Skip to main content

This package provides a set of image corruptions.

Project description

imgcorr

This package provides a set of corruptions that can be applied to images in order to benchmark the robustness of neural networks. These corruptions are not meant to be used as training data augmentation but rather to test the networks against unseen perturbations. For more information have a look at the paper on the original corruption package by Hendrycks and Dietterich: Benchmarking Neural Network Robustness to Common Corruptions and Surface Variations.

image corruptions

Installation and Usage

This package is pip installable via pip3 install imgcorr. An example of how to use the corruption function is given below:

from imgcorr import corrupt
...
corrupted_image = corrupt(image, corruption_name='gaussian_blur', severity=1)
...

Looping over all available corruptions can be done either by name or by index:

# via name
from imgcorr import get_corruption_names
for corruption in get_corruption_names():
    for severity in range(5):
        corrupted = corrupt(image, corruption_name=corruption, severity=severity+1)
        ...

# via number:
for i in range(15):
    for severity in range(5):
        corrupted = corrupt(image, corruption_number=i, severity=severity+1)
        ...

Note that the first 15 image corruptions are the common corruptions (the ones you get via get_corruption_names()). If you really wish to use these as data augmentation, there exist four additional validation corruptions which can be accessed via get_corruption_names('validation') which should then be used to test the corruption robustness of the trained model.

Citation

If you use our code or the imgcorr package, please consider citing:

@article{michaelis2019dragon,
  title={Benchmarking Robustness in Object Detection: 
    Autonomous Driving when Winter is Coming},
  author={Michaelis, Claudio and Mitzkus, Benjamin and 
    Geirhos, Robert and Rusak, Evgenia and 
    Bringmann, Oliver and Ecker, Alexander S. and 
    Bethge, Matthias and Brendel, Wieland},
  journal={arXiv preprint arXiv:1907.07484},
  year={2019}
}

Credit and Changelog

This package is an extension of the image corruption functions provided by Dan Hendrycks in the repository corruptions. The image corruptions implemented by Hendrycks are generalized to work on images with arbitrary image dimensions and aspect ratios aswell as on grayscale images. We furthermore removed the dependency to libmagickwand and the python api Wand and reimplemented the motion_blur in python.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

imgcorr-1.1.3.tar.gz (2.1 MB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

imgcorr-1.1.3-py3-none-any.whl (2.1 MB view details)

Uploaded Python 3

File details

Details for the file imgcorr-1.1.3.tar.gz.

File metadata

  • Download URL: imgcorr-1.1.3.tar.gz
  • Upload date:
  • Size: 2.1 MB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/5.1.0 CPython/3.12.4

File hashes

Hashes for imgcorr-1.1.3.tar.gz
Algorithm Hash digest
SHA256 52ab1f560bf0bb160f63ee792bd4867fd59845a7f691ff519a2a39bff955cae0
MD5 15957f605b238ba7f1f14c77e610cc6c
BLAKE2b-256 881dda1dc835d4664db8b79ce947dbdb98c5f892eded772f45cf0bc054f1bd42

See more details on using hashes here.

File details

Details for the file imgcorr-1.1.3-py3-none-any.whl.

File metadata

  • Download URL: imgcorr-1.1.3-py3-none-any.whl
  • Upload date:
  • Size: 2.1 MB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/5.1.0 CPython/3.12.4

File hashes

Hashes for imgcorr-1.1.3-py3-none-any.whl
Algorithm Hash digest
SHA256 843edb087918dc8c3f860fba3596a7c2d9a39eda8677367a8efee8eaef3eba5b
MD5 abfc7fbc23eb1565dbb82490a4b5733d
BLAKE2b-256 cd521d5f3c136ee77b1d2a67da17778219e818697db7f328435518d448a56882

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page