skip to main content
10.1145/3574131.3574463acmconferencesArticle/Chapter ViewAbstractPublication PagessiggraphConference Proceedingsconference-collections
research-article

Robust Anomaly Detection and Localization via Simulated Anomalies

Published:13 January 2023Publication History

ABSTRACT

Anomaly detection refers to identifying abnormal images and localizing anomalous regions. Reconstruction-based anomaly detection is a commonly used method; however, traditional reconstruction-based methods perform poorly as deep models generalize successfully enough that even anomalous regions can be well-restored. In this paper, we propose a new method to address the single pseudo-anomaly type and high false positive detection of the existing methods. Specifically, we design a novel pseudo-anomaly simulation module that can generate several types of anomalies on normal images. Furthermore, we propose an effective reconstruction network to improve the robustness of the model against distractors. Finally, we employ a segmentation network to localize anomalous regions. This simple but effective method can detect various anomalies in the real world, even those that are subtle and rare. Extensive experiments on the MVTec anomaly detection dataset demonstrate the effectiveness and superiority of the proposed method, yielding an AUROC score of 98.2% in image-level anomaly detection and 97.8% in pixel-level anomaly localization.

Skip Supplemental Material Section

Supplemental Material

References

  1. Samet Akcay, Amir Atapour-Abarghouei, and Toby P Breckon. 2018. Ganomaly: Semi-supervised anomaly detection via adversarial training. In Asian Conference on Computer Vision. Springer, Cham, 622–637.Google ScholarGoogle Scholar
  2. Samet Akçay, Amir Atapour-Abarghouei, and Toby P Breckon. 2019. Skip-ganomaly: Skip connected and adversarially trained encoder-decoder anomaly detection. In 2019 International Joint Conference on Neural Networks (IJCNN). IEEE, Piscataway, NJ, 1–8.Google ScholarGoogle ScholarCross RefCross Ref
  3. Laura Beggel, Michael Pfeiffer, and Bernd Bischl. 2019. Robust anomaly detection in images using adversarial autoencoders. In Joint European Conference on Machine Learning and Knowledge Discovery in Databases. Springer, Cham, 206–222.Google ScholarGoogle Scholar
  4. Paul Bergmann, Michael Fauser, David Sattlegger, and Carsten Steger. 2019. MVTec AD — A Comprehensive Real-World Dataset for Unsupervised Anomaly Detection. In 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR). IEEE, Piscataway, NJ, 9584–9592.Google ScholarGoogle ScholarCross RefCross Ref
  5. Paul Bergmann, Michael Fauser, David Sattlegger, and Carsten Steger. 2020. Uninformed students: Student-teacher anomaly detection with discriminative latent embeddings. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. IEEE, Piscataway, NJ, 4183–4192.Google ScholarGoogle ScholarCross RefCross Ref
  6. Paul Bergmann., Sindy Löwe., Michael Fauser., David Sattlegger., and Carsten Steger.2019. Improving Unsupervised Defect Segmentation by Applying Structural Similarity to Autoencoders. In Proceedings of the 14th International Joint Conference on Computer Vision. SciTePress, Setúbal, Portugal, 372–380.Google ScholarGoogle Scholar
  7. Mircea Cimpoi, Subhransu Maji, Iasonas Kokkinos, Sammy Mohamed, and Andrea Vedaldi. 2014. Describing Textures in the Wild. In 2014 IEEE Conference on Computer Vision and Pattern Recognition. IEEE, Piscataway, NJ, 3606–3613.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Anne-Sophie Collin and Christophe De Vleeschouwer. 2021. Improved anomaly detection by training an autoencoder with skip connections on images corrupted with stain-shaped noise. In 2020 25th International Conference on Pattern Recognition (ICPR). IEEE, Piscataway, NJ, 7915–7922.Google ScholarGoogle ScholarCross RefCross Ref
  9. Thomas Defard, Aleksandr Setkov, Angelique Loesch, and Romaric Audigier. 2021. Padim: a patch distribution modeling framework for anomaly detection and localization. In International Conference on Pattern Recognition. Springer, Cham, 475–489.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Dong Gong, Lingqiao Liu, Vuong Le, Budhaditya Saha, Moussa Reda Mansour, Svetha Venkatesh, and Anton van den Hengel. 2019. Memorizing normality to detect anomaly: Memory-augmented deep autoencoder for unsupervised anomaly detection. In Proceedings of the IEEE/CVF International Conference on Computer Vision. IEEE, Piscataway, NJ, 1705–1714.Google ScholarGoogle ScholarCross RefCross Ref
  11. Jinlei Hou, Yingying Zhang, Qiaoyong Zhong, Di Xie, Shiliang Pu, and Hong Zhou. 2021. Divide-and-assemble: Learning block-wise memory for unsupervised anomaly detection. In Proceedings of the IEEE/CVF International Conference on Computer Vision. IEEE, Piscataway, NJ, 8791–8800.Google ScholarGoogle ScholarCross RefCross Ref
  12. Chun-Liang Li, Kihyuk Sohn, Jinsung Yoon, and Tomas Pfister. 2021. CutPaste: Self-Supervised Learning for Anomaly Detection and Localization. In 2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR). IEEE, Piscataway, NJ, 9659–9669.Google ScholarGoogle Scholar
  13. Tsung-Yi Lin, Priya Goyal, Ross Girshick, Kaiming He, and Piotr Dollár. 2017. Focal loss for dense object detection. In Proceedings of the IEEE international conference on computer vision. IEEE, Piscataway, NJ, 2980–2988.Google ScholarGoogle ScholarCross RefCross Ref
  14. Wenqian Liu, Runze Li, Meng Zheng, Srikrishna Karanam, Ziyan Wu, Bir Bhanu, Richard J Radke, and Octavia Camps. 2020. Towards visually explaining variational autoencoders. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. IEEE, Piscataway, NJ, 8642–8651.Google ScholarGoogle ScholarCross RefCross Ref
  15. Hyunjong Park, Jongyoun Noh, and Bumsub Ham. 2020. Learning memory-guided normality for anomaly detection. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. IEEE, Piscataway, NJ, 14372–14381.Google ScholarGoogle ScholarCross RefCross Ref
  16. Jonathan Pirnay and Keng Chai. 2022. Inpainting transformer for anomaly detection. In International Conference on Image Analysis and Processing. Springer, Cham, 394–406.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Olaf Ronneberger, Philipp Fischer, and Thomas Brox. 2015. U-net: Convolutional networks for biomedical image segmentation. In International Conference on Medical image computing and computer-assisted intervention. Springer, Cham, 234–241.Google ScholarGoogle ScholarCross RefCross Ref
  18. Mohammad Sabokrou, Mohammad Khalooei, Mahmood Fathy, and Ehsan Adeli. 2018. Adversarially Learned One-Class Classifier for Novelty Detection. In 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition. IEEE, Piscataway, NJ, 3379–3388.Google ScholarGoogle Scholar
  19. Natasa Sarafijanovic-Djukic and Jesse Davis. 2019. Fast Distance-Based Anomaly Detection in Images Using an Inception-Like Autoencoder. In International Conference on Discovery Science. Springer, Cham, 493–508.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Thomas Schlegl, Philipp Seeböck, Sebastian M Waldstein, Ursula Schmidt-Erfurth, and Georg Langs. 2017. Unsupervised anomaly detection with generative adversarial networks to guide marker discovery. In International conference on information processing in medical imaging. Springer, Cham, 146–157.Google ScholarGoogle ScholarCross RefCross Ref
  21. Bernhard Schölkopf, John C Platt, John Shawe-Taylor, Alex J Smola, and Robert C Williamson. 2001. Estimating the support of a high-dimensional distribution. Neural computation 13, 7 (2001), 1443–1471.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Ramprasaath R Selvaraju, Michael Cogswell, Abhishek Das, Ramakrishna Vedantam, Devi Parikh, and Dhruv Batra. 2017. Grad-cam: Visual explanations from deep networks via gradient-based localization. In Proceedings of the IEEE international conference on computer vision. IEEE, Piscataway, NJ, 618–626.Google ScholarGoogle ScholarCross RefCross Ref
  23. Yong Shi, Jie Yang, and Zhiquan Qi. 2021. Unsupervised anomaly segmentation via deep feature reconstruction. Neurocomputing 424(2021), 9–22.Google ScholarGoogle ScholarCross RefCross Ref
  24. David MJ Tax and Robert PW Duin. 2004. Support vector data description. Machine learning 54, 1 (2004), 45–66.Google ScholarGoogle Scholar
  25. Guodong Wang, Shumin Han, Errui Ding, and Di Huang. 2021. Student-teacher feature pyramid matching for unsupervised anomaly detection. arXiv preprint arXiv:2103.04257(2021).Google ScholarGoogle Scholar
  26. Jihun Yi and Sungroh Yoon. 2020. Patch svdd: Patch-level svdd for anomaly detection and segmentation. In Proceedings of the Asian Conference on Computer Vision, Vol. 12627. Springer, Cham, 375–390.Google ScholarGoogle Scholar
  27. Muhammad Zaigham Zaheer, Jin-ha Lee, Marcella Astrid, and Seung-Ik Lee. 2020. Old is gold: Redefining the adversarially learned one-class classifier training paradigm. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. IEEE, Piscataway, NJ, 14183–14193.Google ScholarGoogle Scholar
  28. Vitjan Zavrtanik, Matej Kristan, and Danijel Skočaj. 2021a. Reconstruction by inpainting for visual anomaly detection. Pattern Recognition 112(2021), 107706.Google ScholarGoogle ScholarCross RefCross Ref
  29. Vitjan Zavrtanik, Matej Kristan, and Danijel Skočaj. 2021b. DRÆM – A discriminatively trained reconstruction embedding for surface anomaly detection. In 2021 IEEE/CVF International Conference on Computer Vision (ICCV). IEEE, Piscataway, NJ, 8310–8319.Google ScholarGoogle ScholarCross RefCross Ref
  30. Chong Zhou and Randy C Paffenroth. 2017. Anomaly detection with robust deep autoencoders. In Proceedings of the 23rd ACM SIGKDD international conference on knowledge discovery and data mining. ACM, New York, NY, 665–674.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Robust Anomaly Detection and Localization via Simulated Anomalies

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          VRCAI '22: Proceedings of the 18th ACM SIGGRAPH International Conference on Virtual-Reality Continuum and its Applications in Industry
          December 2022
          284 pages
          ISBN:9798400700316
          DOI:10.1145/3574131
          • Editors:
          • Enhua Wu,
          • Lionel Ming-Shuan Ni,
          • Zhigeng Pan,
          • Daniel Thalmann,
          • Ping Li,
          • Charlie C.L. Wang,
          • Lei Zhu,
          • Minghao Yang

          Copyright © 2022 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 13 January 2023

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed limited

          Acceptance Rates

          Overall Acceptance Rate51of107submissions,48%

          Upcoming Conference

          SIGGRAPH '24
        • Article Metrics

          • Downloads (Last 12 months)60
          • Downloads (Last 6 weeks)2

          Other Metrics

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format .

        View HTML Format