{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:23:38Z","timestamp":1772119418557,"version":"3.50.1"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2023,8,9]],"date-time":"2023-08-09T00:00:00Z","timestamp":1691539200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,8,9]],"date-time":"2023-08-09T00:00:00Z","timestamp":1691539200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"National Natural Science Foundation of Shaanxi Province","award":["2020SF-377"],"award-info":[{"award-number":["2020SF-377"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimedia Systems"],"published-print":{"date-parts":[[2023,10]]},"DOI":"10.1007\/s00530-023-01149-z","type":"journal-article","created":{"date-parts":[[2023,8,9]],"date-time":"2023-08-09T02:01:38Z","timestamp":1691546498000},"page":"2705-2714","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Imitation camouflage synthesis based on shallow neural network"],"prefix":"10.1007","volume":"29","author":[{"given":"Cai","family":"Xiuxia","sequence":"first","affiliation":[]},{"given":"Zhang","family":"Pin","sequence":"additional","affiliation":[]},{"given":"Du","family":"Shuaibin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,8,9]]},"reference":[{"issue":"3","key":"1149_CR1","first-page":"9","volume":"16","author":"YA Xin","year":"2020","unstructured":"Xin, Y.A., Wdx, A., Qi, J.A., Ling, L.A., Wnz, B., Jyt, A., Hao, X.B.: Research on extraction and reproduction of deformation camouflage spot based on generative adversarial network model - sciencedirect. Def. Technol. 16(3), 9 (2020)","journal-title":"Def. Technol."},{"key":"1149_CR2","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1098\/rstb.2008.0217","volume":"364","author":"M Stevens","year":"2009","unstructured":"Stevens, M., Merilaita, S.: Animal camouflage: current issues and new perspectives. Philos. Trans. R Soc. B Biol. Sci. 364, 423\u2013427 (2009)","journal-title":"Philos. Trans. R Soc. B Biol. Sci."},{"issue":"3","key":"1149_CR3","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/s42235-022-00160-w","volume":"19","author":"X Song","year":"2022","unstructured":"Song, X., Pan, J., Zhang, X., Chen, C., Huang, D.: Bionics-based optimization of step-climbing gait in a novel mini-rhex robot. J. Bionic Eng. 19(3), 13 (2022)","journal-title":"J. Bionic Eng."},{"key":"1149_CR4","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1002\/rob.21985","volume":"38","author":"FS Leira","year":"2020","unstructured":"Leira, F.S., Helgesen, H.H., Johansen, T.A., Fossen, T.I.: Object detection, recognition, and tracking from uavs using a thermal camera. J. Field Rob. 38, 242\u2013267 (2020)","journal-title":"J. Field Rob."},{"key":"1149_CR5","doi-asserted-by":"crossref","unstructured":"Allen, M.A., Flynn, M.E., Machain, C.M.: Us global military deployments, 1950c2020*:. Conflict Management and Peace Science 39(3), 351\u2013370 (2022)","DOI":"10.1177\/07388942211030885"},{"issue":"3","key":"1149_CR6","first-page":"9","volume":"16","author":"YA Xin","year":"2020","unstructured":"Xin, Y.A., Wdx, A., Qi, J.A., Ling, L.A., Wnz, B., Jyt, A., Hao, X.B.: Research on extraction and reproduction of deformation camouflage spot based on generative adversarial network model - sciencedirect. Def. Technol. 16(3), 9 (2020)","journal-title":"Def. Technol."},{"key":"1149_CR7","doi-asserted-by":"crossref","unstructured":"Huang, L., Gao, C., Zhou, Y., Xie, C., Liu, N.: Universal physical camouflage attacks on object detectors. In: 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (2020)","DOI":"10.1109\/CVPR42600.2020.00080"},{"issue":"7","key":"1149_CR8","doi-asserted-by":"publisher","first-page":"835","DOI":"10.1134\/S1064226920060017","volume":"65","author":"NS Akinshin","year":"2020","unstructured":"Akinshin, N.S., Potapov, A.A., Bystrov, R.P., Esikov, O.V., Chernyshkov, A.I.: Building systems for object recognition by multichannel sensing systems based on neural networks and fractal signatures. J. Communicat. Technol. Electron. 65(7), 835\u2013842 (2020)","journal-title":"J. Communicat. Technol. Electron."},{"issue":"Suppl. 1","key":"1149_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2020.103084","volume":"76","author":"T Thenmozhi","year":"2020","unstructured":"Thenmozhi, T., Kalpana, A.M.: Adaptive motion estimation and sequential outline separation based moving object detection in video surveillance system. Microproc. Microsyst. 76(Suppl. 1), 103084 (2020)","journal-title":"Microproc. Microsyst."},{"issue":"4","key":"1149_CR10","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1109\/MCE.2020.2969150","volume":"9","author":"C Song","year":"2020","unstructured":"Song, C., Cheng, H.P., Yang, H., Li, S., Li, H.: Adversarial attack: A new threat to smart devices and how to defend it. IEEE Consumer Electron. Magaz. 9(4), 49\u201355 (2020)","journal-title":"IEEE Consumer Electron. Magaz."},{"key":"1149_CR11","first-page":"81","volume":"14","author":"P Gupta","year":"2022","unstructured":"Gupta, P., Pareek, B., Singal, G., Rao, D.V.: Edge device based military vehicle detection and classification from uav. Multimedia Tools Appl. 14, 81 (2022)","journal-title":"Multimedia Tools Appl."},{"key":"1149_CR12","doi-asserted-by":"crossref","unstructured":"Fennell, J., Talas, L., Baddeley, R., Cuthill, I., Scott-Samuel, N.: The camouflage machine: Optimising protective colouration using deep learning with genetic algorithms (2020)","DOI":"10.1101\/2020.01.12.903484"},{"key":"1149_CR13","doi-asserted-by":"crossref","unstructured":"Chen, Y., Shen, C., Wang, C., Xiao, Q., Li, K., Chen, Y.: Scaling camouflage: Content disguising attack against computer vision applications. IEEE Transactions on Dependable and Secure Computing PP(99), 1\u20131","DOI":"10.1109\/TDSC.2020.2971601"},{"key":"1149_CR14","doi-asserted-by":"crossref","unstructured":"Talas, L., Fennell, J.G., Kjernsmo, K., Cuthill, I.C., Scott-Samuel, N.E., Baddeley, R.J.: Evolving optimum camouflage with generative adversarial networks. Cold Spring Harbor Laboratory (2018)","DOI":"10.1101\/429092"},{"key":"1149_CR15","doi-asserted-by":"crossref","unstructured":"Deng, J., Dong, W., Socher, R., Li, L.J., Li, F.F.: Imagenet: a large-scale hierarchical image database. In: 2009 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2009), 20-25 June 2009, Miami, Florida, USA (2009)","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"1149_CR16","doi-asserted-by":"crossref","unstructured":"Long, Jonathan, Shelhamer, Evan, Darrell, Trevor: Fully convolutional networks for semantic segmentation. IEEE Transactions on Pattern Analysis and Machine Intelligence (2017)","DOI":"10.1109\/TPAMI.2016.2572683"},{"issue":"5","key":"1149_CR17","first-page":"7","volume":"17","author":"X Yang","year":"2021","unstructured":"Yang, X., Xu, W.D., Jia, Q., Liu, J.: Mf-cfi: a fused evaluation index for camouflage patterns based on human visual perception. Def. Technol. 17(5), 7 (2021)","journal-title":"Def. Technol."},{"key":"1149_CR18","unstructured":"Ke, Y.: Pca-sift : A more distinctive representation for local image descriptors. Proc. CVPR Int. Conf. on Computer Vision and Pattern Recognition, 2004 (2004)"},{"issue":"10","key":"1149_CR19","first-page":"1101","volume":"27","author":"Jun-Feng, L.I., Zhang, Z.X., Shen, J.M., Automation, D.O., University, S.T.","year":"2016","unstructured":"Jun-Feng, L.I., Zhang, Z.X., Shen, J.M., Automation, D.O., University, S.T.: No-reference image quality assessment based on luminance statistics. J. Optoelectron. 27(10), 1101\u20131110 (2016)","journal-title":"J. Optoelectron."},{"issue":"3","key":"1149_CR20","first-page":"439","volume":"61","author":"R Wedderburn","year":"1974","unstructured":"Wedderburn, R.: Quasi-likelihood functions, generalized linear models, and the gaussnewton method. Biometrika 61(3), 439\u2013447 (1974)","journal-title":"Biometrika"},{"issue":"11","key":"1149_CR21","doi-asserted-by":"publisher","first-page":"2278","DOI":"10.1109\/5.726791","volume":"86","author":"Y Lcun","year":"1998","unstructured":"Lcun, Y., Bottou, L., Bengio, Y., Haffner, P.: Gradient-based learning applied to document recognition. Proc. IEEE 86(11), 2278\u20132324 (1998)","journal-title":"Proc. IEEE"},{"issue":"1\u20133","key":"1149_CR22","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1007\/BF01581275","volume":"58","author":"L Qi","year":"1993","unstructured":"Qi, L., Jie, S.: A nonsmooth version of newton method. Mathemat. Program. 58(1\u20133), 353\u2013367 (1993)","journal-title":"Mathemat. Program."},{"key":"1149_CR23","doi-asserted-by":"crossref","unstructured":"Dai, Y.H., Li, L.D.: On restart procedures for the conjugate gradient method. Numerical Algorithms (2004)","DOI":"10.1023\/B:NUMA.0000021761.10993.6e"},{"key":"1149_CR24","unstructured":"Oliphant, T.E.: Scipy: Open source scientific tools for python (2014)"},{"issue":"2","key":"1149_CR25","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1109\/TPWRS.2009.2016589","volume":"24","author":"H Yu","year":"2009","unstructured":"Yu, H., Chung, C.Y., Wong, K.P., Lee, H.W., Zhang, J.H.: Probabilistic load flow evaluation with hybrid latin hypercube sampling and cholesky decomposition. IEEE Transact. Power Syst. 24(2), 661\u2013667 (2009)","journal-title":"IEEE Transact. Power Syst."},{"key":"1149_CR26","unstructured":"Brock, A., Donahue, J., Simonyan, K.: Large Scale GAN Training for High Fidelity Natural Image Synthesis (2018)"},{"key":"1149_CR27","doi-asserted-by":"crossref","unstructured":"Gatys, L.A., Ecker, A.S., Bethge, M.: A neural algorithm of artistic style. arXiv preprint arXiv:1508.06576 (2015)","DOI":"10.1167\/16.12.326"}],"container-title":["Multimedia Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-023-01149-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00530-023-01149-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-023-01149-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,15]],"date-time":"2023-09-15T09:15:19Z","timestamp":1694769319000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00530-023-01149-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,9]]},"references-count":27,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2023,10]]}},"alternative-id":["1149"],"URL":"https:\/\/doi.org\/10.1007\/s00530-023-01149-z","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-2567866\/v1","asserted-by":"object"}]},"ISSN":["0942-4962","1432-1882"],"issn-type":[{"value":"0942-4962","type":"print"},{"value":"1432-1882","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,8,9]]},"assertion":[{"value":"9 February 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 July 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 August 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}