Research Article

Image Anomaly Detection Based on Adaptive Iteration and Feature Extraction in Edge-Cloud IoT

Figure 5

Anomaly detection results of different methods: (a) target image and detection results of (b) PM [27], (c) SIFT [39], and (d) the proposed algorithm.
(a)
(b)
(c)
(d)