{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T08:06:32Z","timestamp":1761897992768,"version":"3.40.3"},"publisher-location":"Cham","reference-count":54,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031730009"},{"type":"electronic","value":"9783031730016"}],"license":[{"start":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T00:00:00Z","timestamp":1732665600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T00:00:00Z","timestamp":1732665600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-73001-6_18","type":"book-chapter","created":{"date-parts":[[2024,11,26]],"date-time":"2024-11-26T10:20:46Z","timestamp":1732616446000},"page":"315-331","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Unlocking Attributes\u2019 Contribution to\u00a0Successful Camouflage: A Combined Textual and\u00a0Visual Analysis Strategy"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1282-3755","authenticated-orcid":false,"given":"Hong","family":"Zhang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7608-9150","authenticated-orcid":false,"given":"Yixuan","family":"Lyu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0006-7816-2968","authenticated-orcid":false,"given":"Qian","family":"Yu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0009-8956-1245","authenticated-orcid":false,"given":"Hanyang","family":"Liu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5383-5667","authenticated-orcid":false,"given":"Huimin","family":"Ma","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8107-7218","authenticated-orcid":false,"given":"Ding","family":"Yuan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4237-5874","authenticated-orcid":false,"given":"Yifan","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,27]]},"reference":[{"issue":"9","key":"18_CR1","first-page":"5708","volume":"32","author":"H Bi","year":"2021","unstructured":"Bi, H., Zhang, C., Wang, K., Tong, J., Zheng, F.: Rethinking camouflaged object detection: models and datasets. IEEE TCSVT 32(9), 5708\u20135724 (2021)","journal-title":"IEEE TCSVT"},{"key":"18_CR2","doi-asserted-by":"publisher","first-page":"108901","DOI":"10.1016\/j.knosys.2022.108901","volume":"248","author":"T Chen","year":"2022","unstructured":"Chen, T., Xiao, J., Hu, X., Zhang, G., Wang, S.: Boundary-guided network for camouflaged object detection. Knowl.-Based Syst. 248, 108901 (2022)","journal-title":"Knowl.-Based Syst."},{"unstructured":"Cheng, S., Ji, G.P., Qin, P., Fan, D.P., Zhou, B., Xu, P.: Large model based referring camouflaged object detection. arXiv (2023)","key":"18_CR3"},{"doi-asserted-by":"crossref","unstructured":"Cong, R., Sun, M., Zhang, S., Zhou, X., Zhang, W., Zhao, Y.: Frequency perception network for camouflaged object detection. In: ACM MM, pp. 1179\u20131189 (2023)","key":"18_CR4","DOI":"10.1145\/3581783.3612083"},{"unstructured":"Dosovitskiy, A., et al.: An image is worth 16x16 words: transformers for image recognition at scale. In: ICLR (2021). https:\/\/openreview.net\/forum?id=YicbFdNTTy","key":"18_CR5"},{"doi-asserted-by":"crossref","unstructured":"Fan, D.P., Cheng, M.M., Liu, Y., Li, T., Borji, A.: Structure-measure: a new way to evaluate foreground maps. In: IEEE ICCV, pp. 4548\u20134557 (2017)","key":"18_CR6","DOI":"10.1109\/ICCV.2017.487"},{"doi-asserted-by":"crossref","unstructured":"Fan, D.P., Gong, C., Cao, Y., Ren, B., Cheng, M.M., Borji, A.: Enhanced-alignment measure for binary foreground map evaluation. In: IJCAI, pp. 698\u2013704 (2018)","key":"18_CR7","DOI":"10.24963\/ijcai.2018\/97"},{"issue":"10","key":"18_CR8","doi-asserted-by":"publisher","first-page":"6024","DOI":"10.1109\/TPAMI.2021.3085766","volume":"44","author":"DP Fan","year":"2021","unstructured":"Fan, D.P., Ji, G.P., Cheng, M.M., Shao, L.: Concealed object detection. IEEE TPAMI 44(10), 6024\u20136042 (2021)","journal-title":"IEEE TPAMI"},{"doi-asserted-by":"crossref","unstructured":"Fan, D.P., Ji, G.P., Sun, G., Cheng, M.M., Shen, J., Shao, L.: Camouflaged object detection. In: IEEE CVPR, pp. 2777\u20132787 (2020)","key":"18_CR9","DOI":"10.1109\/CVPR42600.2020.00285"},{"issue":"1","key":"18_CR10","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/s44267-023-00019-6","volume":"1","author":"DP Fan","year":"2023","unstructured":"Fan, D.P., Ji, G.P., Xu, P., Cheng, M.M., Sakaridis, C., Van Gool, L.: Advances in deep concealed scene understanding. Vis. Intell. 1(1), 16 (2023)","journal-title":"Vis. Intell."},{"key":"18_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1007\/978-3-030-59725-2_26","volume-title":"Medical Image Computing and Computer Assisted Intervention \u2013 MICCAI 2020","author":"D-P Fan","year":"2020","unstructured":"Fan, D.-P., et al.: PraNet: parallel reverse attention network for polyp segmentation. In: Martel, A.L., et al. (eds.) MICCAI 2020. LNCS, vol. 12266, pp. 263\u2013273. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-59725-2_26"},{"doi-asserted-by":"crossref","unstructured":"He, C., et al.: Camouflaged object detection with feature decomposition and edge reconstruction. In: IEEE CVPR, pp. 22046\u201322055 (2023)","key":"18_CR12","DOI":"10.1109\/CVPR52729.2023.02111"},{"doi-asserted-by":"crossref","unstructured":"He, W., Jamonnak, S., Gou, L., Ren, L.: Clip-s4: language-guided self-supervised semantic segmentation. In: IEEE CVPR, pp. 11207\u201311216 (2023)","key":"18_CR13","DOI":"10.1109\/CVPR52729.2023.01078"},{"doi-asserted-by":"crossref","unstructured":"Hou, J.Y.Y.H.W., Li, J.: Detection of the mobile object with camouflage color under dynamic background based on optical flow. Proc. Eng. 15, 2201\u20132205 (2011)","key":"18_CR14","DOI":"10.1016\/j.proeng.2011.08.412"},{"doi-asserted-by":"crossref","unstructured":"Hu, J., Lin, J., Cai, W., Gong, S.: Relax image-specific prompt requirement in SAM: a single generic prompt for segmenting camouflaged objects. arXiv (2023)","key":"18_CR15","DOI":"10.1609\/aaai.v38i11.29144"},{"doi-asserted-by":"crossref","unstructured":"Hu, J., Shen, L., Sun, G.: Squeeze-and-excitation networks. In: IEEE CVPR, pp. 7132\u20137141 (2018)","key":"18_CR16","DOI":"10.1109\/CVPR.2018.00745"},{"doi-asserted-by":"crossref","unstructured":"Hu, X., et al.: High-resolution iterative feedback network for camouflaged object detection. In: AAAI, vol.\u00a037, pp. 881\u2013889 (2023)","key":"18_CR17","DOI":"10.1609\/aaai.v37i1.25167"},{"doi-asserted-by":"crossref","unstructured":"Huang, Z., et al.: Feature shrinkage pyramid for camouflaged object detection with transformers. In: IEEE CVPR, pp. 5557\u20135566 (2023)","key":"18_CR18","DOI":"10.1109\/CVPR52729.2023.00538"},{"issue":"1","key":"18_CR19","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1007\/s11633-022-1365-9","volume":"20","author":"GP Ji","year":"2023","unstructured":"Ji, G.P., Fan, D.P., Chou, Y.C., Dai, D., Liniger, A., Van Gool, L.: Deep gradient learning for efficient camouflaged object detection. Mach. Intell. Res. 20(1), 92\u2013108 (2023)","journal-title":"Mach. Intell. Res."},{"unstructured":"Kingma, D.P., Ba, J.: ADAM: a method for stochastic optimization. In: ICLR (2015)","key":"18_CR20"},{"key":"18_CR21","first-page":"45","volume":"184","author":"TN Le","year":"2019","unstructured":"Le, T.N., Nguyen, T.V., Nie, Z., Tran, M.T., Sugimoto, A.: Anabranch network for camouflaged object segmentation. CVIU 184, 45\u201356 (2019)","journal-title":"CVIU"},{"doi-asserted-by":"crossref","unstructured":"Li, A., Zhang, J., LV, Y., Liu, B., Zhang, T., Dai, Y.: Uncertainty-aware joint salient object and camouflaged object detection. In: IEEE CVPR, pp. 10071\u201310081 (2021)","key":"18_CR22","DOI":"10.1109\/CVPR46437.2021.00994"},{"unstructured":"Li, J., Li, D., Savarese, S., Hoi, S.: Blip-2: bootstrapping language-image pre-training with frozen image encoders and large language models. arXiv (2023)","key":"18_CR23"},{"doi-asserted-by":"crossref","unstructured":"Li, L.H., et\u00a0al.: Grounded language-image pre-training. In: IEEE CVPR, pp. 10965\u201310975 (2022)","key":"18_CR24","DOI":"10.1109\/CVPR52688.2022.01069"},{"unstructured":"Liu, H., Li, C., Wu, Q., Lee, Y.J.: Visual instruction tuning. NeurIPS 36 (2024)","key":"18_CR25"},{"doi-asserted-by":"crossref","unstructured":"Liu, W., Shen, X., Pun, C.M., Cun, X.: Explicit visual prompting for low-level structure segmentations. In: IEEE CVPR, pp. 19434\u201319445 (2023)","key":"18_CR26","DOI":"10.1109\/CVPR52729.2023.01862"},{"issue":"9","key":"18_CR27","first-page":"4204","volume":"21","author":"Z Liu","year":"2012","unstructured":"Liu, Z., Huang, K., Tan, T.: Foreground object detection using top-down information based on EM framework. IEEE TIP 21(9), 4204\u20134217 (2012)","journal-title":"IEEE TIP"},{"doi-asserted-by":"crossref","unstructured":"Lv, Y., Zhang, J., Dai, Y., Li, A., Barnes, N., Fan, D.P.: Towards deeper understanding of camouflaged object detection. IEEE TCSVT (2023)","key":"18_CR28","DOI":"10.1109\/TCSVT.2023.3234578"},{"doi-asserted-by":"crossref","unstructured":"Lv, Y., Zhang, J., Dai, Y., Li, A., Liu, B., Barnes, N., Fan, D.P.: Simultaneously localize, segment and rank the camouflaged objects. In: IEEE CVPR, pp. 11591\u201311601 (2021)","key":"18_CR29","DOI":"10.1109\/CVPR46437.2021.01142"},{"doi-asserted-by":"crossref","unstructured":"Lyu, Y., Zhang, H., Li, Y., Liu, H., Yang, Y., Yuan, D.: UEDG: uncertainty-edge dual guided camouflage object detection. IEEE TMM (2023)","key":"18_CR30","DOI":"10.1109\/TMM.2023.3295095"},{"doi-asserted-by":"crossref","unstructured":"Lyu, Y., Lin, T., Li, F., He, D., Dong, J., Tan, T.: DeltaEdit: exploring text-free training for text-driven image manipulation. In: IEEE CVPR, pp. 6894\u20136903 (2023)","key":"18_CR31","DOI":"10.1109\/CVPR52729.2023.10308949"},{"doi-asserted-by":"crossref","unstructured":"Margolin, R., Zelnik-Manor, L., Tal, A.: How to evaluate foreground maps? In: IEEE CVPR, pp. 248\u2013255 (2014)","key":"18_CR32","DOI":"10.1109\/CVPR.2014.39"},{"doi-asserted-by":"crossref","unstructured":"Mayer, R.E.: Multimedia learning. In: Psychology of Learning and Motivation, vol.\u00a041, pp. 85\u2013139 (2002)","key":"18_CR33","DOI":"10.1016\/S0079-7421(02)80005-6"},{"doi-asserted-by":"crossref","unstructured":"Mei, H., Ji, G.P., Wei, Z., Yang, X., Wei, X., Fan, D.P.: Camouflaged object segmentation with distraction mining. In: IEEE CVPR, pp. 8772\u20138781 (2021)","key":"18_CR34","DOI":"10.1109\/CVPR46437.2021.00866"},{"issue":"1724","key":"18_CR35","doi-asserted-by":"publisher","first-page":"20160341","DOI":"10.1098\/rstb.2016.0341","volume":"372","author":"S Merilaita","year":"2017","unstructured":"Merilaita, S., Scott-Samuel, N.E., Cuthill, I.C.: How camouflage works. Philos. Trans. Roy. Soc. B: Biol. Sci. 372(1724), 20160341 (2017)","journal-title":"Philos. Trans. Roy. Soc. B: Biol. Sci."},{"key":"18_CR36","doi-asserted-by":"publisher","DOI":"10.4324\/9781315798868","volume-title":"Imagery and Verbal Processes","author":"A Paivio","year":"2013","unstructured":"Paivio, A.: Imagery and Verbal Processes. Psychology Press (2013)"},{"doi-asserted-by":"crossref","unstructured":"Pang, Y., Zhao, X., Xiang, T.Z., Zhang, L., Lu, H.: Zoom in and out: a mixed-scale triplet network for camouflaged object detection. In: IEEE CVPR, pp. 2160\u20132170 (2022)","key":"18_CR37","DOI":"10.1109\/CVPR52688.2022.00220"},{"issue":"5","key":"18_CR38","doi-asserted-by":"publisher","first-page":"1325","DOI":"10.1111\/brv.12612","volume":"95","author":"MQ Pembury Smith","year":"2020","unstructured":"Pembury Smith, M.Q., Ruxton, G.D.: Camouflage in predators. Biol. Rev. 95(5), 1325\u20131340 (2020)","journal-title":"Biol. Rev."},{"unstructured":"Radford, A., et\u00a0al.: Learning transferable visual models from natural language supervision. In: ICML, pp. 8748\u20138763 (2021)","key":"18_CR39"},{"issue":"1825","key":"18_CR40","doi-asserted-by":"publisher","first-page":"20152890","DOI":"10.1098\/rspb.2015.2890","volume":"283","author":"J Skelhorn","year":"2016","unstructured":"Skelhorn, J., Rowe, C.: Cognition and the evolution of camouflage. Proc. Roy. Soc. B: Biol. Sci. 283(1825), 20152890 (2016). https:\/\/doi.org\/10.1098\/rspb.2015.2890","journal-title":"Proc. Roy. Soc. B: Biol. Sci."},{"key":"18_CR41","first-page":"9263","volume":"25","author":"Y Song","year":"2023","unstructured":"Song, Y., et al.: RINet: relative importance-aware network for fixation prediction. IEEE TMM 25, 9263\u20139277 (2023)","journal-title":"IEEE TMM"},{"issue":"1516","key":"18_CR42","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1098\/rstb.2008.0217","volume":"364","author":"M Stevens","year":"2009","unstructured":"Stevens, M., Merilaita, S.: Animal camouflage: current issues and new perspectives. Philos. Trans. Roy. Soc. B: Biol. Sci. 364(1516), 423\u2013427 (2009)","journal-title":"Philos. Trans. Roy. Soc. B: Biol. Sci."},{"issue":"1","key":"18_CR43","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1111\/brv.12438","volume":"94","author":"M Stevens","year":"2019","unstructured":"Stevens, M., Ruxton, G.D.: The key role of behaviour in animal camouflage. Biol. Rev. 94(1), 116\u2013134 (2019)","journal-title":"Biol. Rev."},{"issue":"3","key":"18_CR44","first-page":"208","volume":"82","author":"A Tankus","year":"2001","unstructured":"Tankus, A., Yeshurun, Y.: Convexity-based visual camouflage breaking. CVIU 82(3), 208\u2013237 (2001)","journal-title":"CVIU"},{"issue":"1516","key":"18_CR45","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1098\/rstb.2008.0218","volume":"364","author":"T Troscianko","year":"2009","unstructured":"Troscianko, T., Benton, C.P., Lovell, P.G., Tolhurst, D.J., Pizlo, Z.: Camouflage and visual perception. Philos. Trans. Roy. Soc. B: Biol. Sci. 364(1516), 449\u2013461 (2009)","journal-title":"Philos. Trans. Roy. Soc. B: Biol. Sci."},{"doi-asserted-by":"crossref","unstructured":"Wei, J., Wang, S., Huang, Q.: F$$^3$$net: fusion, feedback and focus for salient object detection. In: AAAI, vol.\u00a034, pp. 12321\u201312328 (2020)","key":"18_CR46","DOI":"10.1609\/aaai.v34i07.6916"},{"doi-asserted-by":"crossref","unstructured":"Wu, Z., et al.: Source-free depth for object pop-out. In: IEEE CVPR, pp. 1032\u20131042 (2023)","key":"18_CR47","DOI":"10.1109\/ICCV51070.2023.00101"},{"doi-asserted-by":"crossref","unstructured":"Xu, M., Zhang, Z., Wei, F., Hu, H., Bai, X.: Side adapter network for open-vocabulary semantic segmentation. In: IEEE CVPR, pp. 2945\u20132954 (2023)","key":"18_CR48","DOI":"10.1109\/CVPR52729.2023.00288"},{"doi-asserted-by":"crossref","unstructured":"Yan, X., Sun, M., Han, Y., Wang, Z.: Camouflaged object segmentation based on matching\u2013recognition\u2013refinement network. IEEE TNNLS (2023)","key":"18_CR49","DOI":"10.1109\/TNNLS.2023.3291595"},{"doi-asserted-by":"crossref","unstructured":"Yang, S., Ding, M., Wu, Y., Li, Z., Zhang, J.: Implicit neural representation for cooperative low-light image enhancement. In: IEEE ICCV, pp. 12918\u201312927 (2023)","key":"18_CR50","DOI":"10.1109\/ICCV51070.2023.01187"},{"key":"18_CR51","first-page":"36067","volume":"35","author":"H Zhang","year":"2022","unstructured":"Zhang, H., et al.: GLIPv2: unifying localization and vision-language understanding. NeurIPS 35, 36067\u201336080 (2022)","journal-title":"NeurIPS"},{"doi-asserted-by":"crossref","unstructured":"Zhang, Q., Yan, W.: CFANet: a cross-layer feature aggregation network for camouflaged object detection. In: IEEE ICME, pp. 2441\u20132446 (2023)","key":"18_CR52","DOI":"10.1109\/ICME55011.2023.00416"},{"unstructured":"Zhang, X., Yin, B., Lin, Z., Hou, Q., Fan, D.P., Cheng, M.M.: Referring camouflaged object detection. arXiv (2023)","key":"18_CR53"},{"doi-asserted-by":"crossref","unstructured":"Zheng, D., Zheng, X., Yang, L.T., Gao, Y., Zhu, C., Ruan, Y.: MFFN: multi-view feature fusion network for camouflaged object detection. In: IEEE WACV, pp. 6232\u20136242 (2023)","key":"18_CR54","DOI":"10.1109\/WACV56688.2023.00617"}],"container-title":["Lecture Notes in Computer Science","Computer Vision \u2013 ECCV 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-73001-6_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,26]],"date-time":"2024-11-26T11:12:20Z","timestamp":1732619540000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-73001-6_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,27]]},"ISBN":["9783031730009","9783031730016"],"references-count":54,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-73001-6_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,11,27]]},"assertion":[{"value":"27 November 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Computer Vision","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Milan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eccv2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/eccv2024.ecva.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}