A Deep Metric Learning-Based Anomaly Detection System for Transparent Objects Using Polarized-Image Fusion

被引:1
|
作者
Kosuge, Atsutake [1 ]
Yu, Lixing [1 ]
Hamada, Mototsugu [1 ]
Matsuo, Kazuki [2 ]
Kuroda, Tadahiro [1 ]
机构
[1] Univ Tokyo, Grad Sch Engn, Tokyo 1138656, Japan
[2] ExFusion Inc, Osaka 541004, Japan
关键词
Neural networks; polarized image sensor; reflection; sensor fusion; visual inspection;
D O I
10.1109/OJIES.2023.3284014
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
While visual inspection systems have been widely used in many industries, their use in the food and optical equipment industries has been limited. Transparent and reflective materials are often used in these applications, but existing anomaly detection (AD) systems have low accuracy in their detection due to low visibility. Here, we developed an AD system using a polarization camera for reflective and transparent target objects. Two new techniques are developed. First is the polarized image fusion (PIF) technique which suppresses glare from reflective surfaces while highlighting transparent foreign objects. In PIF, four captured polarized images are fused to synthesize a high-quality image according to calculated weight coefficients. The second new technique is an ArcObj-based deep metric learning technique to improve AD accuracy. The proposed system was evaluated in experiments on three datasets: cookie samples wrapped in transparent plastic bags; transparent plastic bottles; and transparent lenses. High AD accuracies in terms of the area under the receiver operating characteristic curve (AUC) were achieved: 0.88 AUC for the cookie dataset; 0.87 AUC for the bottle dataset; and 0.98 AUC for the lens dataset. Compared to the state-of-the-art AD algorithm (Patchcore), the proposed method improved AD accuracy by 0.09 AUC.
引用
收藏
页码:205 / 213
页数:9
相关论文
共 50 条
  • [1] An Anomaly Detection System for Transparent Objects Using Polarized-Image Fusion Technique
    Yu, Lixing
    Kosuge, Atsutake
    Hamada, Mototsugu
    Kuroda, Tadahiro
    [J]. 2022 IEEE SENSORS APPLICATIONS SYMPOSIUM (SAS 2022), 2022,
  • [2] Distributed system anomaly detection using deep learning-based log analysis
    Han, Pengfei
    Li, Huakang
    Xue, Gang
    Zhang, Chao
    [J]. COMPUTATIONAL INTELLIGENCE, 2023, 39 (03) : 433 - 455
  • [3] SLMAD: Statistical Learning-Based Metric Anomaly Detection
    Shahid, Arsalan
    White, Gary
    Diuwe, Jaroslaw
    Agapitos, Alexandros
    O'Brien, Owen
    [J]. SERVICE-ORIENTED COMPUTING, ICSOC 2020, 2021, 12632 : 252 - 263
  • [4] Deep learning-based image forgery detection system
    Suresh, Helina Rajini
    Shanmuganathan, M.
    Senthilkumar, T.
    Vidhyasagar, B. S.
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2024, 16 (02) : 160 - 172
  • [5] Anomaly Detection using Deep Learning based Image Completion
    Haselmann, M.
    Gruber, D. P.
    Tabatabai, P.
    [J]. 2018 17TH IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA), 2018, : 1237 - 1242
  • [6] Deep Learning-based Anomaly Detection for Compressors Using Audio Data
    Mobtahej, Pooyan
    Zhang, Xulong
    Hamidi, Maryam
    Zhang, Jing
    [J]. 67TH ANNUAL RELIABILITY & MAINTAINABILITY SYMPOSIUM (RAMS 2021), 2021,
  • [7] Deep Learning-Based Digital Image Forgery Detection System
    Qazi, Emad Ul Haq
    Zia, Tanveer
    Almorjan, Abdulrazaq
    [J]. APPLIED SCIENCES-BASEL, 2022, 12 (06):
  • [8] Deep Learning-based Anomaly Detection in Radar Data with Radar-Camera Fusion
    Ning, Dian
    Han, Dong Seog
    [J]. 2023 28TH ASIA PACIFIC CONFERENCE ON COMMUNICATIONS, APCC 2023, 2023, : 107 - 112
  • [9] A survey of deep learning-based network anomaly detection
    Donghwoon Kwon
    Hyunjoo Kim
    Jinoh Kim
    Sang C. Suh
    Ikkyun Kim
    Kuinam J. Kim
    [J]. Cluster Computing, 2019, 22 : 949 - 961
  • [10] A survey of deep learning-based network anomaly detection
    Kwon, Donghwoon
    Kim, Hyunjoo
    Kim, Jinoh
    Suh, Sang C.
    Kim, Ikkyun
    Kim, Kuinam J.
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 1): : 949 - 961