Deep Anomaly Detection via Morphological Transformations †
Abstract
:1. Introduction
- The proposed method achieves superior performance in deep anomaly detection for industrial inspection by training the deep neural network to capture salient morphological features of normal data.
- The proposed algorithm can flexibly adapt to various real-world deep anomaly detection problems by choosing the adequate morphological transformations in image processing technology.
- Because the proposed methodology utilizes self-supervised learning, it has lower computational complexity than other deep anomaly detection methods, such as reconstruction-based algorithms.
2. Proposed Method
2.1. Morphological Image Processing
2.1.1. Erosion and Dilation
2.1.2. Morphological Gradient
2.2. Deep Anomaly Detection via Morphological Transformations
3. Experimental Results
Deep Anomaly Detection on Industrial Dataset
4. Conclusions
Author Contributions
Funding
Acknowledgments
Conflicts of Interest
References
- Zhou, C.; Paffenroth, R.C. Anomaly detection with robust deep autoencoders. In Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Halifax, NS, Canada, 13–17 August 2017. [Google Scholar]
- Golan, I.; El-Yaniv, R. Deep anomaly detection using geometric transformations. In Proceedings of the 32nd Conference on Neural Information Processing Systems (NeurIPS 2018), Montréal, QC, Canada, 3–8 December 2018. [Google Scholar]
- Gong, D.; Liu, L.; Le, V.; Saha, B.; Mansour, M.R.; Venkatesh, S.; Hengel, A.V.D. Memorizing normality to detect anomaly: Memory-augmented deep autoencoder for unsupervised anomaly detection. In Proceedings of the IEEE International Conference on Computer Vision, Seoul, Korea, 27 October–2 November 2019. [Google Scholar]
- LeCun, Y.; Cortes, C.; Burges, C.J. Mnist Handwritten Digit Database; AT&T Labs: Florham Park, NJ, USA, 2010. [Google Scholar]
- Krizhevsky, A.; Hinton, G. Learning Multiple Layers of Features from Tiny Images. Master’s Thesis, Department of Computer Science, University of Toronto, Toronto, ON, Canada, 2009. [Google Scholar]
- Elson, J.; Douceur, J.R.; Howell, J.; Saul, J. Asirra: A CAPTCHA that exploits interest-aligned manual image categorization. In Proceedings of the ACM Conference on Computer and Communications Security, Alexandria, VA, USA, 29 October–2 November 2007; Volume 7. [Google Scholar]
- Bergmann, P.; Fauser, M.; Sattlegger, D.; Steger, C. MVTec AD—A Comprehensive Real-World Dataset for Unsupervised Anomaly Detection. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Long Beach, CA, USA, 15–20 June 2019. [Google Scholar]
- Gidaris, S.; Singh, P.; Komodakis, N. Unsupervised Representation Learning by Predicting Image Rotations. In Proceedings of the IEEE International Conference on Learning Representations, Vancouver, BC, Canada, 30 April–3 May 2018. [Google Scholar]
- Gonzalez, R.C.; Woods, R.E. Morphological Image Processing. In Digital Image Processing, 3rd ed.; Prentice Hall: Englewood Cliffs, NJ, USA, 2008; Chapter 9; pp. 649–710. [Google Scholar]
- He, K.; Zhang, X.; Ren, S.; Sun, J. Deep residual learning for image recognition. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Las Vegas, NV, USA, 27–30 June 2016. [Google Scholar]
- Paszke, A.; Gross, S.; Chintala, S.; Chanan, G.; Yang, E.; DeVito, Z.; Lin, Z.; Desmaison, A.; Antiga, L.; Lerer, A. Automatic differentiation in PyTorch. In Proceedings of the 31st Conference on Neural Information Processing Systems (NIPS 2017), Long Beach, CA, USA, 4–9 December 2017. [Google Scholar]
Class | Bottle | Cable | Capsule | Carpet | Grid | Hazelnut | Leather |
---|---|---|---|---|---|---|---|
[2] | 83.10 | 77.81 | 75.31 | 38.12 | 31.47 | 67.14 | 64.10 |
Our type 1 | 87.86 | 76.89 | 77.50 | 57.22 | 15.62 | 68.71 | 39.67 |
Our type 2 | 88.41 | 77.55 | 69.92 | 53.97 | 29.91 | 62.29 | 66.58 |
Our type 3 | 95.16 | 80.34 | 73.08 | 57.91 | 29.99 | 68.04 | 82.88 |
Class | Pill | Screw | Tile | Toothbrush | Transistor | Wood | Average |
[2] | 62.17 | 27.73 | 52.13 | 82.73 | 88.25 | 84.30 | 64.18 |
Our type 1 | 50.60 | 28.06 | 84.70 | 93.33 | 77.92 | 85.44 | 63.17 |
Our type 2 | 51.72 | 46.96 | 92.71 | 70.22 | 84.04 | 90.96 | 66.19 |
Our type 3 | 57.23 | 61.86 | 93.58 | 91.67 | 83.29 | 87.37 | 72.92 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Kim, T.; Choe, Y. Deep Anomaly Detection via Morphological Transformations. Proceedings 2020, 67, 21. https://doi.org/10.3390/ASEC2020-07887
Kim T, Choe Y. Deep Anomaly Detection via Morphological Transformations. Proceedings. 2020; 67(1):21. https://doi.org/10.3390/ASEC2020-07887
Chicago/Turabian StyleKim, Taehyeon, and Yoonsik Choe. 2020. "Deep Anomaly Detection via Morphological Transformations" Proceedings 67, no. 1: 21. https://doi.org/10.3390/ASEC2020-07887
APA StyleKim, T., & Choe, Y. (2020). Deep Anomaly Detection via Morphological Transformations. Proceedings, 67(1), 21. https://doi.org/10.3390/ASEC2020-07887