility for low-rank L _ 0 .
Definition 12
(Tensor incoherence condition [2,47]). Given a 3-way tensor T _ R n 1 × n 2 × n 3 with tubal rank r, suppose it has the skinny t-SVD T _ = U _ Λ _ V _ , where U _ R n 1 × r × n 3 , V _ R r × n 2 × n 3 are orthogonal tensors, and  Λ _ R r × r × n 3 is an f-diagonal tensor. Then, T _ is said to satisfy the tensor incoherent condition (TIC) with parameter μ ( T _ ) if the following inequalities hold:
max i [ n 1 ] U _ e ˚ i F r μ ( T _ ) n 1 n 3 ,
max j [ n 2 ] V _ e ˚ j F r μ ( T _ ) n 2 n 3 ,
U _ V _ r μ ( T _ ) n 1 n 2 n 3 .
where e ˚ i R n 1 × 1 × n 3 is a tensor column basis with only the ( i , 1 , 1 ) -th element being 1 and all the others being 0, and  e ˚ j R n 2 × 1 × n 3 is also a tensor column basis with only the ( j , 1 , 1 ) -th element being 1 and all the others being 0.
Assumption 1.
Suppose the true tensor L _ 0 in the measurement model (1) satisfies tensor incoherence condition with parameter μ.
Assumption 1 intrinsically ensures that the row bases and column bases of L _ 0 do not align well with the canonical row and column bases. Thus, the low-rank L _ 0 is not sparse, which avoids the ambiguity that low-rank component can also be sparse in the measurement Model (1).
We should also force the sparse component in Model (1) is not low rank.
Assumption 2.
Assume the support Ω of S _ 0 is drawn uniformly at random.
Now we can establish an upper bound on the estimation error of L _ ^ and S _ ^ in Problem (18).
Theorem 1
(An Upper Bound on the Estimation Error). Suppose L _ 0 and S _ 0 satisfy Assumption 1 and Assumption 2, respectively. If the tubal rank r of L _ 0 and the sparsity (i.e., the l 0 -norm) s of S _ 0 are respectively upper bounded as follows:
r c r min { n 1 , n 2 } μ log 2 ( n 3 max { n 1 , n 2 } ) , and s c s n 1 n 2 n 3
where c l and c s are two sufficiently small numerical constants independent on the dimensions n 1 , n 2 and n 3 . Then the estimator defined in Model (18) satisfy the following inequalities:
L _ ^ L _ 0 F 1 + 1 max { n 1 , n 2 } + 8 ( 1 + 2 2 ) min { n 1 , n 2 } n 3 δ S _ ^ S _ 0 F 1 + max { n 1 , n 2 } + 8 ( 1 + 2 2 ) n 1 n 2 n 3 δ ,
with probability at least 1 c 1 ( n 3 max { n 1 , n 2 } ) c 2 (over the choice of support of S _ 0 ), where c 1 and c 2 are positive constants independent on the dimensions n 1 , n 2 and n 3 .
The proof of Theorem 1 are given in the appendix. In Theorem 1, estimation errors on L _ 0 and S _ 0 are separately established. It indicates that the estimation error scales linearly with the noise level δ , which is in consistence with the result in [37].
Remark 3.
A significant progress over [37] is that in the noiseless setting where E _ 0 vanishes, our analysis can provide exact recovery guarantee of L _ 0 and S _ 0 . This is because the tensor incoherence condition adopted in our analysis intrinsically ensures that the low-rank tensor L _ 0 is not sparse and thus can be separated from the sparse corruption tensor, whereas the non-spiky condition adopted in [37] fails to provide identifiability in the measurement Model (1).
For Theorem 1, we also give the following remark.
Remark 4.
The error bounds established in Theorem 1 are consistent with the theoretical analysis for the special cases shown in Remark 1.
(I).
When δ = 0 , i.e., in the noiseless case, the error bounds in Theorem 1 will vanish, which means exact recovery of L _ 0 and S _ 0 can be guaranteed. This result is consistent with the analysis in [2] for TNN-based TRPCA Model (15).
(II).
When n 3 = 1 , the error bound on the sparse component in Theorem 1 is consistent with the error bound shown in Equation (8) of [45]. The upper bound on error of the low-rank component in Theorem 1 is sharper than that given in Equation (8) of [45].
(III).
When n 3 = 1 and δ = 0 , the proposed STPCP has consistent theoretical guarantee with the analysis of RPCA [46].

4. Algorithms

In this section, we design two algorithms. The first algorithm is based on the framework of ADMM [48] which has been extensively used in convex optimization with good convergence behavior. However, ADMM requires full SVDs on large matrices in each iteration which is high computational burden in high-dimensional settings. Thus, the second algorithm is proposed to solve this issue by using a factorization trick which can instead conducting SVDs on much smaller matrices.

4.1. An ADMM Algorithm

The proposed estimator (18) is equivalent to the following unconstrained problem:
min L _ , S _ 1 2 L _ + S _ M _ F 2 + γ ( L _ TNN + λ S _ 1 ) ,
where γ is a positive parameter balancing the data fidelity term and the regularization term.
Besides being corrupted by noises and outliers, the observed tensor M _ may also suffer from missing entries which can be taken as outliers with known positions in many applications. Thus, it is more practical to consider the recovery of L _ 0 against outliers S _ 0 , noises E _ 0 and missing entries shown in the following measurement model:
M _ = B _ ( L _ 0 + S _ 0 + E _ 0 ) ,
where tensor B _ R n 1 × n 2 × n 3 denote the missing mask where B _ i j k = 1 , if the ( i , j , k ) -th entry of L _ is observed and B _ i j k = 0 otherwise, and ⊙ denotes element-wise multiplication. Taking into consideration of missing entries, Model (26) can be further modified as:
min L _ , S _ 1 2 B _ ( L _ + S _ M _ ) F 2 + γ ( L _ TNN + λ S _ 1 ) .
By adding auxiliary variables to Problem (28), we obtain:
min K _ , L _ , R _ , S _ 1 2 B _ ( L _ + S _ M _ ) F 2 + γ K _ TNN + γ λ R _ 1 s . t . K _ = L _ , R _ = S _ .
The Augmented Lagrangian (AL) of Problem (29) is given as follows:
L ρ ( L _ , S _ , K _ , R _ , Y _ 1 , Y _ 2 ) = 1 2 B _ ( L _ + S _ M _ ) F 2 + γ K _ TNN + γ λ R _ 1 + Y _ 1 , K _ L _ + ρ 2 K _ L _ F 2 + Y _ 2 , R _ S _ + ρ 2 R _ S _ F 2 ,
where Y _ 1 , Y _ 2 R n 1 × n 2 × n 3 are Lagrangian multipliers and ρ is a penalty parameter.
According the strategy of ADMM, we update prime variables ( L _ , S _ ) and ( K _ , R _ ) by alternative minimization of AL in Problem (29) as follows
  • Update ( L _ , S _ ) . We update ( L _ , S _ ) by minimizing L ρ with other variables fixed as follows:
    ( L _ t + 1 , S _ t + 1 ) = argmin ( L _ , S _ ) L ρ ( L _ , S _ , K _ t , R _ t , Y _ 1 t , Y _ 2 t ) = argmin ( L _ , S _ ) 1 2 B _ ( L _ + S _ M _ ) F 2 + Y _ 1 t , K _ t L _ + ρ 2 K _ t L _ F 2 + Y _ 2 t , R _ t S _ + ρ 2 R _ t S _ F 2 .
    Taking derivatives of the right-hand side of Equation (31) with respect to L _ and S _ respectively, and setting the results zero, we obtain:
    B _ ( L _ t + 1 + S _ t + 1 ) B _ M _ Y _ 1 t + ρ ( L _ t + 1 K _ t ) = 0 _ B _ ( L _ t + 1 + S _ t + 1 ) B _ M _ Y _ 2 t + ρ ( S _ t + 1 R _ t ) = 0 _ .
    Resolving the above equation group yields:
    L _ t + 1 = ρ ( B _ + ρ 1 _ ) K _ t + ρ B _ M _ + ( B _ + ρ 1 _ ) Y _ 1 t B _ Y _ 2 t ρ B _ R _ t ρ ( 2 B _ + ρ 1 _ ) , S _ t + 1 = ρ ( B _ + ρ 1 _ ) R _ t + ρ B _ M _ + ( B _ + ρ 1 _ ) Y _ 2 t B _ Y _ 1 t ρ B _ K _ t ρ ( 2 B _ + ρ 1 _ ) ,
    where ⊘ denotes entry-wise division and 1 _ denotes the tensor all whose entries are 1.
  • Update ( K _ , R _ ) . We update ( K _ , R _ ) by minimizing L ρ with other variables fixed as follows
    ( K _ t + 1 , R _ t + 1 ) = argmin ( K _ , R _ ) L ρ ( L _ t + 1 , S _ t + 1 , K _ , R _ , Y _ 1 t , Y _ 2 t ) = argmin ( K _ , R _ ) γ K _ TNN + γ λ R _ 1 + Y _ 1 t , K _ L _ t + 1 + ρ 2 K _ L _ t + 1 F 2 + Y _ 2 t , R _ S _ t + 1 + ρ 2 R _ S _ t + 1 F 2 .
    Please note that Problem (34) can further be solved separately as follows:
    K _ t + 1 = argmin K _ γ K _ TNN + Y _ 1 t , K _ L _ t + 1 + ρ 2 K _ L _ t + 1 F 2 = S γ ρ 1 · TNN L _ t + 1 ρ 1 Y _ 1 t .
    and
    R _ t + 1 = argmin R _ γ λ R _ 1 + Y _ 1 t , R _ S _ t + 1 + ρ 2 R _ S _ t + 1 F 2 = S γ λ ρ 1 · 1 S _ t + 1 ρ 1 Y _ 2 t ,
    where S τ · TNN ( · ) is the proximity operator of TNN [5]. and S τ · 1 ( · ) is the proximity operator of tensor l 1 -norm given as follows [49]:
    S τ · 1 ( A _ ) : = argmin X _ τ X _ 1 + 1 2 X _ A _ F 2 = sign ( A _ ) max { ( | A _ | τ , 0 } ,
    In [5], a closed-form expression of S τ ( · ) is given as follows:
    Lemma 3.
    (Proximity operator of TNN [5]) For any 3D tensor A _ R n 1 × n 2 × n 3 with reduced t-SVD A _ = U _ Λ _ V _ , where U _ R n 1 × r × n 3 and V _ R n 2 × r × n 3 are orthogonal tensors and Λ _ R r × r × n 3 is the f-diagonal tensor of singular tubes, the proximity operator S τ · TNN ( A _ ) at A _ can be computed by:
    S τ · TNN ( A _ ) : = argmin X _ τ X _ TNN + 1 2 X _ A _ F 2 = U _ i f f t 3 ( max ( f f t 3 ( Λ _ ) τ , 0 ) ) V _ ,
  • Update ( Y _ 1 , Y _ 2 ) . The Lagrangian multipliers are updated by gradient ascent as follows:
    Y _ 1 t + 1 = Y _ 1 t + ρ ( K _ t + 1 L _ t + 1 ) , Y _ 2 t + 1 = Y _ 2 t + ρ ( R _ t + 1 S _ t + 1 ) .
The algorithm is summarized in Algorithm 1. The convergence analysis of Algorithm 1 is established in Theorem 2.
Algorithm 1 Solving Problem (29) using ADMM.
Input: 
The observed tensor M _ , the parameters γ , λ , ρ , δ .
1:
Initialize t = 0 , L _ 0 = S _ 0 = K _ 0 = R _ 0 = Y _ 1 0 = Y _ 2 0 = 0 _ R n 1 × n 2 × n 3
2:
for t = 0 , , T max do
3:
Update ( L _ t + 1 , S _ t + 1 ) by Equation (33);
4:
Update ( K _ t + 1 , R _ t + 1 ) by Equations (35)–(36);
5:
Update ( Y _ 1 t + 1 , Y _ 2 t + 1 ) by Equation (37);
6:
Check the convergence criteria:
(i)
convergence of variables: A _ t + 1 A _ t δ , A _ { L _ , S _ , K _ , R _ } ,
(ii)
convergence of constraints: max { K _ t + 1 L _ t , R _ t + 1 S _ t + 1 } δ .
7:
end for
Output: 
( L _ ^ , S _ ^ ) = ( L _ t + 1 , S _ t + 1 ) .
Theorem 2
(Convergence of Algorithm 1). For any ρ > 0 , if the unaugmented Lagrangian L ( L _ , S _ , K _ , R _ , Y _ 1 , Y _ 2 ) has a saddle point, then the iterations L ( L _ t , S _ t , K _ t , R _ t , Y _ 1 t , Y _ 2 t ) in Algorithm 1 satisfy the residual convergence, objective convergence and dual variable convergence of Problem (29) as t .
The proof of Theorem 2 is given in the Appendix A.
In a single iteration of Algorithm 1, the main cost comes from updating L _ t which involves computing FFT, IFFT and n 3 SVDs of n 1 × n 2 matrices [47]. Hence Algorithm 1 has per-iteration complexity of order O n 1 n 2 n 3 ( n 1 n 2 + log n 3 ) . Thus, if the total iteration number is T, then the total computational complexity is:
O T n 1 n 2 n 3 ( min { n 1 , n 2 } + log n 3 ) .

4.2. A Faster Algorithm

To reduce the cost of computing TNN which is a main cost of Algorithm 1, we propose the following lemma which indicates that TNN is orthogonal invariant.
Lemma 4.
Given a tensor X _ R r × r × n 3 , let Q _ R n 1 × r × n 3 a two semi-orthogonal tensors, i.e.,  Q _ Q _ = I _ R r × r × n 3 and r min { n 1 , n 2 } . Then, we have the following relationship:
Q _ X _ TNN = X _ TNN .
The proof of Lemma 4 can be found in the appendix. Equipped with Lemma 4, we decompose the low-rank component in Problem (28) as follows:
L _ = Q _ X _ , s . t . Q _ Q _ = I _ r ,
where I _ r R r × r × n 3 is an identity tensor. The similar strategy has been used in low-rank matrix recovery from gross corruptions by [50]. Furthermore, we propose the following model for Problem (28):
min Q _ , X _ , S _ 1 2 B _ ( Q _ X _ + S _ M _ ) F 2 + γ ( X _ TNN + λ S _ 1 ) s . t . Q _ Q _ = I _ r ,
where r is an upper estimation of tubal rank of the underlying tensor r = r tubal ( L _ 0 ) .
In contrast to Model (28), the proposed Model (39) is a non-convex optimization problem. That means Model (39) may have many local minima. We establish a connection between the proposed Model (39) with Model (28) in the following theorem.
Theorem 3
(Connection between Model (39) and Model (28)). Let ( Q _ , X _ , S _ ) be a global optimal solution to Problem (39). Furthermore, let ( L _ , S _ ) be the solution to Problem (28), and  r tubal ( L _ ) r , where r is the initialized tubal rank. Then ( Q _ X _ , S _ ) is also the optimal solution to Problem (28).
The proof of Theorem 3 can be found in the appendix. Theorem 3 states that the global optimal point of the (non-convex) Model (39) coincides with solution of the (convex) Model (28). It further indicates that the accuracy of Model (39) cannot exceed Model (28), which can be validated numerically in the experiment section.
To solve Model (39), we also use the ADMM framework.
First, by adding auxiliary variables, we have the following problem:
min L _ , S _ , R _ , Q _ , X _ 1 2 B _ ( L _ + S _ M _ ) F 2 + γ ( X _ TNN + λ R _ 1 ) s . t . Q _ X _ = L _ ; R _ = S _ ; Q _ Q _ = I _ r .
The augmented Lagrangian of Problem (40) is:
L 2 ( L _ , S _ , R _ , Q _ , X _ ) = 1 2 B _ ( L _ + S _ M _ ) F 2 + γ ( X _ TNN + λ R _ 1 ) + Y _ 1 , Q _ X _ L _ + ρ 2 Q _ X _ L _ F 2 + Y _ 2 , R _ S _ + ρ 2 R _ S _ F 2 s . t . Q _ Q _ = I _ r .
According the strategy of ADMM, we update prime variables ( L _ , S _ ) and ( Q _ , X _ , R _ ) by alternative minimization of AL in Problem (41) as follows
  • Update ( L _ , S _ ) : We update ( L _ , S _ ) by minimizing L ρ with other variables fixed as follows:
    ( L _ t + 1 , S _ t + 1 ) = argmin ( L _ , S _ ) L ρ ( L _ , S _ , Q _ t , X _ t , R _ t , Y _ 1 t , Y _ 2 t ) = argmin ( L _ , S _ ) 1 2 B _ ( L _ + S _ M _ ) F 2 + Y _ 1 t , Q _ t X _ t L _ + ρ 2 Q _ t X _ t L _ F 2 + Y _ 2 t , R _ t S _ + ρ 2 R _ t S _ F 2 .
    Taking derivatives of the right-hand side with respect to L _ and S _ respectively, and setting the results zero, we obtain:
    B _ ( L _ t + 1 + S _ t + 1 ) B _ M _ Y _ 1 t + ρ ( L _ t + 1 Q _ t X _ t ) = 0 _ B _ ( L _ t + 1 + S _ t + 1 ) B _ M _ Y _ 2 t + ρ ( S _ t + 1 R _ t ) = 0 _ ,
    Resolving the above equation group yields:
    L _ t + 1 = ( 1 + ρ ) Q _ t X _ t + B _ M _ + Y _ 1 t R _ t ( 2 B _ + ρ 1 _ ) , S _ t + 1 = ( 1 + ρ ) R _ t + B _ M _ + Y _ 2 t Q _ t X _ t ( 2 B _ + ρ 1 _ ) .
  • Update Q _ . We update Q _ by minimizing L ρ with other variables fixed as follows
    min Q _ Q _ = I _ r L ρ ( L _ t + 1 , S _ t + 1 , Q _ , X _ t , R _ t , Y _ 1 t , Y _ 2 t ) = min Q _ Q _ = I _ r Y _ 1 t , Q _ X _ t L _ t + 1 + ρ 2 Q _ X _ t L _ t + 1 F 2 . = min Q _ Q _ = I _ r ρ 2 Q _ X _ t ( L _ t + 1 ρ 1 Y _ 1 t ) F 2 = P ( L _ t + 1 ρ 1 Y _ 1 t ) ( X _ t ) ,
    where operator P ( · ) is defined in Lemma 5 as follows.
    Lemma 5.
    ([51]) Given any tensors A _ R r × n 2 × n 3 , B _ R n 1 × n 2 × n 3 , suppose tensor B _ A _ has t-SVD B _ A _ = U _ Λ _ V _ , where U _ R n 1 × r × n 3 and V _ R r × r × n 3 . Then, the problem:
    min Q _ Q _ = I _ r P _ A _ B _ F 2
    has a closed-form solution as:
    Q _ = P ( B _ A _ ) : = U _ V _ .
  • Update ( X _ , R _ ) :We update ( X _ , S _ ) by minimizing L ρ with other variables fixed as follows:
    min ( X _ , R _ ) L ρ ( L _ t + 1 , S _ t + 1 , Q _ t + 1 , X _ , R _ , Y _ 1 t , Y _ 2 t ) = min ( X _ , R _ ) γ X _ TNN + γ λ R _ 1 + Y _ 1 t , Q _ t + 1 X _ L _ t + 1 + ρ 2 Q _ t + 1 X _ L _ t + 1 F 2 + Y _ 2 t , R _ S _ t + 1 + ρ 2 R _ S _ t + 1 F 2 .
    Please note that Problem (48) can further be solved separately as follows:
    K _ t + 1 = argmin X _ γ X _ TNN + Y _ 1 t , Q _ t + 1 X _ L _ t + 1 + ρ 2 Q _ X _ L _ t + 1 F 2 = argmin X _ γ X _ TNN + ρ 2 Q _ t + 1 X _ ( L _ t + 1 ρ 1 Y _ 1 t ) F 2 = ( i ) argmin X _ γ X _ TNN + ρ 2 X _ ( Q _ t + 1 ) ( L _ t + 1 ρ 1 Y _ 1 t ) F 2 = S γ ρ 1 · TNN ( Q _ t + 1 ) ( L _ t + 1 ρ 1 Y _ 1 t ) .
    and
    R _ t + 1 = argmin R _ γ λ R _ 1 + Y _ 1 t , R _ S _ t + 1 + ρ 2 R _ S _ t + 1 F 2 = S γ λ ρ 1 · 1 K _ t + 1 ρ 1 Y _ 2 t .
    The equality ( i ) in Equation (49) holds because according to Q _ Q _ = I _ , we have:
    min X _ Q _ X _ Y _ F 2 = min X ¯ 1 n 3 Q ¯ · X ¯ Y ¯ F 2 = min X ¯ 1 n 3 Y ¯ F 2 2 n 3 Q ¯ · X ¯ , Y ¯ + 1 n 3 Q ¯ · X ¯ F 2 = min X ¯ 1 n 3 Y ¯ F 2 2 n 3 X ¯ , Q ¯ H Y ¯ + 1 n 3 X ¯ F 2 = min X ¯ 1 n 3 X ¯ Q ¯ H Y ¯ F 2 = min X _ ρ 2 X _ Q _ Y _ F 2 .
  • Update ( Y _ 1 , Y _ 2 ) . The Lagrangian multipliers are updated by gradient ascent as follows:
    Y _ 1 t + 1 = Y _ 1 t + ρ ( Q _ t + 1 X _ t + 1 L _ t + 1 ) , Y _ 2 t + 1 = Y _ 2 t + ρ ( R _ t + 1 S _ t + 1 ) .
The algorithmic steps are summarized in Algorithm 2. The complexity analysis is given as follows.
In each iteration of Algorithm 2, the update of L _ requires FFT/IFFT, and  n 3 multiplications of n 1 -by-r and r-by- n 2 matrices, which costs O ( n 1 n 2 + r n 1 + r n 2 ) n 3 log n 3 + r n 1 n 2 n 3 ; updating S _ costs O n 1 n 2 n 3 ; updating of Q _ involves FFT/IFFT and n 3 SVDs of n 1 -by-r matrices, which costs O r n 1 n 3 log n 3 + r 2 n 1 n 3 ; updating X _ involves FFT/IFFT and n 3 SVDs of r-by- n 2 , which costs O r n 2 n 3 log n 3 + r 2 n 2 n 3 ) . Then, the per-iteration computational complexity of Algorithm 2 is dominated by:
O max n 1 n 2 n 3 log n 3 , r 2 ( n 1 + n 2 ) n 3 .
Since the low-tubal-rank assumption r min { n 1 , n 2 } is adopted in this paper, the per-iteration of Algorithm 2 is much lower than Algorithm 1.
Algorithm 2 Solving Problem (40) using ADMM.
Input: 
The observed tensor M _ , an upper estimation r of r tubal ( L _ 0 ) , the parameters γ , λ , ρ , δ .
1:
Initialize t = 0 , L _ 0 = S _ 0 = R _ 0 = Y _ 1 0 = Y _ 2 0 = 0 _ R n 1 × n 2 × n 3 , Q _ 0 = 0 _ R n 1 × r × n 3 , X _ 0 = 0 _ R r × n 2 × n 3 .
2:
for t = 0 , , T max do
3:
Update ( L _ t + 1 , S _ t + 1 ) by Equation (42);
4:
Update Q _ t + 1 by Equation (45);
5:
Update ( X _ t + 1 , R _ t + 1 ) by Equations (49)–(50);
6:
Update ( Y _ 1 t + 1 , Y _ 2 t + 1 ) by Equation (52);
7:
Check the convergence criteria:
(i)
convergence of variables: A _ t + 1 A _ t δ , A _ { L _ , S _ , R _ , Q _ , X _ }
(ii)
convergence of constraints: max { Q _ t + 1 X _ t + 1 L _ t , R _ t + 1 S _ t + 1 } δ .
8:
end for
Output: 
( L _ ^ , S _ ^ ) = ( L _ t + 1 , S _ t + 1 ) .

5. Experiments

5.1. Synthetic Data

We first verify the correctness of Theorem 1. Specifically, we check whether the following two statements indicated in Theorem 1 hold in experiments on synthetic data sets:
(I).
(Exact recovery in the noiseless setting.) Our analysis guarantees that the underlying low-rank tensor L _ 0 and sparse tensor S _ 0 can be exactly recovered in the noiseless setting. This statement will be checked in Section 5.1.1.
(II).
(Linear scaling of errors with the noise level.) In Theorem 1, the estimation errors on L _ 0 and S _ 0 scales linearly with the noise level δ . This statement will be checked in Section 5.1.2.
Signal Generation. With a given tubal rank r 0 , we first generate the underlying tensor L _ 0 R n 1 × n 2 × n 3 by L _ 0 = A _ B _ / n 3 , where tensors A _ R n 1 × r 0 × n 3 and B _ R r 0 × n 2 × n 3 are generated with i.i.d. standard Gaussian elements. Then, the sparse corruption tensor S _ 0 is generated by choosing its support uniformly at random. The non-zero elements of S _ 0 will be i.i.d. sampled from a certain distribution that will be specified afterwards. Furthermore, the noise tensor E _ 0 is generated with entries sampled i.i.d. from N ( 0 , σ 2 ) with σ = c L _ 0 F / n 1 n 2 n 3 , where we set constant c is to control the signal noise ratio. Finally, the observed tensor M _ is formed by M _ = L _ 0 + S _ 0 + E _ 0 .

5.1.1. Exact Recovery in the Noiseless Setting

We first check Statement (I), i.e., exact recovery in the noiseless setting. Specifically, we will show that Algorithm 1 and Algorithm 2 can exactly recover the underlying tensor L _ 0 and the sparse corruption S _ 0 . We first test the recovery performance of different tensor sizes by setting n = n 1 = n 2 { 100 , 160 , 200 } and n 3 = 20 , with ( r tubal ( L _ 0 ) , S _ 0 0 ) = ( 0.05 n , 0.05 n 2 n 3 ) . The non-zero elements of tensor S _ 0 is sampled from i.i.d. symmetric Bernoulli distribution, i.e., the possibility of being 1 or −1 are 1/2. The results are shown in Table 1. It can be seen that both Algorithm 1 and Algorithm 2 can obtain relative standard error (RSE) smaller than 1 e 5 by which we can say that L _ 0 and S _ 0 are exact recovered. We can also see that Algorithm 2 runs much faster than Algorithm 1.
We then test whether the recovery performance can be affected by the distribution of the corruptions. This is done by choosing the non-zeros elements of S _ 0 from i.i.d. standard Gaussian distribution. The experimental results are reported in Table 2. We can find that both Algorithm 1 and Algorithm 2 can exactly recover the true L _ 0 and S _ 0 and Algorithm 2 runs much faster than Algorithm 1.
We also conduct STPCP by Algorithm 1 and Algorithm 2 with missing entries. After generating L _ 0 , S _ 0 and E _ 0 , we get the observation by Model (27). We choose the support of B _ uniformly at random with possibility 0.8 and then set elements in the chosen support to be 1. Thus, %20 of the entries are missing. The corrupted observation M is then formed by M _ = B _ ( L _ 0 + S _ 0 + E _ 0 ) . We show the recover results in Table 3. We can see that the underlying low-rank tensor L _ 0 can be exactly recovered and the observed part of the corruption tensor B _ S _ 0 can also be exactly recovered (Please note that it is impossible to recover the unobserved entries of a sparse tensor S _ 0 [52]).

5.1.2. Linear Scaling of Errors with the Noise Level

We then verify Statement (II) that the estimation errors have linear scale behavior with respect to the noise level. The estimation errors are measured using the mean-squared-error (MSE):
M S E ( L _ ^ ) = L _ ^ L _ 0 F 2 n 1 n 2 n 3 , M S E ( S _ ^ ) = S _ ^ S _ 0 F 2 n 1 n 2 n 3 ,
for the low rank component L _ 0 and the sparse component S _ 0 , respectively. We test tensors of 3 different size by choosing n { 60 , 80 , 100 } and n 3 = 20 . The tubal rank r tubal ( L _ 0 ) of L _ 0 and sparsity s of S _ 0 are set as ( r tubal ( L _ 0 ) , s ) = ( 5 , 0.1 n 2 n 3 ) . We vary the signal noise ratio c = 0.03 : 0.03 : 0.6 which is in proportional of the noise level δ . We run the proposed Algorithm 1, test 50 trials, and report the averaged MSEs. The MSEs of L _ ^ and S _ 0 versus c 2 are shown in sub-figures (a) and (b) in Figure 4. We can see that the estimation error has linear scaling behavior along with the noise level as Theorem 1 indicates. Since the results for n = 80 and n = 100 are quite similar to the case of n = 60 , they are simply omitted.

5.2. Real Data Sets

In this section, experiments on real data sets (color images and videos) are carried out to evaluate the effectiveness and efficiency of the proposed Algorithms 1 and 2. Besides noises and sparse corruptions, we also consider missing values which is more challenging. The proposed algorithms are compared with the following typical models:
(I).
NN-I: tensor recovery based on matrix nuclear norms of frontal slices formulated as follows:
min L _ , S _ 1 2 B _ ( M _ L _ E _ ) F + γ k = 1 n 3 ( L ( k ) + λ S ( k ) 1 ) .
This model will be used for image restoration in Section 5.2.1. Please note that Model (53) is equivalent to parallel matrix recovery on each frontal slice.
(II).
NN-II: tensor recovery based on matrix nuclear norm formulated as follows:
min L _ , S _ 1 2 B _ ( M _ L _ E _ ) F + γ L + γ λ S _ 1 ,
where L = [ l 1 , l 2 , , l n 3 ] R n 1 n 2 × n 3 with l k : = vec ( L ( k ) ) R n 1 n 2 defined as the vectorization [40] of frontal slices L ( k ) , for all k = 1 , 2 , , n 3 . This model will be used for video restoration in Section 5.2.2.
(III).
SNN: tensor recovery based on SNN formulated as follows:
min L _ , S _ 1 2 B _ ( M _ L _ E _ ) F + γ i = 1 3 α m L ( i ) + γ S _ 1 ,
where L ( i ) R n i × j i n j is the mode-i matriculation of tensor L _ R n 1 × n 2 × n 3 , for all i = 1 , 2 , 3 .
We solve the above Model (53)–(55) using ADMM implemented by ourselves in Matlab. The effectiveness of the algorithms is measured by Peaks Signal Noise Ratio (PSNR):
PSNR : = 10 log 10 n 1 n 2 n 3 L _ 0 2 L _ ^ L _ 0 F 2 . ,
Please note that a larger PSNR value indicates higher quality of L _ ^ .

5.2.1. Color Images

Color images are the most commonly used 3-way tensors. We test the twenty 256-by-256-by-3 color images which have been used in [37], and carry out robust tensor recovery with missing entries (see Figure 5). Following [37], for a color image L _ 0 R n × n × 3 , we choose its support uniformly at random with ratio ρ s and fill in the values with i.i.d. symmetric Bernoulli variables to generate S _ 0 . The noise tensor E _ 0 is generated with i.i.d. zero-mean Gaussian entries whose standard deviation is given by σ = 0.05 L _ 0 F / 3 n 2 . Then, we form the binary observation mask B _ by choosing its support uniformly at random with ratio ρ obs . Finally, the partially observed corruption M _ = B _ ( L _ 0 + S _ 0 + E _ 0 ) are formed.
We consider two scenarios by setting ( ρ obs , ρ s ) { ( 0 . 9 , 0 . 1 ) , ( 0 . 8 , 0 . 2 ) } . For NN (Model (53)), we set the regularization parameters λ = 1 / n ρ obs (suggested by [46]), and set parameter γ = E _ 0 sp where E _ 0 sp is estimated as 6.5 σ 3 ρ obs n log ( 6 n ) (suggested by [5]). For SNN, the parameters are chosen to satisfy γ = 0.05 , α 1 = α 2 = 3 n ρ obs , α 3 = 0.01 3 n ρ obs . For Algorithm 1 and Algorithm 2, we set γ = 0.3 E _ 0 sp , and λ = 1 / 3 n ρ obs . The initialized rank r in Algorithm 2 is set as 60. In each setting, we test each color image for 10 times and report the averaged PSNR and time. For quantitative comparison, we show the PSNR values and running times in Figure 6 and Figure 7 for settings of ( ρ obs , ρ s ) = ( 0.9 , 0.1 ) and ( ρ obs , ρ s ) = ( 0.8 , 0.2 ) , respectively. Several visual examples are shown in Figure 8 for qualitative comparison for the setting of ( ρ obs , ρ s ) = ( 0.8 , 0.2 ) . We can see from Figure 6, Figure 7 and Figure 8 that the proposed Algorithm 1 has the highest recovery quality and the proposed Algorithm 2 has the second highest quality but the fastest running time.

5.2.2. Videos

In this subsection, video restoration experiments are conducted on four broadly used YUV videos (They can be downloaded from https://sites.google.com/site/subudhibadri/fewhelpfuldownloads: Akiyo_qcif, Scilent_qcif, Carphone_qcif, and Claire_qcif.) Owing to computational limitation, we simply use the first 32 frames of the Y components of all the videos which results in four 144-by-176-by-30 tensors. For a 3-way data tensor L _ 0 R n 1 × n 2 × n 3 , To generate corruption S _ 0 , the support is chosen uniformly at random with ratio ρ s and then elements in the support are filled in with i.i.d. symmetric Bernoulli variables. The noise tensor E _ 0 is also generated with i.i.d. zero-mean Gaussian entries whose standard deviation is given by σ = 0.05 L _ 0 F / n 1 n 2 n 3 . Then, the binary observation mask B _ is formed thorough choosing its support uniformly at random with ratio ρ obs . Finally, the partially observed corruption M _ = B _ ( L _ 0 + S _ 0 + E _ 0 ) are formed.
We also consider two scenarios by setting ( ρ obs , ρ s ) { ( 0 . 9 , 0 . 1 ) , ( 0 . 8 , 0 . 2 ) } . NN-II Model (54) is used in video restoration. For NN-II, we set the regularization parameters λ = 1 / n 1 n 2 ρ obs (suggested by [46]), and set parameter γ = E _ 0 sp where E _ 0 sp is estimated as 6.5 σ ρ obs n 1 n 3 log ( ( n 1 + n 2 ) n 3 ) (suggested by [5]). For SNN, the parameters are chosen to satisfy γ = 0.05 , α 1 = α 2 = n 1 n 3 ρ obs , α 3 = 5 n 1 n 3 ρ obs . For Algorithm 1 and Algorithm 2, we set γ = 0.3 E _ 0 sp , and λ = 1 / max { n 1 , n 2 } n 3 ρ obs after careful parameter tuning. The initialized rank r in Algorithm 2 is set as 60. In each setting, we test each video for 10 times and report the averaged PSNR and time. For quantitative comparison, we show the PSNR values and running times in Table 4. It can be seen that Algorithm 1 has the highest recovery quality and the proposed Algorithm 2 has the second highest quality but the fastest running time.

6. Conclusions

This paper studied the problem of stable tensor principal component pursuit which aims to recover a tensor from noises and sparse corruptions. We proposed a constrained tubal nuclear norm-based model and established upper bounds on the estimation error. In contrast to prior work [37], our theory can guarantee exact recovery in the noiseless setting. We also designed two algorithms, the first ADMM algorithm can be accelerated by the second Algorithm which adopts a factorization strategy. We validated the correctness of our theory by simulations on synthetic data, and evaluated the effectiveness and efficiency of the proposed algorithms via experiments on color images and videos.
For future directions, it is a natural and interesting extension to consider recovery of 4-way tensors [35] with arbitrary linear transformation [53,54]. It is also interesting to use tensor factorization-based methods [55,56] for STPCP. Another challenging future direction is developing tools to verify whether the unknown tensor satisfies the tensor incoherence condition from its incomplete or corrupted observations.
For extensions of the proposed approach to higher-way tensors, we produce the following two ideas:
  • By recursively applying DFT over successive modes higher than 3 and then unfolding the obtained tensor into 3-way [57], the proposed algorithms and theoretical analysis can be extended to higher-way tensors.
  • By using the overlapped orientation invariant tubal nuclear norm [58], we can extend the proposed algorithm to higher-order cases and obtain orientation invariance.

Author Contributions

Conceptualization, W.F. Data curation, D.W. and R.Z. Formal analysis, W.F. Methodology, W.F., D.W and R.Z. Software, D.W. and R.Z. Writing, original draft, W.F., D.W. and R.Z.

Funding

This research was funded by the Key Projects of Natural Science Research in Universities in Anhui Province under grant number KJ2019A0994.

Acknowledgments

We sincerely thank Andong Wang who shared the codes of [37] and gave us some suggestions of the proof.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A. Proofs of Lemmas and Theorems

Appendix A.1. The Proof of Theorem 1

Appendix A.1.1. Key Lemmas for the Proof of Theorem 1

Before Proving Theorem 1, we should define some notations and operators first.
Suppose L _ 0 R n 1 × n 2 × n 3 with tubal rank r has the skinny t-SVD L _ 0 = U _ Λ _ V _ , where U _ R n 1 × r × n 3 , V _ R r × n 2 × n 3 are orthogonal tensors, and Λ _ R r × r × n 3 is an f-diagonal tensor. Define the following set:
T : = U _ A _ + B _ V _ | A _ R r × n 2 × n 3 , B _ R n 1 × r × n 3 R n 1 × n 2 × n 3 .
Then, define the projector onto T for any tensor T _ R n 1 × n 2 × n 3 as follows:
P T ( T _ ) : = U _ U _ T _ + T _ V _ V _ U _ U _ T _ V _ V _ , P T ( T _ ) : = ( I _ U _ U _ ) T _ ( I _ V _ V _ ) .
Let Ω be the complement of Ω [ n 1 ] × [ n 2 ] × [ n 3 ] which is the support of S _ 0 . Then, define two operators P Ω , P Ω as follows:
P Ω ( T _ ) : = ( i , j , k ) Ω T _ , e ˚ i e ˙ k e ˚ j , P Ω ( T _ ) : = ( i , j , k ) Ω T _ , e ˚ i e ˙ k e ˚ j ,
for any T _ R n 1 × n 2 × n 3 .
Define two sets Γ and Γ as follows:
Γ = { ( A _ , A _ ) | A _ R n 1 × n 2 × n 3 } , Γ = { ( A _ , A _ ) | A _ R n 1 × n 2 × n 3 } .
Then, for any tensors X _ ι , X _ s R n 1 × n 2 × n 3 , the projectors of the tensor X _ = ( X _ ι , X _ s ) into the sets Γ and Γ are given as follows, respectively:
P Γ ( X _ ) = X _ ι + X _ s 2 , X _ ι + X _ s 2 , P Γ ( X _ ) = X _ ι X _ s 2 , X _ s X _ ι 2 .
For any tensors X _ ι , X _ s R n 1 × n 2 × n 3 , define two operators on X _ = ( X _ ι , X _ s ) as follows:
( P T × P Ω ) ( X _ ) = ( P T ( X _ ι ) , P Ω ( X _ s ) ) , ( P T × P Ω ) ( X _ ) = ( P T ( X _ ι ) , P Ω ( X _ s ) ) .
Also define two norms as follows:
X _ F = X _ ι F 2 + X _ s F 2 , X _ F , μ = X _ ι F 2 + μ 2 X _ s F 2 .
where μ is a constant that will be determined afterwards.
We first give Lemma A1 which can be seen as a modified version of Lemma C.1 in [2].
Lemma A1.
Assume that P Ω P T 1 2 , and λ 1 2 n 3 . Suppose there exists a tensor G _ satisfying the following conditions:
P T ( G _ ) = U _ V _ , P T ( G _ ) sp 1 2 , P Ω ( G _ λ sign ( S _ 0 ) ) F λ 4 , P Ω ( G _ ) λ 2 .
Then for any perturbation Δ _ R n 1 × n 2 × n 3 , one has:
L _ 0 + Δ _ TNN + λ S _ 0 Δ _ 1 L _ 0 TNN + λ S _ 0 1 + 3 4 P T ( G _ ) sp P T ( Δ _ ) TNN + 3 4 λ P Ω ( G _ ) P Ω ( Δ ) 1 .
Proof. 
Let G _ ι L _ 0 TNN , i.e., any sub-gradient of · TNN at L _ 0 , then it satisfies:
P T ( G _ ι ) = U _ V _ , P T ( G _ ι ) sp 1 .
G _ ι L _ 0 TNN and G _ s ( λ S _ 0 1 ) . According to the convexity of · TNN and · 1 , we have:
L _ 0 + Δ _ TNN L _ 0 TNN + G _ ι , Δ _ , λ S _ 0 Δ _ 1 λ S _ 0 1 G _ s , Δ _ .
By choosing G _ ι = U _ V _ + P _ Q _ , where P _ and Q _ comes from the skinny t-SVD of P T ( Δ _ ) = P _ _ Q _ , one has:
G _ ι , Δ _ = G _ , Δ _ + G _ ι G _ , Δ _ = G _ , Δ _ + P T ( G _ ι ) , P T ( Δ _ ) P T ( G _ ) , P T ( Δ _ ) = G _ , Δ _ ( 1 P T ( G _ ) sp ) P T ( Δ _ ) TNN .
Also, by choosing G _ s = λ s i g n ( S _ 0 ) s i g n ( P Ω ( Δ _ ) ) , one has:
G _ s , Δ _ = G _ , Δ _ G _ s G _ , Δ _ = G _ , Δ _ P Ω ( λ s i g n ( S _ 0 ) G _ ) , P Ω ( Δ _ ) P Ω ( G _ s ) , P Ω ( Δ _ ) + P Ω ( G _ ) , P Ω ( Δ _ ) G _ , Δ _ P Ω ( λ s i g n ( S _ 0 ) G _ ) F P Ω ( Δ _ ) F + P Ω ( Δ _ ) 1 P Ω ( G _ ) P Ω ( Δ _ ) 1 G _ , Δ _ λ 4 P Ω ( Δ _ ) F + ( 1 P Ω ( G _ ) ) P Ω ( Δ _ ) 1
Also note that:
P Ω ( Δ _ ) F P Ω P T ( Δ _ ) F + P Ω P T ( Δ _ ) F P Ω P T ( Δ _ ) F + P Ω P T ( Δ _ ) F 1 2 Δ _ F + P Ω P T ( Δ _ ) F 1 2 P Ω ( Δ _ ) F + 1 2 P Ω ( Δ _ ) F + P Ω P T ( Δ _ ) F
which leads to:
P Ω ( Δ _ ) F P Ω ( Δ _ ) F + 2 P Ω P T ( Δ _ ) F P Ω ( Δ _ ) 1 + 2 n 3 P T ( Δ _ ) TNN .
Putting things together, we have:
L _ 0 + Δ _ TNN + λ S _ 0 Δ _ 1 ( L _ 0 TNN + λ S _ 0 1 ) 1 λ n 3 2 P T ( G _ ) sp P T ( Δ _ ) TNN + 3 4 λ P Ω ( G _ ) P Ω ( Δ _ ) 1 .
Since λ 1 2 n 3 , it holds that:
L _ 0 + Δ _ TNN + λ S _ 0 Δ _ 1 L _ 0 TNN + λ S _ 0 1 + 3 4 P T ( G _ ) sp P T ( Δ _ ) TNN + 3 4 λ P Ω ( G _ ) P Ω ( Δ ) 1 ,
for any perturbation Δ _ R n 1 × n 2 × n 3 . □
Lemma A2.
Suppose that P Ω P T 1 / 2 , then for any X _ = ( X _ ι , X _ s ) , we have:
P Γ ( P T × P Ω ) ( X _ ) F , μ 2 1 + μ 2 8 P T × P Ω ( X _ ) F 2 .
Proof. 
According to the definitions of P Γ and P T × P Ω , we have:
P Γ ( P T × P Ω ) ( X _ ) = P T ( X _ ι ) + P Ω ( X _ s ) 2 , P T ( X _ ι ) + P Ω ( X _ s ) 2 .
Then, we have:
P Γ ( P T × P Ω ) ( X _ ) F , μ 2 = ( 1 + μ 2 ) · 1 4 · P T ( X _ ι ) F 2 + P Ω ( X _ s ) F 2 + 2 P T ( X _ ι ) , P Ω ( X _ s ) = ( 1 + μ 2 ) 4 P T ( X _ ι ) F 2 + P Ω ( X _ s ) F 2 + 2 P Ω P T P T ( X _ ι ) , P Ω ( X _ s ) ( 1 + μ 2 ) 4 P T ( X _ ι ) F 2 + P Ω ( X _ s ) F 2 2 P Ω P T P T ( X _ ι ) F P Ω ( X _ s ) F ( 1 + μ 2 ) 4 P T ( X _ ι ) F 2 + P Ω ( X _ s ) F 2 2 · 1 2 P T ( X _ ι ) F P Ω ( X _ s ) F ( 1 + μ 2 ) 4 P T ( X _ ι ) F 2 + P Ω ( X _ s ) F 2 P T ( X _ ι ) F 2 + P Ω ( X _ s ) F 2 2 = ( 1 + μ 2 ) 8 P T × P Ω ( X _ ) F 2 .
Hence completes the proof. □

Appendix A.1.2. Proof of Theorem 1

Proof. 
For X _ = ( L _ , S _ ) , define X _ = L _ TNN + λ S _ 1 . Let X ^ _ = ( L _ ^ , S _ ^ ) , X _ = ( L _ 0 , S _ 0 ) . According to the optimality of ( L _ ^ , S _ ^ ) and the feasibility of ( L _ 0 , S _ 0 ) , we directly have:
X ^ _ X _ ,
L _ ^ + S _ ^ M _ F δ ,
L _ 0 + S _ 0 M _ F δ .
Let Δ _ ι = L _ ^ L _ 0 , Δ _ s = S _ ^ S _ 0 . Then, we have:
Δ _ ι + Δ _ s F = L _ ^ + S _ ^ M _ ( L _ 0 + S _ 0 M _ ) F L _ ^ + S _ ^ M _ F + L _ 0 + S _ 0 M _ F 2 δ .
Define the pair of error tensors Δ _ = X ^ _ X _ = ( Δ _ ι , Δ _ s ) . The goal is to bound Δ _ F , μ .
First, we use the decomposition Δ _ = P Γ ( Δ _ ) + P Γ ( Δ _ ) , and let Δ _ Γ = P Γ ( Δ _ ) = ( Δ _ ι Γ , Δ _ s Γ ) = ( Δ _ ι + Δ _ s 2 , Δ _ ι + Δ _ s 2 ) , Δ _ Γ = P Γ ( Δ _ ) = ( Δ _ ι Γ , Δ _ s Γ ) = ( Δ _ ι Δ _ s 2 , Δ _ s Δ _ ι 2 ) for simplicity. Then, we have:
Δ _ F , μ = Δ _ Γ + Δ _ Γ F , μ Δ _ Γ F , μ + Δ _ Γ F , μ .
Please note that Δ _ ι Γ = Δ _ s Γ = Δ _ ι + Δ _ s 2 , thus Δ _ Γ F , μ can be bounded easily as follows:
Δ _ Γ F , μ = Δ _ ι Γ F 2 + μ 2 Δ _ s Γ F 2 = 1 + μ 2 2 Δ _ ι + Δ _ s F δ 1 + μ 2 .
Then, it remains to bound Δ _ Γ F , μ . Due to the triangular inequality:
Δ _ Γ F , μ ( P T × P Ω ) Δ _ Γ F , μ + ( P T × P Ω ) Δ _ Γ F , μ ,
(A) bound ( P T × P Ω ) Δ _ Γ F , μ . According to the convexity of · we have:
X _ + Δ _ = X _ + Δ _ Γ + Δ _ Γ X _ + Δ _ Γ Δ _ Γ .
Using Lemma A1, we have:
X _ + Δ _ Γ X _ + 3 4 P T ( G _ ) sp P T ( Δ _ ι Γ ) TNN + 3 4 λ P Ω ( G _ ) P Ω ( Δ _ s Γ ) 1 X _ + 1 4 ( P T × P Ω ) Δ _ Γ .
Combining Equations (A20), (A27) and (A28), we have:
Δ _ Γ 1 4 ( P T × P Ω ) Δ _ Γ
Then, with μ = n 3 λ , we reach a bound on ( P T × P Ω ) Δ _ Γ F , μ as follows:
( P T × P Ω ) Δ _ Γ F , μ P T ( Δ _ ι Γ ) F + μ P Ω ( Δ _ s Γ ) F n 3 P T ( Δ _ ι Γ ) TNN + μ P Ω ( Δ _ s Γ ) 1 n 3 P T ( Δ _ ι Γ ) TNN + λ P Ω ( Δ _ s Γ ) 1 n 3 ( P T × P Ω ) Δ _ Γ 4 n 3 Δ _ Γ 4 n 3 Δ _ ι Γ TNN + λ Δ _ s Γ 1 4 n 3 min { n 1 , n 2 } Δ _ ι Γ F + λ n 1 n 2 n 3 Δ _ s Γ F = 4 n 3 min { n 1 , n 2 } + λ n 1 n 2 n 3 Δ _ ι Γ F 4 n 3 min { n 1 , n 2 } + λ n 1 n 2 n 3 δ .
(B) bound ( P T × P Ω ) Δ _ Γ F , μ . Please note that:
P Γ ( Δ _ Γ ) = 0 _ = P Γ ( P T × P Ω ) ( Δ _ Γ ) + P Γ ( P T × P Ω ) ( Δ _ Γ ) ,
which means:
P Γ ( P T × P Ω ) ( Δ _ Γ ) F , μ = P Γ ( P T × P Ω ( Δ _ Γ ) ) F , μ P T × P Ω ( Δ _ Γ ) F , μ .
According to Lemma A2, we have:
( P T × P Ω ) ( Δ _ Γ ) F , μ P T ( Δ _ ι Γ ) F + μ P Ω ( Δ _ ι Γ ) F 1 + μ 2 P T ( Δ _ ι Γ ) F 2 + P Ω ( Δ _ s Γ ) F 2 = 1 + μ 2 P T × P Ω ( Δ _ Γ ) F 1 + μ 2 · 8 1 + μ 2 · P Γ ( P T × P Ω ) ( Δ _ Γ ) F .
According to Equations (A32) and (A33), we obtain:
( P T × P Ω ) ( Δ _ Γ ) F , μ 2 2 ( P T × P Ω ) ( Δ _ Γ ) F , μ .
Thus, combing Equations (A24), (A25), (A30) and (A34), and setting μ = n 3 λ , we obtain:
Δ _ F , μ 1 + n 3 λ 2 + 4 ( 1 + 2 2 ) min { n 1 , n 2 } n 3 + n 3 λ n 1 n 2 δ .
Since λ = 1 max { n 1 , n 2 } n 3 , we have:
Δ _ F , μ 1 + 1 max { n 1 , n 2 } + 8 ( 1 + 2 2 ) min { n 1 , n 2 } n 3 δ ,
which indicates that:
L _ ^ L _ 0 F 1 + 1 max { n 1 , n 2 } + 8 ( 1 + 2 2 ) min { n 1 , n 2 } n 3 δ S _ ^ S _ 0 F 1 + max { n 1 , n 2 } + 8 ( 1 + 2 2 ) n 1 n 2 n 3 δ .
Moreover, according to the analysis in [2], the conditions P Ω P T 1 2 and Equation (A8) in Lemma A1 hold with probability at least 1 c 1 ( n 3 max { n 1 , n 2 } ) c 2 , where c 1 and c 2 are positive constants.
In this way, the proof of Theorem 1 is completed. □

Appendix A.2. Proof of Theorem 2

Proof. 
The key idea is to rewrite Problem (29) into a standard two-block ADMM problem. For notational simplicity, let:
f ( x ) = 1 2 L _ + S _ Y _ F 2 , g ( z ) = γ K _ TNN + γ λ R ( S _ ) ,
where x , y , z and A are defined as follows:
x = vec ( L _ ) vec ( S _ ) , y = vec ( Y _ 1 ) vec ( Y _ 2 ) , z = vec ( K _ ) vec ( R _ ) , A = diag ( vec ( B _ ) ) 0 0 diag ( vec ( B _ ) ) ,
and vec ( · ) denotes an operation of tensor vectorization (see [40]).
It can be verified that f ( · ) and g ( · ) are closed, proper convex functions. Then, Problem (29) can be re-written as follows:
min x , z f ( x ) + g ( z ) s . t . A x z = 0 .
According to the convergence analysis in [48], we have:
objective convergence : lim t f ( x t ) + g ( z t ) = f + g , dual variable convergence : lim t y t = y , constraint convergence : lim t A x t z t = 0 ,
where f , g are the optimal values of f ( x ) , g ( z ) , respectively. Variable y is a dual optimal point defined as:
y = vec ( Y _ 1 ) vec ( Y _ 2 ) ,
where ( Y _ 1 , Y _ 2 ) is the dual component of a saddle point ( L _ , S _ , K _ , R _ , Y _ 1 , Y _ 2 ) of the unaugmented Lagrangian L ( L _ , S _ , K _ , R _ , Y _ 1 , Y _ 2 ) . □

Appendix A.3. Proof of Lemma 4

Proof. 
Let the full t-SVD of X _ be X _ = U _ Λ _ V _ , where U _ , V _ R r × r × n 3 are orthogonal tensors and Λ _ R r × r × n 3 is f-diagonal. Then:
X _ TNN = U _ Λ _ V _ ¯ = U _ ¯ · Λ _ ¯ · V _ ¯ = Λ _ ¯ .
Then Q _ X _ = ( Q _ U _ ) Λ _ V _ . Since
( Q _ U _ ) ( Q _ U _ ) = U _ Q _ Q _ U _ = I _ ,
we obtain that:
Q _ X _ TNN = Q _ X _ ¯ = ( Q _ U _ ) Λ _ V _ ¯ = ( Q _ U _ ) ¯ · Λ _ ¯ · V _ ¯ = Λ _ ¯ .
Thus, Q _ X _ TNN = X _ TNN . □

Appendix A.4. Proof of Theorem 3

Proof. 
Please note that ( Q _ X _ , S _ ) is a feasible point of Problem (28), then we have:
1 2 B _ ( L _ + S _ M _ ) F 2 + γ ( L _ TNN + λ S _ 1 ) 1 2 B _ ( Q _ X _ + S _ M _ ) F 2 + γ ( Q _ X _ TNN + λ S _ 1 ) = 1 2 B _ ( Q _ X _ + S _ M _ ) F 2 + γ ( X _ TNN + λ S _ 1 )
By the assumption that r tubal ( L _ ) r , there exists a decomposition L _ = Q _ X _ , such that ( Q _ , X _ , S _ ) is also a feasible point of Problem (39).
Moreover, since ( Q _ , X _ , S _ ) is a global optimal solution to Problem (39), then we have that
1 2 B _ ( Q _ X _ + S _ M _ ) F 2 + γ ( X _ TNN + λ S _ 1 ) 1 2 B _ ( Q _ X _ + S _ M _ ) F 2 + γ ( X _ TNN + λ S _ 1 ) .
By L _ = Q _ X _ , we have:
L _ TNN = Q _ X _ TNN = X _ TNN .
Thus, we deduce:
1 2 B _ ( Q _ X _ + S _ M _ ) F 2 + γ ( X _ TNN + λ S _ 1 ) 1 2 B _ ( L _ + S _ M _ ) F 2 + γ ( L _ TNN + λ S _ 1 ) .
According to Equations (A41) and (A43), we further have:
1 2 B _ ( Q _ X _ + S _ M _ ) F 2 + γ ( X _ TNN + λ S _ 1 ) 1 2 B _ ( L _ + S _ M _ ) F 2 + γ ( L _ TNN + λ S _ 1 ) .
In this way, ( Q _ X _ , S _ ) is also the optimal solution to Problem (28). □

References

  1. Liu, J.; Musialski, P.; Wonka, P.; Ye, J. Tensor completion for estimating missing values in visual data. IEEE Trans. Pattern Anal. Mach. Intell. 2013, 35, 208–220. [Google Scholar] [CrossRef] [PubMed]
  2. Lu, C.; Feng, J.; Chen, Y.; Liu, W.; Lin, Z.; Yan, S. Tensor robust principal component analysis with a new tensor nuclear norm. IEEE Trans. Pattern Anal. Mach. Intell. 2019. [Google Scholar] [CrossRef] [Green Version]
  3. Xu, Y.; Hao, R.; Yin, W.; Su, Z. Parallel matrix factorization for low-rank tensor completion. Inverse Probl. Imaging 2015, 9, 601–624. [Google Scholar] [CrossRef] [Green Version]
  4. Liu, Y.; Shang, F. An Efficient Matrix Factorization Method for Tensor Completion. IEEE Signal Process. Lett. 2013, 20, 307–310. [Google Scholar] [CrossRef]
  5. Wang, A.; Wei, D.; Wang, B.; Jin, Z. Noisy Low-Tubal-Rank Tensor Completion Through Iterative Singular Tube Thresholding. IEEE Access 2018, 6, 35112–35128. [Google Scholar] [CrossRef]
  6. Tan, H.; Feng, G.; Feng, J.; Wang, W.; Zhang, Y.J.; Li, F. A tensor-based method for missing traffic data completion. Transp. Res. Part C 2013, 28, 15–27. [Google Scholar] [CrossRef] [Green Version]
  7. Peng, Y.; Lu, B.L. Discriminative extreme learning machine with supervised sparsity preserving for image classification. Neurocomputing 2017, 261, 242–252. [Google Scholar] [CrossRef]
  8. Cichocki, A.; Mandic, D.; De Lathauwer, L.; Zhou, G.; Zhao, Q.; Caiafa, C.; Phan, H.A. Tensor decompositions for signal processing applications: From two-way to multiway component analysis. IEEE Signal Process. Mag. 2015, 32, 145–163. [Google Scholar] [CrossRef] [Green Version]
  9. Vaswani, N.; Bouwmans, T.; Javed, S.; Narayanamurthy, P. Robust subspace learning: Robust PCA, robust subspace tracking, and robust subspace recovery. IEEE Signal Process. Mag. 2018, 35, 32–55. [Google Scholar] [CrossRef] [Green Version]
  10. Cichocki, A.; Lee, N.; Oseledets, I.; Phan, A.H.; Zhao, Q.; Mandic, D.P. Tensor Networks for Dimensionality Reduction and Large-scale Optimization: Part 1 Low-Rank Tensor Decompositions. Found. Trends® Mach. Learn. 2016, 9, 249–429. [Google Scholar] [CrossRef] [Green Version]
  11. Yuan, M.; Zhang, C.H. On Tensor Completion via Nuclear Norm Minimization. Found. Comput. Math. 2016, 16, 1–38. [Google Scholar] [CrossRef] [Green Version]
  12. Candès, E.J.; Tao, T. The power of convex relaxation: Near-optimal matrix completion. IEEE Trans. Inf. Theory 2010, 56, 2053–2080. [Google Scholar] [CrossRef] [Green Version]
  13. Hillar, C.J.; Lim, L. Most Tensor Problems Are NP-Hard. J. ACM 2009, 60, 45. [Google Scholar] [CrossRef]
  14. Yuan, M.; Zhang, C.H. Incoherent Tensor Norms and Their Applications in Higher Order Tensor Completion. IEEE Trans. Inf. Theory 2017, 63, 6753–6766. [Google Scholar] [CrossRef]
  15. Tomioka, R.; Suzuki, T. Convex tensor decomposition via structured schatten norm regularization. In Proceedings of the Advances in Neural Information Processing Systems, Lake Tahoe, NV, USA, 5–10 December 2013; pp. 1331–1339. [Google Scholar]
  16. Semerci, O.; Hao, N.; Kilmer, M.E.; Miller, E.L. Tensor-Based Formulation and Nuclear Norm Regularization for Multienergy Computed Tomography. IEEE Trans. Image Process. 2014, 23, 1678–1693. [Google Scholar] [CrossRef] [Green Version]
  17. Mu, C.; Huang, B.; Wright, J.; Goldfarb, D. Square Deal: Lower Bounds and Improved Relaxations for Tensor Recovery. In Proceedings of the International Conference on Machine Learning, Beijing, China, 21–26 June 2014; pp. 73–81. [Google Scholar]
  18. Zhao, Q.; Meng, D.; Kong, X.; Xie, Q.; Cao, W.; Wang, Y.; Xu, Z. A Novel Sparsity Measure for Tensor Recovery. In Proceedings of the IEEE International Conference on Computer Vision, Santiago, Chile, 7–13 December 2015; pp. 271–279. [Google Scholar]
  19. Wei, D.; Wang, A.; Wang, B.; Feng, X. Tensor Completion Using Spectral (k, p) -Support Norm. IEEE Access 2018, 6, 11559–11572. [Google Scholar] [CrossRef]
  20. Tomioka, R.; Hayashi, K.; Kashima, H. Estimation of low-rank tensors via convex optimization. arXiv 2010, arXiv:1010.0789. [Google Scholar]
  21. Chretien, S.; Wei, T. Sensing tensors with Gaussian filters. IEEE Trans. Inf. Theory 2016, 63, 843–852. [Google Scholar] [CrossRef] [Green Version]
  22. Ghadermarzy, N.; Plan, Y.; Yılmaz, Ö. Near-optimal sample complexity for convex tensor completion. arXiv 2017, arXiv:1711.04965. [Google Scholar] [CrossRef] [Green Version]
  23. Ghadermarzy, N.; Plan, Y.; Yılmaz, Ö. Learning tensors from partial binary measurements. arXiv 2018, arXiv:1804.00108. [Google Scholar] [CrossRef] [Green Version]
  24. Liu, Y.; Shang, F.; Fan, W.; Cheng, J.; Cheng, H. Generalized Higher-Order Orthogonal Iteration for Tensor Decomposition and Completion. In Proceedings of the Advances in Neural Information Processing Systems, Montreal, QC, Canada, 8–13 December 2014; pp. 1763–1771. [Google Scholar]
  25. Zhang, Z.; Ely, G.; Aeron, S.; Hao, N.; Kilmer, M. Novel methods for multilinear data completion and de-noising based on tensor-SVD. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Columbus, OH, USA, 23–28 June 2014; pp. 3842–3849. [Google Scholar]
  26. Lu, C.; Feng, J.; Lin, Z.; Yan, S. Exact Low Tubal Rank Tensor Recovery from Gaussian Measurements. In Proceedings of the 28th International Joint Conference on Artificial Intelligence, Stockholm, Sweden, 13–19 July 2018; pp. 1948–1954. [Google Scholar]
  27. Jiang, J.Q.; Ng, M.K. Exact Tensor Completion from Sparsely Corrupted Observations via Convex Optimization. arXiv 2017, arXiv:1708.00601. [Google Scholar]
  28. Xie, Y.; Tao, D.; Zhang, W.; Liu, Y.; Zhang, L.; Qu, Y. On Unifying Multi-view Self-Representations for Clustering by Tensor Multi-rank Minimization. Int. J. Comput. Vis. 2018, 126, 1157–1179. [Google Scholar] [CrossRef] [Green Version]
  29. Ely, G.T.; Aeron, S.; Hao, N.; Kilmer, M.E. 5D seismic data completion and denoising using a novel class of tensor decompositions. Geophysics 2015, 80, V83–V95. [Google Scholar] [CrossRef] [Green Version]
  30. Liu, X.; Aeron, S.; Aggarwal, V.; Wang, X.; Wu, M. Adaptive Sampling of RF Fingerprints for Fine-grained Indoor Localization. IEEE Trans. Mob. Comput. 2016, 15, 2411–2423. [Google Scholar] [CrossRef] [Green Version]
  31. Wang, A.; Lai, Z.; Jin, Z. Noisy low-tubal-rank tensor completion. Neurocomputing 2019, 330, 267–279. [Google Scholar] [CrossRef]
  32. Sun, W.; Chen, Y.; Huang, L.; So, H.C. Tensor Completion via Generalized Tensor Tubal Rank Minimization using General Unfolding. IEEE Signal Process. Lett. 2018, 25, 868–872. [Google Scholar] [CrossRef]
  33. Kilmer, M.E.; Braman, K.; Hao, N.; Hoover, R.C. Third-order tensors as operators on matrices: A theoretical and computational framework with applications in imaging. SIAM J. Matrix Anal. Appl. 2013, 34, 148–172. [Google Scholar] [CrossRef] [Green Version]
  34. Liu, X.Y.; Aeron, S.; Aggarwal, V.; Wang, X. Low-tubal-rank tensor completion using alternating minimization. arXiv 2016, arXiv:1610.01690. [Google Scholar]
  35. Liu, X.Y.; Wang, X. Fourth-order tensors with multidimensional discrete transforms. arXiv 2017, arXiv:1705.01576. [Google Scholar]
  36. Gu, Q.; Gui, H.; Han, J. Robust tensor decomposition with gross corruption. In Proceedings of the Advances in Neural Information Processing Systems, Montreal, QC, Canada, 8–13 December 2014; pp. 1422–1430. [Google Scholar]
  37. Wang, A.; Jin, Z.; Tang, G. Robust tensor decomposition via t-SVD: Near-optimal statistical guarantee and scalable algorithms. Signal Process. 2020, 167, 107319. [Google Scholar] [CrossRef]
  38. Zhang, Z.; Aeron, S. Exact Tensor Completion Using t-SVD. IEEE Trans. Signal Process. 2017, 65, 1511–1526. [Google Scholar] [CrossRef]
  39. Goldfarb, D.; Qin, Z. Robust low-rank tensor recovery: Models and algorithms. SIAM J. Matrix Anal. Appl. 2014, 35, 225–253. [Google Scholar] [CrossRef] [Green Version]
  40. Kolda, T.G.; Bader, B.W. Tensor decompositions and applications. SIAM Rev. 2009, 51, 455–500. [Google Scholar] [CrossRef]
  41. Cheng, L.; Wu, Y.C.; Zhang, J.; Liu, L. Subspace identification for DOA estimation in massive/full-dimension MIMO systems: Bad data mitigation and automatic source enumeration. IEEE Trans. Signal Process. 2015, 63, 5897–5909. [Google Scholar] [CrossRef]
  42. Cheng, L.; Xing, C.; Wu, Y.C. Irregular Array Manifold Aided Channel Estimation in Massive MIMO Communications. IEEE J. Sel. Top. Signal Process. 2019, 13, 974–988. [Google Scholar] [CrossRef]
  43. Zhao, Q.; Zhou, G.; Zhang, L.; Cichocki, A.; Amari, S.I. Bayesian robust tensor factorization for incomplete multiway data. IEEE Trans. Neural Networks Learn. Syst. 2016, 27, 736–748. [Google Scholar] [CrossRef] [Green Version]
  44. Zhou, Y.; Cheung, Y. Bayesian Low-Tubal-Rank Robust Tensor Factorization with Multi-Rank Determination. IEEE Trans. Pattern Anal. Mach. Intell. 2019. [Google Scholar] [CrossRef]
  45. Zhou, Z.; Li, X.; Wright, J.; Candes, E.; Ma, Y. Stable principal component pursuit. In Proceedings of the 2010 IEEE International Symposium on Information Theory, Austin, TX, USA, 12–18 June 2010; pp. 1518–1522. [Google Scholar]
  46. Candès, E.J.; Li, X.; Ma, Y.; Wright, J. Robust principal component analysis? J. ACM 2011, 58, 11. [Google Scholar] [CrossRef]
  47. Lu, C.; Feng, J.; Chen, Y.; Liu, W.; Lin, Z.; Yan, S. Tensor Robust Principal Component Analysis: Exact Recovery of Corrupted Low-Rank Tensors via Convex Optimization. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Las Vegas, NV, USA, 27–30 June 2016; pp. 5249–5257. [Google Scholar]
  48. Boyd, S.; Parikh, N.; Chu, E.; Peleato, B.; Eckstein, J. Distributed optimization and statistical learning via the alternating direction method of multipliers. Found. Trends® Mach. Learn. 2011, 3, 1–122. [Google Scholar] [CrossRef]
  49. Peng, Y.; Lu, B.L. Robust structured sparse representation via half-quadratic optimization for face recognition. Multimed. Tools Appl. 2017, 76, 8859–8880. [Google Scholar] [CrossRef]
  50. Liu, G.; Yan, S. Active subspace: Toward scalable low-rank learning. Neural Comput. 2012, 24, 3371–3394. [Google Scholar] [CrossRef] [PubMed]
  51. Wang, A.; Jin, Z.; Yang, J. A Factorization Strategy for Tensor Robust PCA; ResearchGate: Berlin, Germany, 2019. [Google Scholar]
  52. Jiang, Q.; Ng, M. Robust Low-Tubal-Rank Tensor Completion via Convex Optimization. In Proceedings of the 28th International Joint Conference on Artificial Intelligence, Macao, China, 10–16 August 2019; pp. 2649–2655. [Google Scholar]
  53. Kernfeld, E.; Kilmer, M.; Aeron, S. Tensor–tensor products with invertible linear transforms. Linear Algebra Its Appl. 2015, 485, 545–570. [Google Scholar] [CrossRef]
  54. Lu, C.; Peng, X.; Wei, Y. Low-Rank Tensor Completion With a New Tensor Nuclear Norm Induced by Invertible Linear Transforms. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Long Beach, CA, USA, 16–20 June 2019; pp. 5996–6004. [Google Scholar]
  55. Liu, X.Y.; Aeron, S.; Aggarwal, V.; Wang, X. Low-tubal-rank tensor completion using alternating minimization. In Proceedings of the SPIE Defense+ Security, Baltimore, MD, USA, 17–21 April 2016; International Society for Optics and Photonics: Bellingham, DC, USA, 2016; p. 984809. [Google Scholar]
  56. Zhou, P.; Lu, C.; Lin, Z.; Zhang, C. Tensor Factorization for Low-Rank Tensor Completion. IEEE Trans. Image Process. 2018, 27, 1152–1163. [Google Scholar] [CrossRef] [PubMed]
  57. Martin, C.D.; Shafer, R.; Larue, B. An Order-p Tensor Factorization with Applications in Imaging. SIAM J. Sci. Comput. 2013, 35, A474–A490. [Google Scholar] [CrossRef]
  58. Wang, A.; Jin, Z. Orientation Invariant Tubal Nuclear Norms Applied to Robust Tensor Decomposition. Available online: https://www.researchgate.net/publication/329116872_Orientation_Invariant_Tubal_Nuclear_Norms_Applied_to_Robust_Tensor_Decomposition (accessed on 3 December 2019).
Figure 1. A visual illustration of t-SVD.
Figure 1. A visual illustration of t-SVD.
Sensors 19 05335 g001
Figure 2. The distribution of tensor singular values _ ( i , i , 1 ) in a natural color image. (a) the sample image, (b) the distribution of _ ( i , i , 1 ) .
Figure 2. The distribution of tensor singular values _ ( i , i , 1 ) in a natural color image. (a) the sample image, (b) the distribution of _ ( i , i , 1 ) .
Sensors 19 05335 g002
Figure 3. The distribution of tensor singular values _ ( i , i , 1 ) in a video sequence. (a) the first frame of the video, (b) the distribution of _ ( i , i , 1 ) .
Figure 3. The distribution of tensor singular values _ ( i , i , 1 ) in a video sequence. (a) the first frame of the video, (b) the distribution of _ ( i , i , 1 ) .
Sensors 19 05335 g003
Figure 4. The MSEs of L _ ^ and S _ 0 versus c 2 for tensors of size 60 × 60 × 20 where the tubal rank r tubal ( L _ 0 ) of L _ 0 and sparsity s of S _ 0 are set as ( r tubal ( L _ 0 ) , s ) = ( 5 , 0.1 n 2 n 3 ) . (a): MSE of L _ ^ vs c 2 . (b): MSE of S _ ^ vs c 2 .
Figure 4. The MSEs of L _ ^ and S _ 0 versus c 2 for tensors of size 60 × 60 × 20 where the tubal rank r tubal ( L _ 0 ) of L _ 0 and sparsity s of S _ 0 are set as ( r tubal ( L _ 0 ) , s ) = ( 5 , 0.1 n 2 n 3 ) . (a): MSE of L _ ^ vs c 2 . (b): MSE of S _ ^ vs c 2 .
Sensors 19 05335 g004
Figure 5. The 20 color images used.
Figure 5. The 20 color images used.
Sensors 19 05335 g005
Figure 6. The quantitative comparison in PSNR and time on color images. First, 10 % entries of each image is corrupted by i.i.d. symmetric Bernoulli variable, then polluted by Gaussian noise of noise level c = 0.05 , and finally 10 % of the corrupted entries are missing uniformly at random. (a): the PSNR values of each algorithm; (b): the running time of each algorithm.
Figure 6. The quantitative comparison in PSNR and time on color images. First, 10 % entries of each image is corrupted by i.i.d. symmetric Bernoulli variable, then polluted by Gaussian noise of noise level c = 0.05 , and finally 10 % of the corrupted entries are missing uniformly at random. (a): the PSNR values of each algorithm; (b): the running time of each algorithm.
Sensors 19 05335 g006
Figure 7. The quantitative comparison in PSNR and time on color images. First, 20 % entries of each image is corrupted by i.i.d. symmetric Bernoulli variable, then polluted by Gaussian noise of noise level c = 0.05 , and finally 20 % of the corrupted entries are missing uniformly at random. (a): the PSNR values of each algorithm; (b): the running time of each algorithm.
Figure 7. The quantitative comparison in PSNR and time on color images. First, 20 % entries of each image is corrupted by i.i.d. symmetric Bernoulli variable, then polluted by Gaussian noise of noise level c = 0.05 , and finally 20 % of the corrupted entries are missing uniformly at random. (a): the PSNR values of each algorithm; (b): the running time of each algorithm.
Sensors 19 05335 g007aSensors 19 05335 g007b
Figure 8. The visual results for image recovery of different algorithms. First, 20 % entries of each image is corrupted by i.i.d. symmetric Bernoulli variable, then polluted by Gaussian noise of noise level c = 0.05 , and finally 20 % of the corrupted entries are missing uniformly at random. (a): the original image; (b): the corrupted image; (c) image recovered by Algorithm 1; (d) image recovered by Algorithm 2; (e) image recovered by the matrix nuclear norm (NN)-based Model (53); (f) image recovered by the SNN-based Model (55).
Figure 8. The visual results for image recovery of different algorithms. First, 20 % entries of each image is corrupted by i.i.d. symmetric Bernoulli variable, then polluted by Gaussian noise of noise level c = 0.05 , and finally 20 % of the corrupted entries are missing uniformly at random. (a): the original image; (b): the corrupted image; (c) image recovered by Algorithm 1; (d) image recovered by Algorithm 2; (e) image recovered by the matrix nuclear norm (NN)-based Model (53); (f) image recovered by the SNN-based Model (55).
Sensors 19 05335 g008
Table 1. Performance of Algorithm 1 and Algorithm 2 in both accuracy and speed for different tensor sizes when the gross corruption. Outliers from symmetric Bernoulli, observation tensor M _ R n × n × n 3 , n 3 = 30 , r tubal ( L _ 0 ) = 0.05 n , S _ 0 1 = 0.05 n 2 n 3 , noise level c = 0 , r = max 2 r tubal ( L _ 0 ) , 15 .
Table 1. Performance of Algorithm 1 and Algorithm 2 in both accuracy and speed for different tensor sizes when the gross corruption. Outliers from symmetric Bernoulli, observation tensor M _ R n × n × n 3 , n 3 = 30 , r tubal ( L _ 0 ) = 0.05 n , S _ 0 1 = 0.05 n 2 n 3 , noise level c = 0 , r = max 2 r tubal ( L _ 0 ) , 15 .
n r tubal L _ 0 S _ 0 0 Method r tubal L _ ^ L _ ^ L _ 0 F L _ 0 F S _ ^ S _ 0 F S _ 0 F time/s
1005 1 × 10 4 Algorithm 15 5.13 × 10 6 5.27 × 10 6 3.63
Algorithm 25 4.92 × 10 6 5.12 × 10 6 1.76
1608 2.56 × 10 4 Algorithm 18 3.86 × 10 6 3.52 × 10 6 9.52
Algorithm 28 4.48 × 10 6 4.08 × 10 6 4.42
20010 4 × 10 4 Algorithm 110 3.46 × 10 6 3.59 × 10 6 14.16
Algorithm 210 4.12 × 10 6 4.63 × 10 6 7.44
Table 2. Performance of Algorithm 1 and Algorithm 2 in both accuracy and speed for different tensor sizes when the gross corruption. Outliers from standard Gaussian distribution, observation tensor M _ R n × n × n 3 , n 3 = 30 , r tubal ( L _ 0 ) = 0.05 n , S _ 0 1 = 0.05 n 2 n 3 , noise level c = 0 , r = max 2 r tubal ( L _ 0 ) , 15 .
Table 2. Performance of Algorithm 1 and Algorithm 2 in both accuracy and speed for different tensor sizes when the gross corruption. Outliers from standard Gaussian distribution, observation tensor M _ R n × n × n 3 , n 3 = 30 , r tubal ( L _ 0 ) = 0.05 n , S _ 0 1 = 0.05 n 2 n 3 , noise level c = 0 , r = max 2 r tubal ( L _ 0 ) , 15 .
n r tubal L _ 0 S _ 0 0 Method r tubal L _ ^ L _ ^ L _ 0 F L _ 0 F S _ ^ S _ 0 F S _ 0 F time/s
1005 1 × 10 4 Algorithm 15 2.7 × 10 6 2.6 × 10 6 4.43
Algorithm 25 2.9 × 10 6 3.2 × 10 6 1.82
1608 2.56 × 10 4 Algorithm 18 4.76 × 10 6 4.08 × 10 6 10.45
Algorithm 28 4.24 × 10 6 4.05 × 10 6 5.15
20010 4 × 10 4 Algorithm 110 3.78 × 10 6 3.64 × 10 6 18.97
Algorithm 210 3.78 × 10 6 3.63 × 10 6 8.04
Table 3. Performance of Algorithm 1 and Algorithm 2 in both accuracy and speed for different tensor sizes when the gross corruption. Outliers from symmetric Bernoulli, observation tensor M _ R n × n × n 3 , n 3 = 30 , r tubal ( L _ 0 ) = 0.05 n , S _ 0 1 = 0.05 n 2 n 3 , noise level c = 0 , r = max 2 r tubal ( L _ 0 ) , 15 , with % 20 random missing entries.
Table 3. Performance of Algorithm 1 and Algorithm 2 in both accuracy and speed for different tensor sizes when the gross corruption. Outliers from symmetric Bernoulli, observation tensor M _ R n × n × n 3 , n 3 = 30 , r tubal ( L _ 0 ) = 0.05 n , S _ 0 1 = 0.05 n 2 n 3 , noise level c = 0 , r = max 2 r tubal ( L _ 0 ) , 15 , with % 20 random missing entries.
n r tubal L _ 0 B _ S _ 0 0 Method r tubal L _ ^ L _ ^ L _ 0 F L _ 0 F S _ ^ B _ S _ 0 F B _ S _ 0 F time/s
1005 8 × 10 3 Algorithm 15 7.52 × 10 6 5.97 × 10 6 3.87
Algorithm 25 7.50 × 10 6 5.96 × 10 6 1.69
1608 2.048 × 10 4 Algorithm 18 4.46 × 10 6 5.17 × 10 6 9.64
Algorithm 28 5.60 × 10 6 4.71 × 10 6 4.46
20010 3.2 × 10 4 Algorithm 110 4.78 × 10 6 4.04 × 10 6 14.78
Algorithm 210 5.13 × 10 6 4.20 × 10 6 7.77
Table 4. PSNR values and running time (in seconds) of different algorithms on video data. First, ρ s n 1 n 2 n 3 entries of each image is corrupted by i.i.d. symmetric Bernoulli variable, then polluted by Gaussian noise of noise level c = 0.05 , and finally ( 1 ρ obs ) n 1 n 2 n 3 of the corrupted entries are missing uniformly at random. The items with highest PSNR values are highlighted with bold face, and the items with shortest running time are highlighted with underline.
Table 4. PSNR values and running time (in seconds) of different algorithms on video data. First, ρ s n 1 n 2 n 3 entries of each image is corrupted by i.i.d. symmetric Bernoulli variable, then polluted by Gaussian noise of noise level c = 0.05 , and finally ( 1 ρ obs ) n 1 n 2 n 3 of the corrupted entries are missing uniformly at random. The items with highest PSNR values are highlighted with bold face, and the items with shortest running time are highlighted with underline.
Data Set ( ρ obs , ρ s ) IndexNN, Model (54)SNN, Model (55)Algorithm 1Algorithm 2
Akiyo(0.9,0.1)PSNR31.7432.0933.9433.36
time/s29.4851.1320.1012.39
(0.8,0.2)PSNR30.5930.7032.4432.07
time/s30.6551.1719.5314.92
Silent(0.9,0.1)PSNR28.2630.3931.7431.23
time/s28.9149.7921.2114.76
(0.8,0.2)PSNR26.9527.6030.4230.07
time/s36.5160.8122.4315.62
Carphone(0.9,0.1)PSNR26.8728.7929.1528.94
time/s28.5547.1722.1214.41
(0.8,0.2))PSNR26.1226.4328.1727.99
time/s26.7249.2120.5514.74
Claire(0.9,0.1)PSNR30.5632.2034.2734.02
time/s29.7547.3221.4313.52
(0.8,0.2)PSNR29.9430.4332.9632.78
time/s29.4350.4619.4713.04

Share and Cite

MDPI and ACS Style

Fang, W.; Wei, D.; Zhang, R. Stable Tensor Principal Component Pursuit: Error Bounds and Efficient Algorithms. Sensors 2019, 19, 5335. https://doi.org/10.3390/s19235335

AMA Style

Fang W, Wei D, Zhang R. Stable Tensor Principal Component Pursuit: Error Bounds and Efficient Algorithms. Sensors. 2019; 19(23):5335. https://doi.org/10.3390/s19235335

Chicago/Turabian Style

Fang, Wei, Dongxu Wei, and Ran Zhang. 2019. "Stable Tensor Principal Component Pursuit: Error Bounds and Efficient Algorithms" Sensors 19, no. 23: 5335. https://doi.org/10.3390/s19235335

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop