SlideShare a Scribd company logo
1 of 12
Two Realizations of Probability
Anomaly Detector with Different
Vector Quantization Algorithms
Anna Denisova
Samara State Aerospace University
1
Anomaly detection for hyperspectral images
Anomaly is a small partition of data with some characteristics significantly
different from background.
Hyperspectral image Anomaly detection method
Anomaly
measure image
1. High dimension
2. Physical meaning of
image pixels
1. No prior information
about target objects
2. Background model
3. Anomaly measure
Post processing
2
Anomaly detection methods classification
Gaussian Mixture
(GMM-GLRT, Cluster
based anomaly detector)
Linear spectral
mixture (OSP and
SSP Detectors)
Local normal
model (RXD)
Non parametric
background model
(Kernel RX-Detector)
Local normal model
in feature space
(SVDD)
Probability anomaly detector (PAD)
Input image
1. Vector quantization
2. Calculating histogram
using hash function
3. Calculating probabilities
4. Aggregation
Output image
Thresholding
Anomaly value:
 
 
 i
nnIi
qPAggregatennP
21,
21 1,


 
 
.)(
,
,
,,
,
21
21
pixelquantizedofyprobabilitqP
functionnaggregatioAggregate
windownaggregatioinpixeliforvaluequantizedq
nnpositionwithwindownaggregatiofor
scoordinateofsetnnIwhere
i
th
i



3
PAD with uniform quantization (PAD UQ)
PAD UQ:
Uniform quantizing with K levels for each image component l.
Integer hash functions:
• modulo hashing
•multiplicative modulo hashing
•Hash functions for strings (Horner algorithm)
 
  
  








Kxx
xnnx
nnq
ll
ll
l
minmax
min21
21
,
,
MKqqf i
n
i
i mod)(
1
0




MKqqf i
n
i
i mod)(
1
0




4
PAD with agglomerative clusterzation
PAD AC:
New vector quantization algorithm based on agglomerative clusterization.
Properties:
1. Quantization values are the centers of clusters.
2. Number of clusters M is fixed.
3. Cluster size threshold – ε
4. Output – a codebook Q of size M.
M, ε,    0,0, 11
xxxQ сс 
   mсxnnxd ,, 21
true false
MQ •Include x in Cm
•Recalculate xCm
•Increase ε
•Merge clusters
with d<ε
•Add new cluster with center in x
5
Experimental research
6
Source image Embedding mask Image with anomalies
AVIRIS,
224 spectral
bands,
145x145
AVIRIS,
360 spectral
bands,
145x145
Images with anomalies Embedding mask
Synthetic
hyperspectral
images,
99 spectral bands,
128x128
Experimental research of PAD UQ
K Biexponential ACF Gauss ACF
TP FP TP FP
2 1 0.098 1 0.104
3 1 0.378 1 0.387
4 1 0.471 1 0.504
Hash function K=2
TP FP
Modulo hash 1 0.10119
Multiplicative modulo hash 0.8 0.00005
Horner algorithm 1 0.10630
7
highmiddlelow
Correlationlevel
Biexponential ACF Gauss ACF
Experimental research of PAD AC
8
0
0.0005
0.001
0.0015
0.002
0.0025
0.01 0.02 0.03 0.04 0.05
FP
ε
M=10
M=20
M=30
М=40
M=50 0
0.0005
0.001
0.0015
0.002
0.0025
0.01 0.02 0.03 0.04 0.05
FP
ε
M=10
M=20
M=30
M=40
M=50
Biexponential ACF Gauss ACF
highmiddlelow
Correlationlevel
highmiddlelow
Experimental research of aggregation and noise
9
0
0.2
0.4
0.6
0.8
1
1.2
3×3, TP 3×3, FP 5×5, TP 5×5, FP 7×7, TP 7×7, FP
Probabilityvalue(TPorFP)
Anomaly size, Probability type (TP or FP)
PAD UQ
Minimum Median Sigma filtr
0
0.2
0.4
0.6
0.8
1
1.2
3×3, TP 3×3, FP 5×5, TP 5×5, FP 7×7, TP 7×7, FP
Probabilityvalue(TPorFP)
Anomaly size, Probability type (TP or FP)
PAD AC
without aggregation minimum median
0
0.2
0.4
0.6
0.8
1
1.2
3×3,
TP
3×3,
FP
5×5,
TP
5×5,
FP
7×7,
TP
7×7,
FP
Probabilityvalue(TPorFP)
Anomaly size, Probability type (TP or FP)
PAD AC for noised images
∞
250
150
15
Experimental research on real images
10
Input image №1 PAD AC (M=15, EPS=1) RXD
Not detected signature (red on the left chart),
detected signature (red on the right chart)
and background signature (green)
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
Threshold
PAD AC (M=15,
EPSILON=1), TP
RXD, TP
PAD AC (M=15,
EPSILON=1), FP
RXD, FP
Experimental research on real images
11
Input image №2 PAD AC (M=90, EPS=1) RXD
Region 2 (Yellow), Region 1 (Green), Background (Red)
1
2
0
0.2
0.4
0.6
0.8
1
1.2
Threshold
PAD AC (M=90,
EPSILON=1), TP
RXD, TP
PAD AC (M=90,
EPSILON=1), FP
RXD, FP
Conclusion
Proposed two realizations of PAD anomaly detection algorithm
PAD UQ and PAD AC:
• PAD UQ inefficient in presence of noise and highly depends on
correlation properties of background.
• Further development of PAD AC consists in production
modifications with PCA.
• PAD AC noise resistant and fewer dependant from image
correlation.
• PAD AC requires automatic procedure of initial error and
codebook size estimation to be applied on real images.
Questions?
12

More Related Content

Viewers also liked

Learning Vector Quantization LVQ
Learning Vector Quantization LVQLearning Vector Quantization LVQ
Learning Vector Quantization LVQESCOM
 
1.3 scalar & vector quantities
1.3 scalar & vector quantities1.3 scalar & vector quantities
1.3 scalar & vector quantitiescgharyati
 
Learning Vector Quantization LVQ
Learning Vector Quantization LVQLearning Vector Quantization LVQ
Learning Vector Quantization LVQESCOM
 
Text Prompted Remote Speaker Authentication : Joint Speech and Speaker Recogn...
Text Prompted Remote Speaker Authentication : Joint Speech and Speaker Recogn...Text Prompted Remote Speaker Authentication : Joint Speech and Speaker Recogn...
Text Prompted Remote Speaker Authentication : Joint Speech and Speaker Recogn...gt_ebuddy
 

Viewers also liked (6)

Learning Vector Quantization LVQ
Learning Vector Quantization LVQLearning Vector Quantization LVQ
Learning Vector Quantization LVQ
 
1.3 scalar & vector quantities
1.3 scalar & vector quantities1.3 scalar & vector quantities
1.3 scalar & vector quantities
 
Learning Vector Quantization LVQ
Learning Vector Quantization LVQLearning Vector Quantization LVQ
Learning Vector Quantization LVQ
 
Text Prompted Remote Speaker Authentication : Joint Speech and Speaker Recogn...
Text Prompted Remote Speaker Authentication : Joint Speech and Speaker Recogn...Text Prompted Remote Speaker Authentication : Joint Speech and Speaker Recogn...
Text Prompted Remote Speaker Authentication : Joint Speech and Speaker Recogn...
 
Vector quantization
Vector quantizationVector quantization
Vector quantization
 
Chapter 1(4)SCALAR AND VECTOR
Chapter 1(4)SCALAR AND VECTORChapter 1(4)SCALAR AND VECTOR
Chapter 1(4)SCALAR AND VECTOR
 

Similar to Anna Denisova - Two Realizations of Probability Anomaly Detector with Different Vector Quantization Algorithms

Vladimir Milov and Andrey Savchenko - Classification of Dangerous Situations...
Vladimir Milov and  Andrey Savchenko - Classification of Dangerous Situations...Vladimir Milov and  Andrey Savchenko - Classification of Dangerous Situations...
Vladimir Milov and Andrey Savchenko - Classification of Dangerous Situations...AIST
 
Bayesian modelling and computation for Raman spectroscopy
Bayesian modelling and computation for Raman spectroscopyBayesian modelling and computation for Raman spectroscopy
Bayesian modelling and computation for Raman spectroscopyMatt Moores
 
ESAI-CEU-UCH solution for American Epilepsy Society Seizure Prediction Challenge
ESAI-CEU-UCH solution for American Epilepsy Society Seizure Prediction ChallengeESAI-CEU-UCH solution for American Epilepsy Society Seizure Prediction Challenge
ESAI-CEU-UCH solution for American Epilepsy Society Seizure Prediction ChallengeFrancisco Zamora-Martinez
 
A walk through the intersection between machine learning and mechanistic mode...
A walk through the intersection between machine learning and mechanistic mode...A walk through the intersection between machine learning and mechanistic mode...
A walk through the intersection between machine learning and mechanistic mode...JuanPabloCarbajal3
 
Single Electron Spin Detection Slides For Uno Interview
Single Electron Spin Detection Slides For Uno InterviewSingle Electron Spin Detection Slides For Uno Interview
Single Electron Spin Detection Slides For Uno Interviewchenhm
 
Decomposition and Denoising for moment sequences using convex optimization
Decomposition and Denoising for moment sequences using convex optimizationDecomposition and Denoising for moment sequences using convex optimization
Decomposition and Denoising for moment sequences using convex optimizationBadri Narayan Bhaskar
 
Poster Presentation on "Artifact Characterization and Removal for In-Vivo Neu...
Poster Presentation on "Artifact Characterization and Removal for In-Vivo Neu...Poster Presentation on "Artifact Characterization and Removal for In-Vivo Neu...
Poster Presentation on "Artifact Characterization and Removal for In-Vivo Neu...Md Kafiul Islam
 
Streaming multiscale anomaly detection
Streaming multiscale anomaly detectionStreaming multiscale anomaly detection
Streaming multiscale anomaly detectionRavi Kiran B.
 
Ml srhwt-machine-learning-based-superlative-rapid-haar-wavelet-transformation...
Ml srhwt-machine-learning-based-superlative-rapid-haar-wavelet-transformation...Ml srhwt-machine-learning-based-superlative-rapid-haar-wavelet-transformation...
Ml srhwt-machine-learning-based-superlative-rapid-haar-wavelet-transformation...Jumlesha Shaik
 
FPGA Implementation of a GA
FPGA Implementation of a GAFPGA Implementation of a GA
FPGA Implementation of a GAHocine Merabti
 
Anomaly detection using deep one class classifier
Anomaly detection using deep one class classifierAnomaly detection using deep one class classifier
Anomaly detection using deep one class classifier홍배 김
 
Presentacion limac-unc
Presentacion limac-uncPresentacion limac-unc
Presentacion limac-uncPucheta Julian
 
sasirekha_spectrum_sensing.ppt
sasirekha_spectrum_sensing.pptsasirekha_spectrum_sensing.ppt
sasirekha_spectrum_sensing.pptChaeriahWael2
 
Vu_HPSC2012_02.pptx
Vu_HPSC2012_02.pptxVu_HPSC2012_02.pptx
Vu_HPSC2012_02.pptxQucngV
 
Data Driven Choice of Threshold in Cepstrum Based Spectrum Estimate
Data Driven Choice of Threshold in Cepstrum Based Spectrum EstimateData Driven Choice of Threshold in Cepstrum Based Spectrum Estimate
Data Driven Choice of Threshold in Cepstrum Based Spectrum Estimatesipij
 
Diagnosis of Faulty Sensors in Antenna Array using Hybrid Differential Evolut...
Diagnosis of Faulty Sensors in Antenna Array using Hybrid Differential Evolut...Diagnosis of Faulty Sensors in Antenna Array using Hybrid Differential Evolut...
Diagnosis of Faulty Sensors in Antenna Array using Hybrid Differential Evolut...IJECEIAES
 
PIMRC 2016 Presentation
PIMRC 2016 PresentationPIMRC 2016 Presentation
PIMRC 2016 PresentationMohamed Seif
 

Similar to Anna Denisova - Two Realizations of Probability Anomaly Detector with Different Vector Quantization Algorithms (20)

Vladimir Milov and Andrey Savchenko - Classification of Dangerous Situations...
Vladimir Milov and  Andrey Savchenko - Classification of Dangerous Situations...Vladimir Milov and  Andrey Savchenko - Classification of Dangerous Situations...
Vladimir Milov and Andrey Savchenko - Classification of Dangerous Situations...
 
Bayesian modelling and computation for Raman spectroscopy
Bayesian modelling and computation for Raman spectroscopyBayesian modelling and computation for Raman spectroscopy
Bayesian modelling and computation for Raman spectroscopy
 
spie_poster_v4
spie_poster_v4spie_poster_v4
spie_poster_v4
 
ESAI-CEU-UCH solution for American Epilepsy Society Seizure Prediction Challenge
ESAI-CEU-UCH solution for American Epilepsy Society Seizure Prediction ChallengeESAI-CEU-UCH solution for American Epilepsy Society Seizure Prediction Challenge
ESAI-CEU-UCH solution for American Epilepsy Society Seizure Prediction Challenge
 
A walk through the intersection between machine learning and mechanistic mode...
A walk through the intersection between machine learning and mechanistic mode...A walk through the intersection between machine learning and mechanistic mode...
A walk through the intersection between machine learning and mechanistic mode...
 
Single Electron Spin Detection Slides For Uno Interview
Single Electron Spin Detection Slides For Uno InterviewSingle Electron Spin Detection Slides For Uno Interview
Single Electron Spin Detection Slides For Uno Interview
 
Decomposition and Denoising for moment sequences using convex optimization
Decomposition and Denoising for moment sequences using convex optimizationDecomposition and Denoising for moment sequences using convex optimization
Decomposition and Denoising for moment sequences using convex optimization
 
Poster Presentation on "Artifact Characterization and Removal for In-Vivo Neu...
Poster Presentation on "Artifact Characterization and Removal for In-Vivo Neu...Poster Presentation on "Artifact Characterization and Removal for In-Vivo Neu...
Poster Presentation on "Artifact Characterization and Removal for In-Vivo Neu...
 
Streaming multiscale anomaly detection
Streaming multiscale anomaly detectionStreaming multiscale anomaly detection
Streaming multiscale anomaly detection
 
Ml srhwt-machine-learning-based-superlative-rapid-haar-wavelet-transformation...
Ml srhwt-machine-learning-based-superlative-rapid-haar-wavelet-transformation...Ml srhwt-machine-learning-based-superlative-rapid-haar-wavelet-transformation...
Ml srhwt-machine-learning-based-superlative-rapid-haar-wavelet-transformation...
 
FPGA Implementation of a GA
FPGA Implementation of a GAFPGA Implementation of a GA
FPGA Implementation of a GA
 
Anomaly detection using deep one class classifier
Anomaly detection using deep one class classifierAnomaly detection using deep one class classifier
Anomaly detection using deep one class classifier
 
Presentacion limac-unc
Presentacion limac-uncPresentacion limac-unc
Presentacion limac-unc
 
sasirekha_spectrum_sensing.ppt
sasirekha_spectrum_sensing.pptsasirekha_spectrum_sensing.ppt
sasirekha_spectrum_sensing.ppt
 
Vu_HPSC2012_02.pptx
Vu_HPSC2012_02.pptxVu_HPSC2012_02.pptx
Vu_HPSC2012_02.pptx
 
xldb-2015
xldb-2015xldb-2015
xldb-2015
 
Data Driven Choice of Threshold in Cepstrum Based Spectrum Estimate
Data Driven Choice of Threshold in Cepstrum Based Spectrum EstimateData Driven Choice of Threshold in Cepstrum Based Spectrum Estimate
Data Driven Choice of Threshold in Cepstrum Based Spectrum Estimate
 
Diagnosis of Faulty Sensors in Antenna Array using Hybrid Differential Evolut...
Diagnosis of Faulty Sensors in Antenna Array using Hybrid Differential Evolut...Diagnosis of Faulty Sensors in Antenna Array using Hybrid Differential Evolut...
Diagnosis of Faulty Sensors in Antenna Array using Hybrid Differential Evolut...
 
Lecture 3 sapienza 2017
Lecture 3 sapienza 2017Lecture 3 sapienza 2017
Lecture 3 sapienza 2017
 
PIMRC 2016 Presentation
PIMRC 2016 PresentationPIMRC 2016 Presentation
PIMRC 2016 Presentation
 

More from AIST

Alexey Mikhaylichenko - Automatic Detection of Bone Contours in X-Ray Images
Alexey Mikhaylichenko - Automatic Detection of Bone Contours in X-Ray  ImagesAlexey Mikhaylichenko - Automatic Detection of Bone Contours in X-Ray  Images
Alexey Mikhaylichenko - Automatic Detection of Bone Contours in X-Ray ImagesAIST
 
Алена Ильина и Иван Бибилов, GoTo - GoTo школы, конкурсы и хакатоны
Алена Ильина и Иван Бибилов, GoTo - GoTo школы, конкурсы и хакатоныАлена Ильина и Иван Бибилов, GoTo - GoTo школы, конкурсы и хакатоны
Алена Ильина и Иван Бибилов, GoTo - GoTo школы, конкурсы и хакатоныAIST
 
Станислав Кралин, Сайтсофт - Связанные открытые данные федеральных органов ис...
Станислав Кралин, Сайтсофт - Связанные открытые данные федеральных органов ис...Станислав Кралин, Сайтсофт - Связанные открытые данные федеральных органов ис...
Станислав Кралин, Сайтсофт - Связанные открытые данные федеральных органов ис...AIST
 
Павел Браславский,Velpas - Velpas: мобильный визуальный поиск
Павел Браславский,Velpas - Velpas: мобильный визуальный поискПавел Браславский,Velpas - Velpas: мобильный визуальный поиск
Павел Браславский,Velpas - Velpas: мобильный визуальный поискAIST
 
Евгений Цымбалов, Webgames - Методы машинного обучения для задач игровой анал...
Евгений Цымбалов, Webgames - Методы машинного обучения для задач игровой анал...Евгений Цымбалов, Webgames - Методы машинного обучения для задач игровой анал...
Евгений Цымбалов, Webgames - Методы машинного обучения для задач игровой анал...AIST
 
Александр Москвичев, EveResearch - Алгоритмы анализа данных в маркетинговых и...
Александр Москвичев, EveResearch - Алгоритмы анализа данных в маркетинговых и...Александр Москвичев, EveResearch - Алгоритмы анализа данных в маркетинговых и...
Александр Москвичев, EveResearch - Алгоритмы анализа данных в маркетинговых и...AIST
 
Петр Ермаков, HeadHunter - Модерация резюме: от людей к роботам. Машинное обу...
Петр Ермаков, HeadHunter - Модерация резюме: от людей к роботам. Машинное обу...Петр Ермаков, HeadHunter - Модерация резюме: от людей к роботам. Машинное обу...
Петр Ермаков, HeadHunter - Модерация резюме: от людей к роботам. Машинное обу...AIST
 
Иосиф Иткин, Exactpro - TBA
Иосиф Иткин, Exactpro - TBAИосиф Иткин, Exactpro - TBA
Иосиф Иткин, Exactpro - TBAAIST
 
Nikolay Karpov - Evolvable Semantic Platform for Facilitating Knowledge Exchange
Nikolay Karpov - Evolvable Semantic Platform for Facilitating Knowledge ExchangeNikolay Karpov - Evolvable Semantic Platform for Facilitating Knowledge Exchange
Nikolay Karpov - Evolvable Semantic Platform for Facilitating Knowledge ExchangeAIST
 
George Moiseev - Classification of E-commerce Websites by Product Categories
George Moiseev - Classification of E-commerce Websites by Product CategoriesGeorge Moiseev - Classification of E-commerce Websites by Product Categories
George Moiseev - Classification of E-commerce Websites by Product CategoriesAIST
 
Elena Bruches - The Hybrid Approach to Part-of-Speech Disambiguation
Elena Bruches - The Hybrid Approach to Part-of-Speech DisambiguationElena Bruches - The Hybrid Approach to Part-of-Speech Disambiguation
Elena Bruches - The Hybrid Approach to Part-of-Speech DisambiguationAIST
 
Marina Danshina - The methodology of automated decryption of znamenny chants
Marina Danshina - The methodology of automated decryption of znamenny chantsMarina Danshina - The methodology of automated decryption of znamenny chants
Marina Danshina - The methodology of automated decryption of znamenny chantsAIST
 
Edward Klyshinsky - The Corpus of Syntactic Co-occurences: the First Glance
Edward Klyshinsky - The Corpus of Syntactic Co-occurences: the First GlanceEdward Klyshinsky - The Corpus of Syntactic Co-occurences: the First Glance
Edward Klyshinsky - The Corpus of Syntactic Co-occurences: the First GlanceAIST
 
Galina Lavrentyeva - Anti-spoofing Methods for Automatic Speaker Verification...
Galina Lavrentyeva - Anti-spoofing Methods for Automatic Speaker Verification...Galina Lavrentyeva - Anti-spoofing Methods for Automatic Speaker Verification...
Galina Lavrentyeva - Anti-spoofing Methods for Automatic Speaker Verification...AIST
 
Oleksandr Frei and Murat Apishev - Parallel Non-blocking Deterministic Algori...
Oleksandr Frei and Murat Apishev - Parallel Non-blocking Deterministic Algori...Oleksandr Frei and Murat Apishev - Parallel Non-blocking Deterministic Algori...
Oleksandr Frei and Murat Apishev - Parallel Non-blocking Deterministic Algori...AIST
 
Kaytoue Mehdi - Finding duplicate labels in behavioral data: an application f...
Kaytoue Mehdi - Finding duplicate labels in behavioral data: an application f...Kaytoue Mehdi - Finding duplicate labels in behavioral data: an application f...
Kaytoue Mehdi - Finding duplicate labels in behavioral data: an application f...AIST
 
Valeri Labunets - The bichromatic excitable Schrodinger metamedium
Valeri Labunets - The bichromatic excitable Schrodinger metamediumValeri Labunets - The bichromatic excitable Schrodinger metamedium
Valeri Labunets - The bichromatic excitable Schrodinger metamediumAIST
 
Valeri Labunets - Fast multiparametric wavelet transforms and packets for ima...
Valeri Labunets - Fast multiparametric wavelet transforms and packets for ima...Valeri Labunets - Fast multiparametric wavelet transforms and packets for ima...
Valeri Labunets - Fast multiparametric wavelet transforms and packets for ima...AIST
 
Alexander Karkishchenko - Threefold Symmetry Detection in Hexagonal Images Ba...
Alexander Karkishchenko - Threefold Symmetry Detection in Hexagonal Images Ba...Alexander Karkishchenko - Threefold Symmetry Detection in Hexagonal Images Ba...
Alexander Karkishchenko - Threefold Symmetry Detection in Hexagonal Images Ba...AIST
 
Artyom Makovetskii - An Efficient Algorithm for Total Variation Denoising
Artyom Makovetskii - An Efficient Algorithm for Total Variation DenoisingArtyom Makovetskii - An Efficient Algorithm for Total Variation Denoising
Artyom Makovetskii - An Efficient Algorithm for Total Variation DenoisingAIST
 

More from AIST (20)

Alexey Mikhaylichenko - Automatic Detection of Bone Contours in X-Ray Images
Alexey Mikhaylichenko - Automatic Detection of Bone Contours in X-Ray  ImagesAlexey Mikhaylichenko - Automatic Detection of Bone Contours in X-Ray  Images
Alexey Mikhaylichenko - Automatic Detection of Bone Contours in X-Ray Images
 
Алена Ильина и Иван Бибилов, GoTo - GoTo школы, конкурсы и хакатоны
Алена Ильина и Иван Бибилов, GoTo - GoTo школы, конкурсы и хакатоныАлена Ильина и Иван Бибилов, GoTo - GoTo школы, конкурсы и хакатоны
Алена Ильина и Иван Бибилов, GoTo - GoTo школы, конкурсы и хакатоны
 
Станислав Кралин, Сайтсофт - Связанные открытые данные федеральных органов ис...
Станислав Кралин, Сайтсофт - Связанные открытые данные федеральных органов ис...Станислав Кралин, Сайтсофт - Связанные открытые данные федеральных органов ис...
Станислав Кралин, Сайтсофт - Связанные открытые данные федеральных органов ис...
 
Павел Браславский,Velpas - Velpas: мобильный визуальный поиск
Павел Браславский,Velpas - Velpas: мобильный визуальный поискПавел Браславский,Velpas - Velpas: мобильный визуальный поиск
Павел Браславский,Velpas - Velpas: мобильный визуальный поиск
 
Евгений Цымбалов, Webgames - Методы машинного обучения для задач игровой анал...
Евгений Цымбалов, Webgames - Методы машинного обучения для задач игровой анал...Евгений Цымбалов, Webgames - Методы машинного обучения для задач игровой анал...
Евгений Цымбалов, Webgames - Методы машинного обучения для задач игровой анал...
 
Александр Москвичев, EveResearch - Алгоритмы анализа данных в маркетинговых и...
Александр Москвичев, EveResearch - Алгоритмы анализа данных в маркетинговых и...Александр Москвичев, EveResearch - Алгоритмы анализа данных в маркетинговых и...
Александр Москвичев, EveResearch - Алгоритмы анализа данных в маркетинговых и...
 
Петр Ермаков, HeadHunter - Модерация резюме: от людей к роботам. Машинное обу...
Петр Ермаков, HeadHunter - Модерация резюме: от людей к роботам. Машинное обу...Петр Ермаков, HeadHunter - Модерация резюме: от людей к роботам. Машинное обу...
Петр Ермаков, HeadHunter - Модерация резюме: от людей к роботам. Машинное обу...
 
Иосиф Иткин, Exactpro - TBA
Иосиф Иткин, Exactpro - TBAИосиф Иткин, Exactpro - TBA
Иосиф Иткин, Exactpro - TBA
 
Nikolay Karpov - Evolvable Semantic Platform for Facilitating Knowledge Exchange
Nikolay Karpov - Evolvable Semantic Platform for Facilitating Knowledge ExchangeNikolay Karpov - Evolvable Semantic Platform for Facilitating Knowledge Exchange
Nikolay Karpov - Evolvable Semantic Platform for Facilitating Knowledge Exchange
 
George Moiseev - Classification of E-commerce Websites by Product Categories
George Moiseev - Classification of E-commerce Websites by Product CategoriesGeorge Moiseev - Classification of E-commerce Websites by Product Categories
George Moiseev - Classification of E-commerce Websites by Product Categories
 
Elena Bruches - The Hybrid Approach to Part-of-Speech Disambiguation
Elena Bruches - The Hybrid Approach to Part-of-Speech DisambiguationElena Bruches - The Hybrid Approach to Part-of-Speech Disambiguation
Elena Bruches - The Hybrid Approach to Part-of-Speech Disambiguation
 
Marina Danshina - The methodology of automated decryption of znamenny chants
Marina Danshina - The methodology of automated decryption of znamenny chantsMarina Danshina - The methodology of automated decryption of znamenny chants
Marina Danshina - The methodology of automated decryption of znamenny chants
 
Edward Klyshinsky - The Corpus of Syntactic Co-occurences: the First Glance
Edward Klyshinsky - The Corpus of Syntactic Co-occurences: the First GlanceEdward Klyshinsky - The Corpus of Syntactic Co-occurences: the First Glance
Edward Klyshinsky - The Corpus of Syntactic Co-occurences: the First Glance
 
Galina Lavrentyeva - Anti-spoofing Methods for Automatic Speaker Verification...
Galina Lavrentyeva - Anti-spoofing Methods for Automatic Speaker Verification...Galina Lavrentyeva - Anti-spoofing Methods for Automatic Speaker Verification...
Galina Lavrentyeva - Anti-spoofing Methods for Automatic Speaker Verification...
 
Oleksandr Frei and Murat Apishev - Parallel Non-blocking Deterministic Algori...
Oleksandr Frei and Murat Apishev - Parallel Non-blocking Deterministic Algori...Oleksandr Frei and Murat Apishev - Parallel Non-blocking Deterministic Algori...
Oleksandr Frei and Murat Apishev - Parallel Non-blocking Deterministic Algori...
 
Kaytoue Mehdi - Finding duplicate labels in behavioral data: an application f...
Kaytoue Mehdi - Finding duplicate labels in behavioral data: an application f...Kaytoue Mehdi - Finding duplicate labels in behavioral data: an application f...
Kaytoue Mehdi - Finding duplicate labels in behavioral data: an application f...
 
Valeri Labunets - The bichromatic excitable Schrodinger metamedium
Valeri Labunets - The bichromatic excitable Schrodinger metamediumValeri Labunets - The bichromatic excitable Schrodinger metamedium
Valeri Labunets - The bichromatic excitable Schrodinger metamedium
 
Valeri Labunets - Fast multiparametric wavelet transforms and packets for ima...
Valeri Labunets - Fast multiparametric wavelet transforms and packets for ima...Valeri Labunets - Fast multiparametric wavelet transforms and packets for ima...
Valeri Labunets - Fast multiparametric wavelet transforms and packets for ima...
 
Alexander Karkishchenko - Threefold Symmetry Detection in Hexagonal Images Ba...
Alexander Karkishchenko - Threefold Symmetry Detection in Hexagonal Images Ba...Alexander Karkishchenko - Threefold Symmetry Detection in Hexagonal Images Ba...
Alexander Karkishchenko - Threefold Symmetry Detection in Hexagonal Images Ba...
 
Artyom Makovetskii - An Efficient Algorithm for Total Variation Denoising
Artyom Makovetskii - An Efficient Algorithm for Total Variation DenoisingArtyom Makovetskii - An Efficient Algorithm for Total Variation Denoising
Artyom Makovetskii - An Efficient Algorithm for Total Variation Denoising
 

Recently uploaded

04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationshipsccctableauusergroup
 
CebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxCebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxolyaivanovalion
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxolyaivanovalion
 
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls DubaiDubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubaihf8803863
 
Brighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingBrighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingNeil Barnes
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Callshivangimorya083
 
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130Suhani Kapoor
 
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...Suhani Kapoor
 
Call Girls In Mahipalpur O9654467111 Escorts Service
Call Girls In Mahipalpur O9654467111  Escorts ServiceCall Girls In Mahipalpur O9654467111  Escorts Service
Call Girls In Mahipalpur O9654467111 Escorts ServiceSapana Sha
 
Ukraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSUkraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSAishani27
 
Introduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxIntroduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxfirstjob4
 
Smarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxSmarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxolyaivanovalion
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998YohFuh
 
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiLow Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiSuhani Kapoor
 
Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxolyaivanovalion
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfSocial Samosa
 
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 

Recently uploaded (20)

04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships
 
CebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxCebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptx
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptx
 
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls DubaiDubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
 
Brighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingBrighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data Storytelling
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
 
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
 
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
 
Call Girls In Mahipalpur O9654467111 Escorts Service
Call Girls In Mahipalpur O9654467111  Escorts ServiceCall Girls In Mahipalpur O9654467111  Escorts Service
Call Girls In Mahipalpur O9654467111 Escorts Service
 
Ukraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSUkraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICS
 
Introduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxIntroduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptx
 
Smarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxSmarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptx
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998
 
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
 
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiLow Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
 
Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFx
 
E-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptxE-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptx
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
 
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 

Anna Denisova - Two Realizations of Probability Anomaly Detector with Different Vector Quantization Algorithms

  • 1. Two Realizations of Probability Anomaly Detector with Different Vector Quantization Algorithms Anna Denisova Samara State Aerospace University 1
  • 2. Anomaly detection for hyperspectral images Anomaly is a small partition of data with some characteristics significantly different from background. Hyperspectral image Anomaly detection method Anomaly measure image 1. High dimension 2. Physical meaning of image pixels 1. No prior information about target objects 2. Background model 3. Anomaly measure Post processing 2 Anomaly detection methods classification Gaussian Mixture (GMM-GLRT, Cluster based anomaly detector) Linear spectral mixture (OSP and SSP Detectors) Local normal model (RXD) Non parametric background model (Kernel RX-Detector) Local normal model in feature space (SVDD)
  • 3. Probability anomaly detector (PAD) Input image 1. Vector quantization 2. Calculating histogram using hash function 3. Calculating probabilities 4. Aggregation Output image Thresholding Anomaly value:      i nnIi qPAggregatennP 21, 21 1,       .)( , , ,, , 21 21 pixelquantizedofyprobabilitqP functionnaggregatioAggregate windownaggregatioinpixeliforvaluequantizedq nnpositionwithwindownaggregatiofor scoordinateofsetnnIwhere i th i    3
  • 4. PAD with uniform quantization (PAD UQ) PAD UQ: Uniform quantizing with K levels for each image component l. Integer hash functions: • modulo hashing •multiplicative modulo hashing •Hash functions for strings (Horner algorithm)                 Kxx xnnx nnq ll ll l minmax min21 21 , , MKqqf i n i i mod)( 1 0     MKqqf i n i i mod)( 1 0     4
  • 5. PAD with agglomerative clusterzation PAD AC: New vector quantization algorithm based on agglomerative clusterization. Properties: 1. Quantization values are the centers of clusters. 2. Number of clusters M is fixed. 3. Cluster size threshold – ε 4. Output – a codebook Q of size M. M, ε,    0,0, 11 xxxQ сс     mсxnnxd ,, 21 true false MQ •Include x in Cm •Recalculate xCm •Increase ε •Merge clusters with d<ε •Add new cluster with center in x 5
  • 6. Experimental research 6 Source image Embedding mask Image with anomalies AVIRIS, 224 spectral bands, 145x145 AVIRIS, 360 spectral bands, 145x145 Images with anomalies Embedding mask Synthetic hyperspectral images, 99 spectral bands, 128x128
  • 7. Experimental research of PAD UQ K Biexponential ACF Gauss ACF TP FP TP FP 2 1 0.098 1 0.104 3 1 0.378 1 0.387 4 1 0.471 1 0.504 Hash function K=2 TP FP Modulo hash 1 0.10119 Multiplicative modulo hash 0.8 0.00005 Horner algorithm 1 0.10630 7 highmiddlelow Correlationlevel Biexponential ACF Gauss ACF
  • 8. Experimental research of PAD AC 8 0 0.0005 0.001 0.0015 0.002 0.0025 0.01 0.02 0.03 0.04 0.05 FP ε M=10 M=20 M=30 М=40 M=50 0 0.0005 0.001 0.0015 0.002 0.0025 0.01 0.02 0.03 0.04 0.05 FP ε M=10 M=20 M=30 M=40 M=50 Biexponential ACF Gauss ACF highmiddlelow Correlationlevel highmiddlelow
  • 9. Experimental research of aggregation and noise 9 0 0.2 0.4 0.6 0.8 1 1.2 3×3, TP 3×3, FP 5×5, TP 5×5, FP 7×7, TP 7×7, FP Probabilityvalue(TPorFP) Anomaly size, Probability type (TP or FP) PAD UQ Minimum Median Sigma filtr 0 0.2 0.4 0.6 0.8 1 1.2 3×3, TP 3×3, FP 5×5, TP 5×5, FP 7×7, TP 7×7, FP Probabilityvalue(TPorFP) Anomaly size, Probability type (TP or FP) PAD AC without aggregation minimum median 0 0.2 0.4 0.6 0.8 1 1.2 3×3, TP 3×3, FP 5×5, TP 5×5, FP 7×7, TP 7×7, FP Probabilityvalue(TPorFP) Anomaly size, Probability type (TP or FP) PAD AC for noised images ∞ 250 150 15
  • 10. Experimental research on real images 10 Input image №1 PAD AC (M=15, EPS=1) RXD Not detected signature (red on the left chart), detected signature (red on the right chart) and background signature (green) 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 Threshold PAD AC (M=15, EPSILON=1), TP RXD, TP PAD AC (M=15, EPSILON=1), FP RXD, FP
  • 11. Experimental research on real images 11 Input image №2 PAD AC (M=90, EPS=1) RXD Region 2 (Yellow), Region 1 (Green), Background (Red) 1 2 0 0.2 0.4 0.6 0.8 1 1.2 Threshold PAD AC (M=90, EPSILON=1), TP RXD, TP PAD AC (M=90, EPSILON=1), FP RXD, FP
  • 12. Conclusion Proposed two realizations of PAD anomaly detection algorithm PAD UQ and PAD AC: • PAD UQ inefficient in presence of noise and highly depends on correlation properties of background. • Further development of PAD AC consists in production modifications with PCA. • PAD AC noise resistant and fewer dependant from image correlation. • PAD AC requires automatic procedure of initial error and codebook size estimation to be applied on real images. Questions? 12

Editor's Notes

  1. Anomaly is a small partition of data with particular characteristics significantly different from background. The area of anomaly detection is too large and includes different types of methods for many kinds of data types. And all the methods are highly dependent from nature of data. My work is devoted to anomaly detection for hyperspectral images. The input is an image derived by hyperspectral sensor on board of remote sensing system. Key characteristics of input data that are crucial for anomaly detection are high dimensionality and specific interpretation of data due to its physical meaning. The pixel of hyperspectral image is a vector and represents spectra of underlined surface. Different objects due to different reflectance properties has various spectral description. So an anomaly on hyperspectral image is an area with significantly different spectral characteristics and corresponds to objects unusual for the scene. Anomaly detection problem concludes in target recognition without any apriori knowledge. This task is related to classification problem for two classes where one of classes is background and another is anomalous regions. The main issues for anomaly detection are the way of describing normal data behavior or background model and criterion of anomalous values that is called anomaly measure. So concrete algorithm takes as input hyperspectral image and outputs anomaly measure image, that can be used for further analysis. I also include on diagram postprocessing as a part of process that i used in research. Postprocessing means here additional operations done by the user to achieve valuable information from anomaly image. In this work it was performance measures of the algorithms that can be achieved via thresholding or visually.
  2. In collaboration with Myasnikov VV it was proposed probability criterion to define anomaly measure and general scheme of probability anomaly detector. The main idea is to use a probability of image pixel value as anomaly measure, so that anomalies are the pixels with the lowest probabilities on the image. These criterion defines global anomaly method that we called PAD or probability anomaly detector. The general scheme consists of following steps To decrease a variety of input data keeping its multidimensional structure we used vector quantization as a first step. Further the histogram of quantized values is calculated. For high dimensional data it is a big problem to calculate histogram effectively, that is why we use hash table to contain all histogram bins. By means of simple hash functions we can organize fast addressing of unique quantized values and calculate their probabilities. The probabilities of quantized values are used to calculate as final anomaly measure by means of some aggregation function inside sliding window. Aggregation can be useful in case on further visual analysis and corresponds to spatial filtration of anomaly measure values. The simplest aggregation function is minimum. Today I present you comparison of two PAD realizations with different vector quantization algorithms.
  3. First variant is uniform quantization for each image component. The range between maximum and minimum in each channel is divided into K levels. Quantized vector is an integer vector with N components. Integer vector can be represented as number in an integer number in numerical system with base K. We used several simple hash functions to produce unique indexes for quantized values that can be stored as unsigned integers.
  4. Another modification is PAD with vector quantization based on agglomerative clusterization. It is a method with fixed code book size. The space of pixels is divided into unequal cells. Cells centers are considered as members of code book. There are several vector quantization algorithms with fixed codebook size: LGB and k-means, for example. But they are very computationally ineffective because they are iterative and examine all image pixels for many times. It is proposed a new algorithm of vector quantization with agglomerative clusterization in this work. We initialize a maximum number of clusters, initial radius of cluster. Firstly we create only one cluster with center in first pixel. Then we examine all other pixels. If the distance between the cluster center and current pixel is less than threshold then current pixel is included into this cluster and center of cluster is redefined. If the distance between the current pixel and all existing clusters is more than threshold, a new cluster is created. If the maximum codebook size is exceed nearest clusters are merged and threshold is increased. After codebook creation each pixel substitutes by the center of cluster that is first in code book for which the distance between pixel and cluster is less than output threshold value. In this case histogramm can be calculated during the process of codebook creation. And index of quantized value in code book is used as hash.
  5. For the experimental research on real images test images were constructed from two different parts of initially one image. These parts, building mask and results of embedding anomalies are shown on slide. the parameters of images are listed in the right. .
  6. To choose the best parameters of described algorithms some experiments with synthetic hyperspectral images were done. Images were generated in accordance to linear spectral model using IGCP spectral library. Test images were 128x128 pixels in size and had 99 spectral bands. Small square patters were used as anomalies. They were built in image in five positions and had size 3x3 pixels. Each anomaly had its own spectral signature that is why probability of anomaly was 0.00055 Two types of images with different correlation properties were used: with gauss and biexponential correlation function for linear spectral mixture coefficients, to investigate performance of proposed methods. In both algorithms we used minimum as aggregation function and window of one pixel. All anomaly images were converted into binary images by means of threshold 0,999. To evaluate performance of algorithm true positive probability TP and false positive probability FP were used. On this slide the results of average TP and FP values for different quantization levels and hash functions are shown. As you can see uniform quantization needs to use only 2 quantization levels per 99 channels, It deals with high variability of data presented by more quantization levels. False probability can be reduced by means of using PCA before quantization. As for hash functions multiplicative modulo hash significantly decreases probability of false detection but not all anomalies are recognized. This effect is connected with leading digits of big integer number produced from quantized vector. In multiplicative modulo hashing the middle part of the spectrum is more significant. Controlling this parameter can produce better results and is a part of my future work. Below you can see hash images and results of binarization for inputs with different correlation properties. All images has its own regions with low probability pixel values due to the model of gauss and exponential correlation. These regions produce spots of different sizes according to neighbor pixels correlation coefficient. Visual perception of binary anomaly image allows us to make conclusion about anomaly regions by its shape. The shape of false detections is regular and size depends on correlation. But if we analyze images automatically these spots become a problem and leads to increasing false detection errors. The most difficult case is the case of correlation that defines local continuous areas with the same size as anomalies.
  7. For PAD AC algorithms several codebook sizes were examined. In all cases the method recognized all anomalies. That is why charts only for FP are provided. False probability increases with amount of clusters because more smaller clusters can be produced. The number of clusters should be as less as possible. You can visually predict a number of different type of common objects of the scene and than set M a little bit grater. Starting error doesn’t influence on result so much as codebook size. But it reflects minimum radius of sphere of pixels that are defined as anomalies. Further in experiments i used M=10. The hash images and binary results are shown at the bottom of the slide. As you can see this method gives stable results in spite of correlation of initial image.
  8. It is useful in presence of noise to use some aggregation functions. Test images consist of three groups with anomaly of different sizes from 3 to 7 pixels. In presence of noise i tested different aggregation functions such as minimum, maximum, median, sum, sigma filter and gauss filter. The window with 3х3 pixels was used. As you can see from the diagram for PAD UQ median filtration and sigma filter provides better results than minimum. And their performance increases with anomaly size. But PAD UQ method can not be applied in presence of noise. Because of high false detection probability. PAD AC gives much higher TP and much lower FP probabilities. The results of best aggregation functions are presented on chart. PAD AC is also noise stable method. The chart at the right shows this fact. PAD AC woks well until signal to noise ratio is less than 15. For all test images false detection probability was 10^(-4).
  9. Here you can see the results for PAD AC algorithm in comparison with RXD Detector on real image. Binary images were produced by means of thresholding and the threshold was chosen as quantile of anomaly measure histograms for both methods. ROC curve shows that PAD AC gives good results for lower quantile values. And it cannot recognize as anomaly a piece of data that has signature close to background. False detection for both algorithms includes part of landscape untypical for this image.
  10. This is the results for the second image. ROC curve was built for the best pair of epsilon and M parameters. As it can be seen from the binary images PAD has more false detection probability than the RXD algorithm. False detected regions includes areas 1 and 2 circled on input image. They also has untypical for this image signatories that is why they can not be considered as real false detections in terms of PAD. The signatories of background, anomalies and regions 1 and 2 are shown on the up right figure.