{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,11]],"date-time":"2026-01-11T14:44:54Z","timestamp":1768142694316,"version":"3.49.0"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,9,9]],"date-time":"2023-09-09T00:00:00Z","timestamp":1694217600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,9,9]],"date-time":"2023-09-09T00:00:00Z","timestamp":1694217600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2018YFB1700200"],"award-info":[{"award-number":["2018YFB1700200"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Basic Research Project of Higher Education Key Projects of China","award":["2021\/LJKZ0442"],"award-info":[{"award-number":["2021\/LJKZ0442"]}]},{"name":"2020 Liaoning Provincial Higher Education Innovative Talent Support Program, China"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SIViP"],"published-print":{"date-parts":[[2024,2]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Anomaly detection algorithms typically utilize generative models to reconstruct anomaly regions. Post-processing is used to pinpoint the anomalies. However, the paucity of real-world anomaly samples and the complex image backgrounds pose significant challenges for anomaly detection. The work innovatively proposed a self-supervised anomaly detection method. An efficient channel attention mechanism in the autoencoder was introduced to improve the reconstruction performance. Besides, a foreground enhancement strategy was designed to distinguish the foreground from the background by maximizing the inter-class variance. The strategy reduced the effect of background noises and simulated various anomalies that were rare in real samples. The MVTecAD and BTAD datasets were used to experiment with anomaly detection and location. Experimental results demonstrated that our method achieved higher AUC and AP scores at both the image level and pixel level compared to other advanced methods. In particular, the average AP score increased by 12.5% at the pixel level.<\/jats:p>","DOI":"10.1007\/s11760-023-02756-z","type":"journal-article","created":{"date-parts":[[2023,9,9]],"date-time":"2023-09-09T16:02:00Z","timestamp":1694275320000},"page":"343-350","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Self-supervised anomaly detection based on foreground enhancement and autoencoder reconstruction"],"prefix":"10.1007","volume":"18","author":[{"given":"Lijie","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Yuan","family":"Chai","sequence":"additional","affiliation":[]},{"given":"Qichun","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Hamid Reza","family":"Karimi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,9]]},"reference":[{"key":"2756_CR1","doi-asserted-by":"crossref","unstructured":"Bergmann, P., L\u00f6we, S., Fauser, M., Sattlegger, D., Steger, C.: Improving unsupervised defect segmentation by applying structural similarity to autoencoders. arXiv preprint arXiv:1807.02011 (2018)","DOI":"10.5220\/0007364500002108"},{"issue":"7","key":"2756_CR2","doi-asserted-by":"publisher","first-page":"2001","DOI":"10.1007\/s11760-022-02161-y","volume":"16","author":"S Chandrakala","year":"2022","unstructured":"Chandrakala, S., Shalmiya, P., Srinivas, V., Deepak, K.: Object-centric and memory-guided network-based normality modeling for video anomaly detection. Signal Image Video Process. 16(7), 2001\u20132007 (2022)","journal-title":"Signal Image Video Process."},{"key":"2756_CR3","doi-asserted-by":"crossref","unstructured":"Jiang, R., Xue, Y., Zou, D.: Interpretability-aware industrial anomaly detection using autoencoders. IEEE Access (2023)","DOI":"10.1109\/ACCESS.2023.3286548"},{"issue":"7","key":"2756_CR4","doi-asserted-by":"publisher","first-page":"1885","DOI":"10.1007\/s11760-022-02148-9","volume":"16","author":"X Hu","year":"2022","unstructured":"Hu, X., Lian, J., Zhang, D., Gao, X., Jiang, L., Chen, W.: Video anomaly detection based on 3d convolutional auto-encoder. Signal Image Video Process. 16(7), 1885\u20131893 (2022)","journal-title":"Signal Image Video Process."},{"issue":"13","key":"2756_CR5","doi-asserted-by":"publisher","first-page":"20197","DOI":"10.1007\/s11042-022-14306-9","volume":"82","author":"C Xu","year":"2023","unstructured":"Xu, C., Ni, D., Wang, B., Wu, M., Gan, H.: Two-stage anomaly detection for positive samples and small samples based on generative adversarial networks. Multimed. Tools Appl. 82(13), 20197\u201320214 (2023)","journal-title":"Multimed. Tools Appl."},{"issue":"7","key":"2756_CR6","doi-asserted-by":"publisher","first-page":"1747","DOI":"10.1007\/s11760-021-02131-w","volume":"16","author":"W Wang","year":"2022","unstructured":"Wang, W., Chang, F., Liu, C.: Mutuality-oriented reconstruction and prediction hybrid network for video anomaly detection. SIViP 16(7), 1747\u20131754 (2022)","journal-title":"SIViP"},{"key":"2756_CR7","unstructured":"Zenati, H., Foo, C.S., Lecouat, B., Manek, G., Chandrasekhar, V.R.: Efficient Gan-based anomaly detection. arXiv preprint arXiv:1802.06222 (2018)"},{"key":"2756_CR8","doi-asserted-by":"crossref","unstructured":"Li, X., Jing, J., Bao, J., Lu, P., Xie, Y., An, Y.: Otb-aae: Semi-supervised anomaly detection on industrial images based on adversarial autoencoder with output-turn-back structure. IEEE Trans. Instrum. Meas. (2023)","DOI":"10.1109\/TIM.2023.3280508"},{"key":"2756_CR9","unstructured":"Luo, Y., Ma, Y.: Anomaly detection for image data based on data distribution and reconstruction. Appl. Intell. 1\u201311 (2023)"},{"key":"2756_CR10","doi-asserted-by":"crossref","unstructured":"Roth, K., Pemula, L., Zepeda, J., Sch\u00f6lkopf, B., Brox, T., Gehler, P.: Towards total recall in industrial anomaly detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 14318\u201314328 (2022)","DOI":"10.1109\/CVPR52688.2022.01392"},{"key":"2756_CR11","doi-asserted-by":"crossref","unstructured":"Defard, T., Setkov, A., Loesch, A., Audigier, R.: Padim: a patch distribution modeling framework for anomaly detection and localization. In: Pattern Recognition. ICPR International Workshops and Challenges: Virtual Event, January 10\u201315, 2021, Proceedings, Part IV, pp. 475\u2013489 (2021)","DOI":"10.1007\/978-3-030-68799-1_35"},{"key":"2756_CR12","doi-asserted-by":"crossref","unstructured":"Bergmann, P., Fauser, M., Sattlegger, D., Steger, C.: Mvtec Ad\u2014a comprehensive real-world dataset for unsupervised anomaly detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 9592\u20139600 (2019)","DOI":"10.1109\/CVPR.2019.00982"},{"key":"2756_CR13","doi-asserted-by":"crossref","unstructured":"Mishra, P., Verk, R., Fornasier, D., Piciarelli, C., Foresti, G.L.: Vt-adl: a vision transformer network for image anomaly detection and localization. In: 2021 IEEE 30th International Symposium on Industrial Electronics (ISIE), pp. 01\u201306 (2021)","DOI":"10.1109\/ISIE45552.2021.9576231"},{"issue":"12","key":"2756_CR14","doi-asserted-by":"publisher","first-page":"3336","DOI":"10.3390\/s20123336","volume":"20","author":"T-W Tang","year":"2020","unstructured":"Tang, T.-W., Kuo, W.-H., Lan, J.-H., Ding, C.-F., Hsu, H., Young, H.-T.: Anomaly detection neural network with dual auto-encoders Gan and its industrial inspection applications. Sensors 20(12), 3336 (2020)","journal-title":"Sensors"},{"key":"2756_CR15","doi-asserted-by":"crossref","unstructured":"Akcay, S., Atapour-Abarghouei, A., Breckon, T.P.: Ganomaly: semi-supervised anomaly detection via adversarial training. In: Computer Vision\u2014ACCV 2018: 14th Asian Conference on Computer Vision, Perth, Australia, December 2\u20136, 2018, Revised Selected Papers, Part III 14, pp. 622\u2013637 (2019)","DOI":"10.1007\/978-3-030-20893-6_39"},{"issue":"3","key":"2756_CR16","doi-asserted-by":"publisher","first-page":"1450","DOI":"10.1109\/TASE.2018.2886031","volume":"16","author":"H Yang","year":"2019","unstructured":"Yang, H., Chen, Y., Song, K., Yin, Z.: Multiscale feature-clustering-based fully convolutional autoencoder for fast accurate visual inspection of texture surface defects. IEEE Trans. Autom. Sci. Eng. 16(3), 1450\u20131467 (2019)","journal-title":"IEEE Trans. Autom. Sci. Eng."},{"key":"2756_CR17","doi-asserted-by":"crossref","unstructured":"Schlegl, T., Seeb\u00f6ck, P., Waldstein, S.M., Schmidt-Erfurth, U., Langs, G.: Unsupervised anomaly detection with generative adversarial networks to guide marker discovery. In: Information Processing in Medical Imaging: 25th International Conference, IPMI 2017, Boone, NC, USA, June 25\u201330, 2017, Proceedings, pp. 146\u2013157 (2017)","DOI":"10.1007\/978-3-319-59050-9_12"},{"key":"2756_CR18","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.media.2019.01.010","volume":"54","author":"T Schlegl","year":"2019","unstructured":"Schlegl, T., Seeb\u00f6ck, P., Waldstein, S.M., Langs, G., Schmidt-Erfurth, U.: f-anogan: fast unsupervised anomaly detection with generative adversarial networks. Med. Image Anal. 54, 30\u201344 (2019)","journal-title":"Med. Image Anal."},{"key":"2756_CR19","doi-asserted-by":"crossref","unstructured":"Wang, Q., Wu, B., Zhu, P., Li, P., Zuo, W., Hu, Q.: Eca-net: efficient channel attention for deep convolutional neural networks. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 11534\u201311542 (2020)","DOI":"10.1109\/CVPR42600.2020.01155"},{"key":"2756_CR20","doi-asserted-by":"crossref","unstructured":"Li, C.-L., Sohn, K., Yoon, J., Pfister, T.: Cutpaste: self-supervised learning for anomaly detection and localization. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 9664\u20139674 (2021)","DOI":"10.1109\/CVPR46437.2021.00954"},{"key":"2756_CR21","doi-asserted-by":"crossref","unstructured":"Zavrtanik, V., Kristan, M., Sko\u010daj, D.: Draem\u2014a discriminatively trained reconstruction embedding for surface anomaly detection. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 8330\u20138339 (2021)","DOI":"10.1109\/ICCV48922.2021.00822"},{"key":"2756_CR22","doi-asserted-by":"crossref","unstructured":"Haselmann, M., Gruber, D.P., Tabatabai, P.: Anomaly detection using deep learning based image completion. In: 2018 17th IEEE International Conference on Machine Learning and Applications (ICMLA), pp. 1237\u20131242 (2018)","DOI":"10.1109\/ICMLA.2018.00201"},{"issue":"3","key":"2756_CR23","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1145\/325165.325247","volume":"19","author":"K Perlin","year":"1985","unstructured":"Perlin, K.: An image synthesizer. ACM Siggraph Comput. Graph. 19(3), 287\u2013296 (1985)","journal-title":"ACM Siggraph Comput. Graph."},{"key":"2756_CR24","doi-asserted-by":"crossref","unstructured":"Otsu, N.: A threshold selection method from gray-level histograms. IEEE Trans. Syst. Man Cybern. 9(1), 62\u201366 (1979)","DOI":"10.1109\/TSMC.1979.4310076"},{"key":"2756_CR25","doi-asserted-by":"crossref","unstructured":"Ronneberger, O., Fischer, P., Brox, T.: U-net: convolutional networks for biomedical image segmentation. In: Medical Image Computing and Computer-Assisted Intervention\u2013MICCAI 2015: 18th International Conference, Munich, Germany, October 5\u20139, 2015, Proceedings, Part III 18, pp. 234\u2013241 (2015)","DOI":"10.1007\/978-3-319-24574-4_28"},{"issue":"4","key":"2756_CR26","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600\u2013612 (2004)","journal-title":"IEEE Trans. Image Process."},{"key":"2756_CR27","doi-asserted-by":"crossref","unstructured":"Lin, T.-Y., Goyal, P., Girshick, R., He, K., Doll\u00e1r, P.: Focal loss for dense object detection. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 2980\u20132988 (2017)","DOI":"10.1109\/ICCV.2017.324"},{"key":"2756_CR28","unstructured":"Kingma, D.P., Ba, J.: Adam: a method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014)"},{"key":"2756_CR29","doi-asserted-by":"crossref","unstructured":"Bergmann, P., Fauser, M., Sattlegger, D., Steger, C.: Uninformed students: student-teacher anomaly detection with discriminative latent embeddings. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 4183\u20134192 (2020)","DOI":"10.1109\/CVPR42600.2020.00424"},{"key":"2756_CR30","doi-asserted-by":"crossref","unstructured":"Yi, J., Yoon, S.: Patch svdd: patch-level svdd for anomaly detection and segmentation. In: Proceedings of the Asian Conference on Computer Vision (2020)","DOI":"10.1007\/978-3-030-69544-6_23"}],"container-title":["Signal, Image and Video Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-023-02756-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11760-023-02756-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-023-02756-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,27]],"date-time":"2024-10-27T20:43:01Z","timestamp":1730061781000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11760-023-02756-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,9]]},"references-count":30,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,2]]}},"alternative-id":["2756"],"URL":"https:\/\/doi.org\/10.1007\/s11760-023-02756-z","relation":{},"ISSN":["1863-1703","1863-1711"],"issn-type":[{"value":"1863-1703","type":"print"},{"value":"1863-1711","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9,9]]},"assertion":[{"value":"17 July 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 August 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 August 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 September 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no relevant financial or non-financial interests to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"All authors agreed on the final approval of the version to be published.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}]}}