{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T02:56:32Z","timestamp":1769309792336,"version":"3.49.0"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,12,3]],"date-time":"2024-12-03T00:00:00Z","timestamp":1733184000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,3]],"date-time":"2024-12-03T00:00:00Z","timestamp":1733184000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SIViP"],"published-print":{"date-parts":[[2025,1]]},"DOI":"10.1007\/s11760-024-03580-9","type":"journal-article","created":{"date-parts":[[2024,12,3]],"date-time":"2024-12-03T18:22:19Z","timestamp":1733250139000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["CAMOUFLAGE-Net: comprehensive advanced model for optimal camouflaged target detection and analysis using groundbreaking elements"],"prefix":"10.1007","volume":"19","author":[{"given":"K.","family":"Karthiga","sequence":"first","affiliation":[]},{"given":"A.","family":"Asuntha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,3]]},"reference":[{"key":"3580_CR1","doi-asserted-by":"publisher","first-page":"26163","DOI":"10.1109\/ACCESS.2024.3363442","volume":"12","author":"B Li","year":"2024","unstructured":"Li, B., Zhou, R., Yang, L., Wang, Q., Chen, H.: MilDetr: detection transformer for military camouflaged target detection. IEEE Access 12, 26163\u201326174 (2024)","journal-title":"IEEE Access"},{"key":"3580_CR2","unstructured":"Wise, C., Plested, J.: Developing imperceptible adversarial patches to camouflage military assets from computer vision enabled technologies. Computer vision and pattern recognition (2022). arXiv:2202.08892"},{"issue":"12","key":"3580_CR3","doi-asserted-by":"publisher","first-page":"1804","DOI":"10.3390\/e24121804","volume":"24","author":"X Jiang","year":"2022","unstructured":"Jiang, X., Cai, W., Zhang, Z., Jiang, B., Yang, Z., Wang, X.: MAGNet: a camouflaged object detection network simulating the observation effect of a magnifier. Entropy 24(12), 1804 (2022)","journal-title":"Entropy"},{"issue":"2","key":"3580_CR4","doi-asserted-by":"publisher","first-page":"1045","DOI":"10.1007\/s00500-021-05912-0","volume":"27","author":"B Janakiramaiah","year":"2023","unstructured":"Janakiramaiah, B., Kalyani, G., Karuna, A., Prasad, L.N., Krishna, M.: Military object detection in defense using multi-level capsule networks. Soft. Comput.Comput. 27(2), 1045\u20131059 (2023)","journal-title":"Soft. Comput.Comput."},{"key":"3580_CR5","doi-asserted-by":"publisher","first-page":"55546","DOI":"10.1109\/ACCESS.2022.3177628","volume":"10","author":"L Kong","year":"2022","unstructured":"Kong, L., Wang, J., Zhao, P.: YOLO-G: A lightweight network model for improving the performance of military targets detection. IEEE Access 10, 55546\u201355564 (2022)","journal-title":"IEEE Access"},{"issue":"20","key":"3580_CR6","doi-asserted-by":"publisher","first-page":"3263","DOI":"10.3390\/electronics11203263","volume":"11","author":"X Du","year":"2022","unstructured":"Du, X., Song, L., Lv, Y., Qiu, S.: A lightweight military target detection algorithm based on improved YOLOv5. Electronics 11(20), 3263 (2022)","journal-title":"Electronics"},{"issue":"3","key":"3580_CR7","doi-asserted-by":"publisher","first-page":"696","DOI":"10.23919\/JSEE.2022.000049","volume":"34","author":"Y Gan","year":"2023","unstructured":"Gan, Y., Liu, C., Li, H., Liu, Z.: A camouflage target detection method based on local minimum difference constraints. J. Syst. Eng. Electron. 34(3), 696\u2013705 (2023)","journal-title":"J. Syst. Eng. Electron."},{"issue":"4","key":"3580_CR8","doi-asserted-by":"publisher","first-page":"885","DOI":"10.3390\/rs15040885","volume":"15","author":"B Deng","year":"2023","unstructured":"Deng, B., Zhang, D., Dong, F., Zhang, J., Shafiq, M., Gu, Z.: Rust-style patch: a physical and naturalistic camouflage attacks on object detector for remote sensing images. Remote Sens. 15(4), 885 (2023)","journal-title":"Remote Sens."},{"issue":"7","key":"3580_CR9","doi-asserted-by":"publisher","first-page":"1288","DOI":"10.3390\/rs16071288","volume":"16","author":"B Zeng","year":"2024","unstructured":"Zeng, B., Gao, S., Xu, Y., Zhang, Z., Li, F., Wang, C.: Detection of military targets on ground and sea by UAVs with low-altitude oblique perspective. Remote Sens. 16(7), 1288 (2024)","journal-title":"Remote Sens."},{"key":"3580_CR10","first-page":"1","volume":"2022","author":"Y Gan","year":"2022","unstructured":"Gan, Y., Liu, C., He, Z., Li, H., Liu, Z.: Digital Camouflage pattern design based on the biased random walk. Model. Simul. Eng. 2022, 1\u201312 (2022)","journal-title":"Model. Simul. Eng."},{"issue":"6","key":"3580_CR11","doi-asserted-by":"publisher","first-page":"2101930","DOI":"10.1002\/adom.202101930","volume":"10","author":"J Kim","year":"2022","unstructured":"Kim, J., Park, C., Hahn, J.W.: Metal\u2013semiconductor\u2013metal meta surface for multiband infrared stealth technology using camouflage color pattern in visible range. Adv. Opt. Mater. 10(6), 2101930 (2022)","journal-title":"Adv. Opt. Mater."},{"issue":"5","key":"3580_CR12","doi-asserted-by":"publisher","first-page":"1188","DOI":"10.3390\/rs15051188","volume":"15","author":"X Jiang","year":"2023","unstructured":"Jiang, X., Cai, W., Ding, Y., Wang, X., Yang, Z., Di, X., Gao, W.: Camouflaged object detection based on ternary cascade perception. Remote Sens. 15(5), 1188 (2023)","journal-title":"Remote Sens."},{"issue":"4","key":"3580_CR13","doi-asserted-by":"publisher","first-page":"5785","DOI":"10.1007\/s11042-022-13274-4","volume":"82","author":"X Xu","year":"2023","unstructured":"Xu, X., Chen, S., Lv, X., Wang, J., Hu, X.: Guided multi-scale refinement network for camouflaged object detection. Multimed. Tools Appl. 82(4), 5785\u20135801 (2023)","journal-title":"Multimed. Tools Appl."},{"key":"3580_CR14","doi-asserted-by":"publisher","first-page":"1347898","DOI":"10.3389\/frai.2024.1347898","volume":"7","author":"CS Ike","year":"2024","unstructured":"Ike, C.S., Muhammad, N., Bibi, N., Alhazmi, S., Eoghan, F.: Discriminative context-aware network for camouflaged object detection. Front. Artif. Intell. 7, 1347898 (2024)","journal-title":"Front. Artif. Intell."},{"key":"3580_CR15","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1016\/j.neunet.2023.03.041","volume":"163","author":"J Sun","year":"2023","unstructured":"Sun, J., Yao, W., Jiang, T., Wang, D., Chen, X.: Differential evolution based dual adversarial camouflage: fooling human eyes and object detectors. Neural Netw.Netw. 163, 256\u2013271 (2023)","journal-title":"Neural Netw.Netw."},{"key":"3580_CR16","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1016\/j.dt.2021.09.004","volume":"21","author":"Y Liu","year":"2023","unstructured":"Liu, Y., Wang, C.Q., Zhou, Y.J.: Camouflaged people detection based on a semi-supervised search identification network. Defence Technol. 21, 176\u2013183 (2023)","journal-title":"Defence Technol."},{"issue":"15","key":"3580_CR17","doi-asserted-by":"publisher","first-page":"3755","DOI":"10.3390\/rs14153755","volume":"14","author":"T Hupel","year":"2022","unstructured":"Hupel, T., St\u00fctz, P.: Adopting hyperspectral anomaly detection for near real-time camouflage detection in multispectral imagery. Remote Sens. 14(15), 3755 (2022)","journal-title":"Remote Sens."},{"issue":"7","key":"3580_CR18","doi-asserted-by":"publisher","first-page":"3462","DOI":"10.1109\/TCSVT.2023.3234578","volume":"33","author":"Y Lv","year":"2023","unstructured":"Lv, Y., Zhang, J., Dai, Y., Li, A., Barnes, N., Fan, D.-P.: Toward deeper understanding of camouflaged object detection. IEEE Trans. Circuits Syst. Video Technol. 33(7), 3462\u20133476 (2023). https:\/\/doi.org\/10.1109\/TCSVT.2023.3234578","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"3580_CR19","doi-asserted-by":"publisher","first-page":"640","DOI":"10.3390\/photonics9090640","volume":"9","author":"J Zhao","year":"2022","unstructured":"Zhao, J., Zhou, B., Wang, G., Liu, J., Ying, J.: Camouflage target recognition based on dimension reduction analysis of hyperspectral image regions. Photonics 9, 640 (2022)","journal-title":"Photonics"},{"key":"3580_CR20","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1109\/LSP.2018.2825959","volume":"26","author":"Y Zheng","year":"2019","unstructured":"Zheng, Y., Zhang, X., Wang, F., Cao, T., Sun, M., Wang, X.: Detection of people with camouflage pattern via dense deconvolution network. IEEE Signal Process. Lett. 26, 29\u201333 (2019). https:\/\/doi.org\/10.1109\/LSP.2018.2825959","journal-title":"IEEE Signal Process. Lett."},{"key":"3580_CR21","first-page":"103645","volume":"126","author":"S Wang","year":"2024","unstructured":"Wang, S., Xu, Y., Zeng, D., Huang, F., Liang, L.: Deep learning-based spectral reconstruction in camouflaged target detection. Int. J. Appl. Earth Obs. Geoinf. 126, 103645 (2024)","journal-title":"Int. J. Appl. Earth Obs. Geoinf."},{"issue":"1","key":"3580_CR22","first-page":"45","volume":"59","author":"J Sambbantham","year":"2023","unstructured":"Sambbantham, J., Balasubramanian, G., Rajarathnam, Tiwari, M.: A linear differentiation scheme for Camouflaged target detection using convolution neural networks. Eng. Proc. 59(1), 45 (2023)","journal-title":"Eng. Proc."},{"key":"3580_CR23","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1016\/j.dt.2023.12.011","volume":"34","author":"S Wang","year":"2024","unstructured":"Wang, S., Zeng, D., Xu, Y., Yang, G., Huang, F., Chen, L.: Towards complex scenes: a deep learning-based camouflaged people detection method for snapshot multispectral images. Defence Technol. 34, 269\u2013281 (2024)","journal-title":"Defence Technol."},{"key":"3580_CR24","doi-asserted-by":"publisher","unstructured":"Xiao, F., Hu, S., Shen, Y., Fang, C., Huang, J., He, C., Tang, L., Yang, Z., Li, X.: A survey of Camouflaged object detection and beyond (2024). https:\/\/doi.org\/10.48550\/arXiv.2408.14562","DOI":"10.48550\/arXiv.2408.14562"},{"key":"3580_CR25","first-page":"1","volume":"99","author":"C Zhang","year":"2023","unstructured":"Zhang, C., Bi, H., Xiang, T.-Z., Wu, R., Tong, J., Wang, X.: Collaborative camouflaged object detection: a large-scale dataset and benchmark. IEEE Trans. Neural Netw. Learn. Syst. 99, 1\u201315 (2023)","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"3580_CR26","doi-asserted-by":"publisher","first-page":"102802","DOI":"10.1016\/j.ecoinf.2024.102802","volume":"83","author":"Y Liu","year":"2024","unstructured":"Liu, Y., Che, S., Ai, L., Song, C., Zhang, Z., Zhou, Y., Yang, X., Xian, C.: Camouflage detection: Optimization-based computer vision for Alligator sinensis with low detectability in complex wild environments. Ecol. Inform. 83, 102802 (2024)","journal-title":"Ecol. Inform."},{"key":"3580_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/08839514.2021.1922841","volume":"35","author":"I Iqbal","year":"2021","unstructured":"Iqbal, I., Odesanmi, G.A., Wang, J., Liu, L.: Comparative investigation of learning algorithms for image classification with small dataset. Appl. Artif. Intell. 35, 1\u201320 (2021)","journal-title":"Appl. Artif. Intell."},{"issue":"1","key":"3580_CR28","doi-asserted-by":"publisher","first-page":"150","DOI":"10.3390\/electronics11010150","volume":"11","author":"M Zheng","year":"2022","unstructured":"Zheng, M., Luo, W.: Underwater image enhancement using improved CNN based defogging. Electronics 11(1), 150 (2022)","journal-title":"Electronics"},{"issue":"4","key":"3580_CR29","doi-asserted-by":"publisher","first-page":"668","DOI":"10.3390\/diagnostics13040668","volume":"13","author":"S Athisayamani","year":"2023","unstructured":"Athisayamani, S., Antonyswamy, R.S., Sarveshwaran, V., Almeshari, M., Alzamil, Y., Ravi, V.: Feature extraction using a residual deep convolutional neural network (ResNet-152) and optimized feature dimension reduction for MRI brain tumor classification. Diagnostics 13(4), 668 (2023)","journal-title":"Diagnostics"},{"issue":"22","key":"3580_CR30","doi-asserted-by":"publisher","first-page":"7157","DOI":"10.1002\/cpe.7157","volume":"34","author":"A Gopatoti","year":"2022","unstructured":"Gopatoti, A., Vijayalakshmi, P.: Multi-texture features and optimized Deep-Net for COVID-19 detection using chest x-ray images. Concurr. Comput. Pract. Exp. 34(22), 7157 (2022)","journal-title":"Concurr. Comput. Pract. Exp."},{"key":"3580_CR31","doi-asserted-by":"publisher","first-page":"17920","DOI":"10.1109\/ACCESS.2022.3149824","volume":"10","author":"AK Sharma","year":"2022","unstructured":"Sharma, A.K., Tiwari, S., Aggarwal, G., Goenka, N., Kumar, A., Chakrabarti, P., Chakrabarti, T., Gono, R., Leonowicz, Z., Jasi\u0144ski, M.: Dermatologist-level classification of skin cancer using cascaded ensembling of convolutional neural network and handcrafted features based deep neural network. IEEE Access 10, 17920\u201317932 (2022)","journal-title":"IEEE Access"},{"issue":"1","key":"3580_CR32","doi-asserted-by":"publisher","first-page":"458","DOI":"10.1186\/s12859-023-05584-7","volume":"24","author":"P Kavitha","year":"2023","unstructured":"Kavitha, P., Ayyappan, G., Jayagopal, P., Mathivanan, S.K., Mallik, S., Al-Rasheed, A., Alqahtani, M.S., Soufiene, B.O.: Detection for melanoma skin cancer through ACCF, BPPF, and CLF techniques with machine learning approach. BMC Bioinform. 24(1), 458 (2023)","journal-title":"BMC Bioinform."}],"container-title":["Signal, Image and Video Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-024-03580-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11760-024-03580-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-024-03580-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,28]],"date-time":"2025-01-28T17:48:25Z","timestamp":1738086505000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11760-024-03580-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,3]]},"references-count":32,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"alternative-id":["3580"],"URL":"https:\/\/doi.org\/10.1007\/s11760-024-03580-9","relation":{},"ISSN":["1863-1703","1863-1711"],"issn-type":[{"value":"1863-1703","type":"print"},{"value":"1863-1711","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,3]]},"assertion":[{"value":"21 June 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 November 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 November 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 December 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"49"}}