Simulation Design of Camouflage Target Concealing Strategy Based on Evolutionary Computation
ZHOU Ying1,2, XIE Zhenping1,2, JIANG Xiaojun3
(1.School of Artificial Intelligence and Computer Science,Jiangnan University,Wuxi 214122,Jiangsu,China;2.Jiangsu Key Laboratory of Media Design and Software Technology,Wuxi 214122,Jiangsu,China;3.Science and Technology on Near-Surface Detection Laboratory,Wuxi 214035,Jiangsu,China)
[1] 杨恒伏.数字图像主动伪装技术研究综述[J].激光与红外,2012,42(5):481-489. YANG H F.Survey of active camouflage technique for digital image[J].Laser & Infrared,2012,42(5):481-489.(in Chinese) [2] 李中华,喻钧,胡志毅,等.基于纹理合成与最佳缝合线的不同平面数码迷彩拼接方法[J].兵工学报,2019,40(3):666-672. LI Z H,YU J,HU Z Y,et al.A method of stitching digital camouflage patterns on different planes based on texture synthesis and best seam line algorithm[J].Acta Armamentarii,2019,40(3):666-672.(in Chinese) [3] 王会鹏,王明忠,邱康.一种烟幕遮障下的伪装目标协同识别方法[J].红外技术,2014,36(5):404-408. WANG H P,WANG M Z,QIU K. A cooperative recognition method for the smokescreen-cover camouflage target[J].Infrared Technology, 2014,36(5):404-408.(in Chinese) [4] 卓刘,陈晓琪,谢振平,等.基于深度神经网络的迷彩目标发现仿真学习方法[J].激光与光电子学进展,2019,56(7):154-160. ZHUO L,CHEN X Q,XIE Z P,et al.Simulation learning method for discovery of camouflage targets based on deep neural networks[J].Laser & Optoelectronics Progress,2019,56(7):154-160.(in Chinese) [5] 喻钧,双晓.仿造数码迷彩的设计方法[J].应用科学学报,2012,30(4):331-334. YU J,SHUANG X.Design of imitation digital camouflage[J].Journal of Applied Sciences-Electronics and Information Engineering,2012,30(4):331-334.(in Chinese) [6] 蔡云骧,石磊,田振锡.一种基于装备三维模型的数码迷彩图案设计方法[J].兵工学报,2019,40(11):2296-2303. CAI Y X,SHI L,TIAN Z X.A digital pattern design method based on equipment three-dimensional model[J].Acta Armamentarii,2019,40(11):2296-2303. (in Chinese) [7] 初苗,田少辉,喻钧,等.数码迷彩空间混色程度的表征方法研究[J].兵工学报,2016,37(7):1306-1311. CHU M,TIAN S H,YU J,et al.An approach of characterizing the degree of spatial color mixture[J].Acta Armamentarii,2016,37(7): 1306-1311.(in Chinese) [8] 毕 胜,郑林,吴耀武,等.迷彩伪装图案计算机辅助设计研究[J].系统仿真学报,2013,25(9):2164-2170. BI S,ZHENG L,WU Y W,et al.Research on computer-aided designing system of camouflage pattern[J].Journal of System Simulation,2013,25(9):2164-2170. (in Chinese) [9] 陈善静,康青,王正刚,等.仿生伪装图案遗传进化设计方法研究[J].仪器仪表学报,2017,38(2):425-435. CHEN S J,KANG Q,WANG Z G,et al.Bionic camouflage pattern design by genetic evolutionary algorithms[J].Chinese Journal of Scientific Instrument,2017,38(2):425-435. (in Chinese) [10] 崔宝生,薛士强,姬艳军,等.图像特征的伪装效果评估技术[J].红外与激光工程,2010,39(6):1178-1183. CUI B S,XUE S Q,JI Y J,et al.Camouflage effectiveness evaluation based on image feature[J]. Infrared and Laser Engineering,2010,39(6):1178-1183.(in Chinese) [11] 马世欣,刘春桐,李洪才,等.基于高光谱图像探测与感知的伪装效果评估方法[J].兵工学报,2019,40(7):1485-1494. MA S X,LIU C T,LI H C,et al.Camouflage effect evaluation based on hyperspectral image detection and visual perception[J].Acta Armamentarii,2019,40(7):1485-1494.(in Chinese) [12] 杨鑫,许卫东,贾其.一种基于特征统计的动态伪装效果评估方法[J].兵工学报,2019,40(8):1693-1699. YANG X,XU W D,JIA Q.A dynamic camouflage effect evaluation method based on feature statistics[J].Acta Armamentarii,2019,40(8):1693-1699. (in Chinese) [13] REN S Q,HE K M,GIRSHICK R,et al.Faster R-CNN:towards real-time object detection with region proposal networks[J].IEEE Transactions on Pattern Analysis & Machine Intelligence,2017,39(6):1137-1149. [14] CHEN L C,PAPANDREOU G,KOKKINOS I,et al.DeepLab:semantic image segmentation with deep convolutional nets,atrous convolution,and fully connected CRFs[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,2018,40(4):834-848. [15] GARCIA-GASULLA D,PARS F,VILALTA A,et al. On the behavior of convolutional nets for feature extraction[J].Journal of Artificial Intelligence Research,2018,61:563-592. [16] WANG Z J,ZHAN Z H,KWONG S,et al.Adaptive granularity learning distributed particle swarm optimization for large-scale optimization[J].IEEE Transactions on Cybernetics,2021,51(3):1175-1188. [17] LI W,MENG X,HUANG Y,et al. Multipopulation cooperative particle swarm optimization with a mixed mutation strategy[J]. Information Sciences,2020,529:179-196. [18] FENG H M,HORNG J H,JOU S M. Bacterial foraging particle swarm optimization algorithm based fuzzy-VQ compression systems[J].Journal of Information Hiding and Multimedia Signal Processing,2012,3(3): 227-239. [19] MURRAY I A.Advances in markov chain monte carlo methods[D].London,UK:University of London,2007. [20] LIU J S.Monte carlo strategies in scientific computing[M].New York,NY,US:Springer,2008. [21] XIE Z P,SUN J,PALADE V,et al. Evolutionary sampling: a novel way of machine learning within a probabilistic framework[J].Information Sciences,2015,299:262-282. [22] LEHMAN J,CLUNE J,MISEVIC D,et al. The surprising creativity of digital evolution: a collection of anecdotes from the evolutionary computation and artificial life research communities[J]. Artificial Life,2020,26(2): 274-306. [23] DUAN R J,MA X J,WANG Y S,et al. Adversarial camouflage: hiding physical-world attacks with natural styles[C]∥Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.Seattle,WA,US:IEEE,2020:1000-1008.