Members
home
International Papers
home
๐Ÿ”Ž

[Visual Inspection AI] Anomaly Detection

Reference: Bergmann, Paul, et al. "MVTec AD--A comprehensive real-world dataset for unsupervised anomaly detection."ย Proceedings of the IEEE/CVF conference on computer vision and pattern recognition. 2019.

01 ๋ฉ˜ํ†  ์†Œ๊ฐœ

Ph.D. Course

์ •์„ฑํ›ˆ

CVSP(Computer Vision&Signal Processing Lab.)
โ€ข
๊ด€์‹ฌ๋ถ„์•ผ |
โ—ฆ
Generative AI
โ—ฆ
Video Editing
โ—ฆ
Watermarking
โ—ฆ
Gaussian Splatting
tlqwkrk915@naver.com
MS Course

์šฐ๋ฏผ์ˆ˜

CVSP(Computer Vision&Signal Processing Lab.)
โ€ข
๊ด€์‹ฌ๋ถ„์•ผ
โ—ฆ
Generative AI
โ—ฆ
multi-modality
โ—ฆ
3D/4D reconstrucion
wminsoo123@naver.com

02 ํ”„๋กœ์ ํŠธ ์†Œ๊ฐœ

2.1. Introduction

Reference: He, Haoyang, et al. "Mambaad: Exploring state space models for multi-class unsupervised anomaly detection."ย ย Conference on Neural Information Processing Systemsย (2024).
- Anomaly Detection์ด๋ž€?
Normal(์ •์ƒ) ์ƒ˜ํ”Œ๊ณผ Abnormal(๋น„์ •์ƒ, ์ด์ƒ์น˜) ์ƒ˜ํ”Œ์„ ๊ตฌ๋ณ„ํ•˜๋Š” Anomaly Detection์€ ์ œ์กฐ์—…๋ฟ๋งŒ ์•„๋‹ˆ๋ผ ํ˜„๋Œ€ ์‚ฐ์—… ์ „๋ฐ˜์—์„œ ์ค‘์š”ํ•œ ์—ญํ• ์„ ํ•˜๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. ์ด ๊ธฐ์ˆ ์€ ์ œ์กฐ์—…์—์„œ์˜ ์ œํ’ˆ ํ’ˆ์งˆ ๊ด€๋ฆฌ, CCTV๋ฅผ ํ†ตํ•œ ๋ณด์•ˆ ๊ฐ•ํ™”, ์˜๋ฃŒ ์˜์ƒ์—์„œ์˜ ์งˆ๋ณ‘ ์กฐ๊ธฐ ์ง„๋‹จ ๋“ฑ ๋‹ค์–‘ํ•œ ๋ถ„์•ผ์— ์‘์šฉ๋˜์–ด ์‹œ์Šคํ…œ์˜ ์•ˆ์ •์„ฑ ํ–ฅ์ƒ, ํšจ์œจ์„ฑ ์ฆ๋Œ€, ์œ„ํ—˜ ์š”์†Œ์˜ ์‚ฌ์ „ ์ œ๊ฑฐ ๋“ฑ ์—ฌ๋Ÿฌ ์ด์ ์„ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค.
์ž…๋ ฅ ๋ฐ์ดํ„ฐ๋ฅผ Normal ๋˜๋Š” Anomaly๋กœ ๊ตฌ๋ถ„ํ•ด์•ผ ํ•˜๊ธฐ์— One-Class Classification์ด๋ผ๊ณ ๋„ ๋ถˆ๋ฆฝ๋‹ˆ๋‹ค. ๊ทธ๋Ÿฌ๋‚˜ ์ผ๋ฐ˜์ ์ธ ๋ถ„๋ฅ˜(Classification)์™€๋Š” ๋‹ค์Œ๊ณผ ๊ฐ™์€ ์ฐจ์ด์ ์ด ์žˆ์Šต๋‹ˆ๋‹ค.
๋ถ„๋ฅ˜(Classification)๋Š” ๋‹ค์–‘ํ•œ ํด๋ž˜์Šค์˜ ๋ฐ์ดํ„ฐ๋ฅผ ํ•™์Šต ๋‹จ๊ณ„์—์„œ ์‚ฌ์šฉํ•˜๋ฉฐ, test instance์— ๋Œ€ํ•ด ํ•™์Šต ๋‹จ๊ณ„์˜ ๊ฐ ํด๋ž˜์Šค๋ณ„ ๋ถ„ํฌ ์ค‘ ์–ด๋””์— ๊ฐ€์žฅ ๊ฐ€๊นŒ์šด์ง€๋ฅผ ์ฐพ๋Š” ๋ฌธ์ œ์ž…๋‹ˆ๋‹ค. ๋ฐ˜๋ฉด์— Anomaly Detection์€ ์ž…๋ ฅ ๋ฐ์ดํ„ฐ๊ฐ€ ์ •์ƒ ๋ฐ์ดํ„ฐ์˜ ๋ถ„ํฌ ๋‚ด์— ์กด์žฌํ•˜๋Š”์ง€๋ฅผ ๊ณ ๋ คํ•œ๋‹ค๋Š” ์ ์—์„œ ๊ธฐ์กด์˜ ๋ถ„๋ฅ˜ ์ž‘์—…๊ณผ ์ฐจ์ด๋ฅผ ๋ณด์ž…๋‹ˆ๋‹ค.
๋˜ํ•œ, Anomaly Detection๋Š” ์ผ๋ฐ˜์ ์œผ๋กœ ์ด์ƒ์น˜ ๋ฐ์ดํ„ฐ์˜ ์ˆ˜๊ฐ€ ๋งค์šฐ ์ ๊ธฐ ๋•Œ๋ฌธ์— ํ•™์Šต ๋‹จ๊ณ„์—์„œ ์ •์ƒ ๋ฐ์ดํ„ฐ๋งŒ์„ ์‚ฌ์šฉํ•˜์—ฌ ์ •์ƒ ๋ฐ์ดํ„ฐ์˜ ๋ถ„ํฌ๋ฅผ ํ•™์Šตํ•˜๊ณ , ํ•™์Šต ์ดํ›„ ์ž…๋ ฅ ๋ฐ์ดํ„ฐ๊ฐ€ ์ •์ƒ ๋ฐ์ดํ„ฐ ๋ถ„ํฌ์™€ ์–ผ๋งˆ๋‚˜ ๋ฉ€๋ฆฌ ๋–จ์–ด์ ธ ์žˆ๋Š”์ง€๋ฅผ ๊ณ„์‚ฐํ•ฉ๋‹ˆ๋‹ค.

2.2. Trends

Reference: Nguyen, Huy Hoang, et al. "Variational Autoencoder for Anomaly Detection: A Comparative Study."ย arXiv preprint arXiv:2408.13561ย (2024).
์ตœ๊ทผ ์ด์ƒ์น˜ ํƒ์ง€ ์—ฐ๊ตฌ์—์„œ๋Š” ์ฃผ๋กœ Reconstruction-based anomaly detection์— ์ดˆ์ ์„ ๋งž์ถ”๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. ์ด ๋ฐฉ๋ฒ•์€ ์ž…๋ ฅ ์ด๋ฏธ์ง€๋ฅผ ๋„คํŠธ์›Œํฌ์— ํ†ต๊ณผ์‹œ์ผœ ์ •์ƒ ๋ฐ์ดํ„ฐ์˜ ๋ถ„ํฌ๋ฅผ ํ•™์Šตํ•ฉ๋‹ˆ๋‹ค. ์ด๋ ‡๊ฒŒ ํ•™์Šต๋œ ๋ชจ๋ธ์€ ์ •์ƒ ๋ฐ์ดํ„ฐ ๋ถ„ํฌ์—์„œ ๋ฉ€๋ฆฌ ๋–จ์–ด์ง„ ๋ฐ์ดํ„ฐ๋Š” ์žฌ๊ตฌ์„ฑ ๋Šฅ๋ ฅ์ด ๋‚ฎ์„ ๊ฒƒ์ด๋ผ๋Š” ๊ฐ€์ •ํ•˜์—, ์žฌ๊ตฌ์„ฑ ์˜ค๋ฅ˜๊ฐ€ ํฐ ์ƒ˜ํ”Œ์„ ์ด์ƒ์น˜๋กœ ํŒ๋ณ„ํ•ฉ๋‹ˆ๋‹ค.
๊ทธ๋Ÿฌ๋‚˜ Reconstruction-based anomaly detection๋Š” ์ •์ƒ ์ƒ˜ํ”Œ๊ณผ ๋น„์ •์ƒ ์ƒ˜ํ”Œ ๋ชจ๋‘๋ฅผ ์ž˜ ๋ณต์›ํ•˜๋Š” 'Identical Shortcut' ๋ฌธ์ œ๋ฅผ ๊ฒช์Šต๋‹ˆ๋‹ค. ์ด๋ฅผ ํ•ด๊ฒฐํ•˜๊ธฐ ์œ„ํ•ด ๋‹ค์–‘ํ•œ ๋ณต์› ๋„คํŠธ์›Œํฌ๋ฅผ ํ™œ์šฉํ•˜์—ฌ ์ด ๋ฌธ์ œ๋ฅผ ๊ทน๋ณตํ•˜๋Š” ์—ฐ๊ตฌ๊ฐ€ ์ตœ๊ทผ ์ง„ํ–‰๋˜๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค.

03 ์ผ์ • ์†Œ๊ฐœ

3.1. AI ๊ธฐ์ดˆ

AI, Deep Learning์— ๋Œ€ํ•ด ์ž˜ ์•Œ๊ณ  ์žˆ๋Š” ์‚ฌ๋žŒ๋„ ์žˆ๊ฒ ์ง€๋งŒ, ์ฒ˜์Œ ์ ‘ํ•˜๋Š” ์‚ฌ๋žŒ๋„ ์žˆ์„ ๊ฒƒ์ž…๋‹ˆ๋‹ค.
์ด๋ฒˆ ๊ฒจ์šธ๋ฐฉํ•™์—๋Š” AI ๊ธฐ์ดˆ๋ถ€ํ„ฐ ์‹œ์ž‘ํ•ด ๋ชจ๋“  ํ•™์šฐ๊ฐ€ ํ•จ๊ป˜ ๋ฐฐ์šธ ์ˆ˜ ์žˆ๋Š” ์‹œ๊ฐ„์„ ๊ฐ€์งˆ ์˜ˆ์ •์ž…๋‹ˆ๋‹ค.
๊ธฐ์ดˆ ์ด๋ก ์„ ํƒ„ํƒ„ํžˆ ๋‹ค์ง€๋Š” ๊ฒƒ๋ถ€ํ„ฐ ์‹œ์ž‘ํ•ด MLP, CNN, Transformer ๊ตฌ์กฐ์™€ ์—ฌ๋Ÿฌ ๋น„์ „ Task, Multi-modal ๊ด€๋ จ ๋‚ด์šฉ์„ ๋ฐฐ์šฐ๋ฉฐ, ์ด๋ฅผ ์ฝ”๋”ฉ ์‹ค์Šต๊ณผ ์—ฐ๊ณ„ํ•˜์—ฌ ํ•™์Šตํ•ฉ๋‹ˆ๋‹ค. ์ฐจ๊ทผ์ฐจ๊ทผ ์ง„ํ–‰ํ•˜์—ฌ ์‹ค์ œ ํ”„๋กœ์ ํŠธ๋ฅผ ํ•ด๊ฒฐํ•  ์ˆ˜ ์žˆ๋Š” ๋Šฅ๋ ฅ์„ ๋ฐฐ์–‘ํ•˜๋Š” ๊ฒƒ์„ ๋ชฉํ‘œ๋กœ ํ•ฉ๋‹ˆ๋‹ค

3.2. Anomaly Detecetion ๊ธฐ์ดˆ

AI์™€ ๋”ฅ๋Ÿฌ๋‹์˜ ๊ธฐ์ดˆ๋ฅผ ํ•™์Šตํ•œ ํ›„, ์ด์ œ ๋ณธ๊ฒฉ์ ์œผ๋กœ Anomaly Detection์— ๋Œ€ํ•ด ๊นŠ์ด ์žˆ๊ฒŒ ๊ณต๋ถ€ํ•ด๋ณด๊ณ ์ž ํ•ฉ๋‹ˆ๋‹ค. ์ด ๋ถ„์•ผ์—์„œ ํฐ ์˜ํ–ฅ์„ ๋ฏธ์นœ ์ฃผ์š” ๋…ผ๋ฌธ๋“ค์„ ๊ธฐ๋ฐ˜์œผ๋กœ Flipped Learning์„ ์ง„ํ–‰ํ•  ๊ณ„ํš์ž…๋‹ˆ๋‹ค. ์ด๋ฅผ ํ†ตํ•ด ๊ธฐ์กด ์—ฐ๊ตฌ ๋™ํ–ฅ๊ณผ ํ•ต์‹ฌ ๊ฐœ๋…์„ ์ง์ ‘ ํƒ๊ตฌํ•˜๊ณ  ์ดํ•ดํ•  ์ˆ˜ ์žˆ์„ ๊ฒƒ์ž…๋‹ˆ๋‹ค.
๋˜ํ•œ, ํ•ด๋‹น ๋…ผ๋ฌธ์˜ ์ฝ”๋“œ๋ฅผ ๋ฐ”ํƒ•์œผ๋กœ ์‹คํ—˜์„ ์ˆ˜ํ–‰ํ•˜์—ฌ ๊ธฐ์ดˆ ์ฝ”๋”ฉ์ด ์•„๋‹Œ ์‹ค์ œ ์—ฐ๊ตฌ ์ˆ˜์ค€์˜ ์ฝ”๋”ฉ์„ ๊ฒฝํ—˜ํ•˜๊ณ ์ž ํ•ฉ๋‹ˆ๋‹ค. ์ฝ”๋“œ๋ฅผ ๊ตฌํ˜„ํ•˜๊ณ  ๊ฒฐ๊ณผ๋ฅผ ๋ถ„์„ํ•จ์œผ๋กœ์จ ์•Œ๊ณ ๋ฆฌ์ฆ˜์˜ ์ž‘๋™ ์›๋ฆฌ๋ฅผ ๋” ์ž˜ ํŒŒ์•…ํ•  ์ˆ˜ ์žˆ์„ ๊ฒƒ์ž…๋‹ˆ๋‹ค. ์ด๋ฅผ ํ†ตํ•ด ์ด๋ก ๊ณผ ์‹ค์Šต์„ ๋ณ‘ํ–‰ํ•˜์—ฌ ๊นŠ์ด ์žˆ๋Š” ์ดํ•ด๋ฅผ ๋„๋ชจํ•˜๊ณ , ์‹ค์ œ ๋ฌธ์ œ ํ•ด๊ฒฐ ๋Šฅ๋ ฅ์„ ํ–ฅ์ƒ์‹œํ‚ฌ ์ˆ˜ ์žˆ์„ ๊ฒƒ์œผ๋กœ ๊ธฐ๋Œ€ํ•ฉ๋‹ˆ๋‹ค.

3.3. Anomaly Detecetion ์‹ฌํ™”

๊ธฐ์ดˆ๋ฅผ ๋‹ค์ง„ ํ›„์—๋Š” Anomaly Detection์˜ ์ตœ์‹  ์—ฐ๊ตฌ๋“ค์„ ์‚ดํŽด๋ณด๊ณ , ์—ฐ๊ตฌ๊ฐ€ ์–ด๋–ค ๋ฐฉํ–ฅ์œผ๋กœ ์ง„ํ–‰๋˜๊ณ  ์žˆ๋Š”์ง€ ํ•จ๊ป˜ ์•Œ์•„๋ณด๊ณ ์ž ํ•ฉ๋‹ˆ๋‹ค. ๋™์‹œ์— Anomaly Detection์ด ์‹ค์ œ ์‚ฐ์—…์—์„œ ์–ด๋–ป๊ฒŒ ํ™œ์šฉ๋˜๊ณ  ์žˆ๋Š”์ง€๋„ ํƒ์ƒ‰ํ•˜์—ฌ ์ด๋ก ๊ณผ ์‹ค๋ฌด์˜ ์—ฐ๊ฒฐ์„ฑ์„ ๊ฐ•ํ™”ํ•˜๊ณ ์ž ํ•ฉ๋‹ˆ๋‹ค. ์ด๋ฅผ ํ†ตํ•ด ํ•™์ƒ๋“ค์ด ์ดํ›„ ์ง„๋กœ๋ฅผ ์„ ํƒํ•  ๋•Œ ์‹ค์งˆ์ ์ธ ๋„์›€์„ ์ฃผ๊ณ , ํ•ด๋‹น ๋ถ„์•ผ์—์„œ์˜ ์ „๋ฌธ์„ฑ์„ ๋†’์ผ ์ˆ˜ ์žˆ์„ ๊ฒƒ์œผ๋กœ ๊ธฐ๋Œ€ํ•ฉ๋‹ˆ๋‹ค.

04 Objective

โ€ข
๋ชจ๋ธ ์„ฑ๋Šฅ ํ…Œ์ŠคํŠธ ๊ฒฐ๊ณผ๋ฅผ ์ •๋ฆฌํ•˜์—ฌ ๋Œ€ํ•œ์ „์ž๊ณตํ•™ํšŒ ์ถ”๊ณ„ํ•™์ˆ ๋Œ€ํšŒ ๋“ฑ ๊ตญ๋‚ดํ•™ํšŒ ๋…ผ๋ฌธ ์ œ์ถœ

05 ์ด๋Ÿฐ Fellow๋ฅผ ์ฐพ์•„์š”!

โ€ข
Computer Vision ๋ถ„์•ผ์— ๊ด€์‹ฌ์žˆ๋Š” ๋ถ„
โ€ข
1ํ•™๊ธฐ, 2ํ•™๊ธฐ ๋ชจ๋‘ ์ฐธ์—ฌ๊ฐ€ ๊ฐ€๋Šฅํ•˜์‹  ๋ถ„
โ€ข
๋”ฅ๋Ÿฌ๋‹์— ๋Œ€ํ•ด ๊ด€์‹ฌ์ด ์žˆ์œผ์‹  ๋ถ„
โ€ข
Pythod ์ฝ”๋”ฉ์— ๊ฑฐ๋ถ€๊ฐ์ด ์—†์œผ์‹  ๋ถ„
โ€ข
๋๊นŒ์ง€ ๋ˆ๊ธฐ ์žˆ๊ฒŒ ์—ฐ๊ตฌํ•˜์‹ค ๋ถ„