Computer Science ›› 2024, Vol. 51 ›› Issue (11A): 240200069-7.doi: 10.11896/jsjkx.240200069

• Image Processing & Multimedia Technology • Previous Articles     Next Articles

Asymmetric Teacher-Student Network Model for Industrial Image Anomaly Detection

KONG Senlin1, ZHANG Hui2, HUANG Zhennan3, LIU Youwu1, TAO Yan1   

  1. 1 School of Electrical & Information Engineering,Changsha University of Science and Technology,Changsha 410000,China
    2 School of Robotics,Hunan University,Changsha 410000,China
    3 Officers College of PAP,Chengdu 610213,China
  • Online:2024-11-16 Published:2024-11-13
  • About author:KONG Senlin,born in 1997,master.His main research interests include unsupervised learning and industrial image defect detection.
    ZHANG Hui,born in 1983,Ph.D,professor,Ph.D supervisor.His main research interests include image proces-sing and robot vision detection.
  • Supported by:
    Science and Technology Innovation 2030-“New Generation Artificial Intelligence” Major Project(2021ZD0114503),National Natural Science Foundation of China Major Research Program(92148204),National Natural Science Foundation of China(62027810),Leading Scientific and Technological Innovation Talents of Hunan Province(2022RC3063),Hunan Outstanding Young People Science Foundation Project(2021JJ10025),Hunan Key Research and Development Project(2021GK4011,2022GK2011),Changsha Key Science and Technology Project(KH2003026),China University Industry University Research Innovation Fund (2020HYA06006),Hunan Graduate Research Innovation Project(CX20220923) and Changsha University of Science and Technology Graduate Research Innovation Project (CXCLY20222088).

Abstract: Industrial image anomaly detection is a critical component in large-scale industrial manufacturing.Addressing challenges such as difficulty in annotating anomalous samples and obtaining prior information about anomalous regions in industrial image anomaly detection,a model based on asymmetric teacher-student networks for unsupervised image anomaly detection is proposed.Firstly,to tackle the problem of over-imitation mapping caused by high similarity in structure between teacher and student networks,an asymmetric teacher-student network is designed.Contextual Transformer modules are introduced into the residual blocks of the student network to add structural diversity to the teacher-student networks,preventing the student network from over-imitating the mapping of the teacher network.Secondly,to enhance the generalization difference between teacher and student networks,a moving average normalization layer is introduced into the teacher network to improve detection performance.Finally,a multi-scale abnormality map fusion mechanism is introduced to better detect anomalies of different sizes by fusing abnormality score maps of different scales.Experiments conducted on the MVTec AD public dataset show that the proposed method achieves an image-level AUROC of 95.7% and a pixel-level AUROC of 97.4%,verifying the feasibility and effectiveness of the approach.

Key words: Anomaly detection, Knowledge distillation, Transformer, Unsupervised learning, Multi-scale features

CLC Number: 

  • TP391
[1]PANG G,SHEN C,CAO L,et al.Deep learning for anomaly detection:a review[J].ACM computing surveys(CSUR),2021,54(2):1-38.
[2]LOWE D G.Distinctive image features from scale-invariant keypoints[J].International Journal of Computer Vision,2004,60(2):91-110.
[3]ARRIS C,STEPHENS M.A combined corner and edge detector[C]//Alvey Vision Conference.1988.
[4]WANG Z,WU F,HU Z.Msld:a robust descriptor for line matching[J].Pattern Recognition,2009,42(5):941-953.
[5]ZHANG L,KOCH R.An efficient and robust line segmentmatching approach based on lbd descriptor and pairwise geometric consistency[J].Journal of Visual Communication and Image Representation,2013,24(7):794-805.
[6]NISTÉR D,STEWÉNIUS H.Linear time maximally stable extremal regions[C]//Computer Vision-ECCV 2008:10th European Conference on Computer Vision,Marseille,France,Part II 10.Springer Berlin Heidelberg,2008:183-196.
[7]XU Y,MONASSE P,GÉRAUD T,et al.Tree-based morse regions:a topological approach to local feature detection[J].IEEE Transactions on Image Processing,2014,23(12):5612-5625.
[8]GIRSHICK R,DONAHUE J,DARRELL T,et al.Rich feature hierarchies for accurate object detection and semantic segmentation[C]//Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition.2014:580-587.
[9]CZIMMERMANN T,CIUTI G,MILAZZO M,et al.Visual-based defect detection and classification approaches for industrial applications-A survey[J].Sensors,2020,20(5):1459.
[10]REN S,HE K,GIRSHICK R,et al.Faster r-cnn:towards real-time object detection with region proposal networks[J].IEEE Transactions on Pattern Analysis & Machine Intelligence,2017,39(6):1137-1149.
[11]YANG L,ZHONG J,ZHANG Y,et al.An improving faster-rcnn with multi-attention resnet for small target detection in intelligent autonomous transport with 6g [J].IEEE Transactions on Intelligent Transportation Systems,2023,24(7):7717-7725.
[12]REDMON J,DIVVALA S,GIRSHICK R,et al.You only look once:unified,real-time object detection[C]//Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition.2016:779-788.
[13]JIANG P,ERGU D,LIU F,et al.A review of yolo algorithm developments[J].Procedia Computer Science,2022,199:1066-1073.
[14]LIU W,ANGUELOV D,ERHAN D,et al.Ssd:single shotmultibox detector[C]//Computer Vision-ECCV 2016:14th European Conference,Amsterdam,The Netherlands,Part I 14.Springer International Publishing,2016:21-37.
[15]ZHENG W,TANG W,JIANG L,et al.Se-ssd:self-ensembling single-stage object detector from point cloud[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.2021:14494-14503.
[16]SAMARIYA D,THAKKAR A.A comprehensive survey of anomaly detection algorithms[J].Annals of Data Science,2023,10(3):829-850.
[17]BERGMANN P,LWE S,FAUSER M,et al.Improving unsu-pervised defect segmentation by applying structural similarity to autoencoders[C]//14th International Conference on Computer Vision Theory and Applications.2019.
[18]POL A A,BERGER V,GERMAIN C,et al.Anomaly detection with conditional variational autoencoders[C]//2019 18th IEEE International Conference on Machine Learning And applications(ICMLA).IEEE,2019:1651-1657.
[19]SONG J,KONG K,PARK Y I,et al.AnoSeg:anomaly segmentation network using self-supervised learning [EB/OL].(2021-10-7) [2024-02-19].https://doi.org/10.48550/arXiv.2110.03396,2021.
[20]MADAN N,RISTEA N C,IONESCU R T,et al.Self-supervised masked convolutional transformer block for anomaly detection[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,2023,46(1):525-542.
[21]WAN Q,GAO L,LI X,et al.Unsupervised image anomaly detection and segmentation based on pretrained feature mapping[J].IEEE Transactions on Industrial Informatics,2022,19(3):2330-2339.
[22]COHEN N,HOSHEN Y.Sub-image anomaly detection withdeep pyramid correspondences [EB/OL].(2020-05-05)[2024-02-19].https://doi.org/10.48550/arXiv.2005.02357,2020.
[23]GUDOVSKIY D,ISHIZAKA S,KOZUKA K.Cflow-ad:real-time unsupervised anomaly detection with localization via conditional normalizing flows[C]//Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision(WACV).2022:98-107.
[24]SALEHI M,SADJADI N,BASELIZADEH S,et al.Multiresolution knowledge distillation for anomaly detection[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.2021:14902-14912.
[25]DEFARD T,SETKOV A,LOESCH A,et al.Padim:a patch distribution modeling framework for anomaly detection and localization[C]//International Conference on Pattern Recognition.Cham:Springer International Publishing,2021:475-489.
[26]HE K,ZHANG X,REN S,et al.Deep residual learning forimage recognition[C]//Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition.2016:770-778.
[27]LI Y,YAO T,PAN Y,et al.Contextual transformer networks for visual recognition[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,2022,45(2):1489-1500.
[28]CAI Z,RAVICHANDRAN A,MAJI S,et al.Exponential moving average normalization for self-supervised and semi-supervised learning[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.2021:194-203.
[29]BERGMANN P,FAUSER M,SATTLEGGER D,et al.Mvtec ad-a comprehensive real-world dataset for unsupervised anomaly detection[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.2019:9592-9600.
[1] LIU Qian, BAI Zhihao, CHENG Chunling, GUI Yaocheng. Image-Text Sentiment Classification Model Based on Multi-scale Cross-modal Feature Fusion [J]. Computer Science, 2024, 51(9): 258-264.
[2] LI Zhi, LIN Sen, ZHANG Qiang. Edge Cloud Computing Approach for Intelligent Fault Detection in Rail Transit [J]. Computer Science, 2024, 51(9): 331-337.
[3] KONG Lingchao, LIU Guozhu. Review of Outlier Detection Algorithms [J]. Computer Science, 2024, 51(8): 20-33.
[4] WEI Xiangxiang, MENG Zhaohui. Hohai Graphic Protein Data Bank and Prediction Model [J]. Computer Science, 2024, 51(8): 117-123.
[5] GUO Fangyuan, JI Genlin. Video Anomaly Detection Method Based on Dual Discriminators and Pseudo Video Generation [J]. Computer Science, 2024, 51(8): 217-223.
[6] XU Bei, LIU Tong. Semi-supervised Emotional Music Generation Method Based on Improved Gaussian Mixture Variational Autoencoders [J]. Computer Science, 2024, 51(8): 281-296.
[7] ZENG Zihui, LI Chaoyang, LIAO Qing. Multivariate Time Series Anomaly Detection Algorithm in Missing Value Scenario [J]. Computer Science, 2024, 51(7): 108-115.
[8] LEI Yongsheng, DING Meng, SHEN Yao, LI Juhao, ZHAO Dongyue, CHEN Fushi. Action Recognition Model Based on Improved Two Stream Vision Transformer [J]. Computer Science, 2024, 51(7): 229-235.
[9] FAN Yi, HU Tao, YI Peng. Host Anomaly Detection Framework Based on Multifaceted Information Fusion of SemanticFeatures for System Calls [J]. Computer Science, 2024, 51(7): 380-388.
[10] YANG Pengyue, WANG Feng, WEI Wei. ConvNeXt Feature Extraction Study for Image Data [J]. Computer Science, 2024, 51(6A): 230500196-7.
[11] WU Yibo, HAO Yingguang, WANG Hongyu. Rice Defect Segmentation Based on Dual-stream Convolutional Neural Networks [J]. Computer Science, 2024, 51(6A): 230600107-8.
[12] LI Dongyang, NIE Rencan, PAN Linna, LI He. UMGN:An Infrared and Visible Image Fusion Network Based on Unsupervised Significance MaskGuidance [J]. Computer Science, 2024, 51(6A): 230600170-5.
[13] LANG Lang, CHEN Xiaoqin, LIU Sha, ZHOU Qiang. Detection of Pitting Defects on the Surface of Ball Screw Drive Based on Improved Deeplabv3+ Algorithm [J]. Computer Science, 2024, 51(6A): 240200058-6.
[14] QIAO Hong, XING Hongjie. Attention-based Multi-scale Distillation Anomaly Detection [J]. Computer Science, 2024, 51(6A): 230300223-11.
[15] PENG Bo, LI Yaodong, GONG Xianfu. Improved K-means Photovoltaic Energy Data Cleaning Method Based on Autoencoder [J]. Computer Science, 2024, 51(6A): 230700070-5.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!