Nothing Special   »   [go: up one dir, main page]

Next Article in Journal
Complex Knowledge Base Question Answering for Intelligent Bridge Management Based on Multi-Task Learning and Cross-Task Constraints
Previous Article in Journal
An Empirical Mode Decomposition Fuzzy Forecast Model for Air Quality
You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

MAGNet: A Camouflaged Object Detection Network Simulating the Observation Effect of a Magnifier

Xi’an Research Institute of High Technology, Xi’an 710064, China
*
Author to whom correspondence should be addressed.
Entropy 2022, 24(12), 1804; https://doi.org/10.3390/e24121804
Submission received: 19 September 2022 / Revised: 1 December 2022 / Accepted: 6 December 2022 / Published: 9 December 2022
(This article belongs to the Topic Applications in Image Analysis and Pattern Recognition)
Figure 1
<p>Schematic diagram of the observation of a camouflaged soldier and tank with a magnifier. (<b>a</b>) Camouflaged objects; (<b>b</b>) Observe camouflage objects with a magnifier.</p> ">
Figure 2
<p>The difference between camouflage objects and salient objects. (<b>a</b>) Image; (<b>b</b>) Salient object; (<b>c</b>) Camouflaged object.</p> ">
Figure 3
<p>MAGNet structure.</p> ">
Figure 4
<p>The structure of the CEM.</p> ">
Figure 5
<p>Schematic diagram of the central excitation effect of CEM.</p> ">
Figure 6
<p>Structure of the MFFM module. (UP: upsample, CBR: Conv+BatchNorm+ReLU).</p> ">
Figure 7
<p>The structure of the CSAM. (H refers to the Hadamard product, L2, L3, and L4 refer to Res2-Layer2, Res2-Layer3, and Res2-Layer4, respectively).</p> ">
Figure 8
<p>Comparison of the algorithm’s radar plot on each indicator. (For the convenience of display, set MAE = 1 − MAE; best viewed in color. †: generic object detection methods, ⁑: medical image segmentation method, ◊: saliency object detection method, ⸙: COD method.).</p> ">
Figure 9
<p>Loss value curves.</p> ">
Figure 10
<p>Visualization results for all algorithms on public datasets.(†: generic object detection methods, ⁑: medical image segmentation method, ⸙: COD method, bold: our method.)</p> ">
Figure 11
<p>Visualization of MAGNet feature maps. (F<sub>EMM</sub>: output by the EMM, F<sub>AFM</sub>: output by the AFM, F<sub>fuse</sub>: final fused camouflaged object map).</p> ">
Figure 12
<p>Decline curve of Loss value (solid line is the smoothed decline curve).</p> ">
Figure 13
<p>Visualization results on the in-house military camouflaged object dataset. (⁑: medical image segmentation method, ◊: saliency object detection method, ⸙: COD method, bold: our method).</p> ">
Figure 14
<p>Visualization of detection results on the Kvasir-SEG polyp dataset.</p> ">
Figure 15
<p>Visualization of the detection results on the magnetic tile defect dataset.</p> ">
Figure 16
<p>Visualization of detection results on the AAU-RainSnow dataset.</p> ">
Versions Notes

Abstract

:
In recent years, protecting important objects by simulating animal camouflage has been widely employed in many fields. Therefore, camouflaged object detection (COD) technology has emerged. COD is more difficult to achieve than traditional object detection techniques due to the high degree of fusion of objects camouflaged with the background. In this paper, we strive to more accurately and efficiently identify camouflaged objects. Inspired by the use of magnifiers to search for hidden objects in pictures, we propose a COD network that simulates the observation effect of a magnifier called the MAGnifier Network (MAGNet). Specifically, our MAGNet contains two parallel modules: the ergodic magnification module (EMM) and the attention focus module (AFM). The EMM is designed to mimic the process of a magnifier enlarging an image, and AFM is used to simulate the observation process in which human attention is highly focused on a particular region. The two sets of output camouflaged object maps were merged to simulate the observation of an object by a magnifier. In addition, a weighted key point area perception loss function, which is more applicable to COD, was designed based on two modules to give greater attention to the camouflaged object. Extensive experiments demonstrate that compared with 19 cutting-edge detection models, MAGNet can achieve the best comprehensive effect on eight evaluation metrics in the public COD dataset. Additionally, compared to other COD methods, MAGNet has lower computational complexity and faster segmentation. We also validated the model’s generalization ability on a military camouflaged object dataset constructed in-house. Finally, we experimentally explored some extended applications of COD.

1. Introduction

In nature, animals evolve according to the principle of survival of the fittest. They may be able to camouflage their shape or retain shape characteristics similar to those of their habitat to avoid being hunted by predators or to ambush prey better [1]. Currently, following the recent progress in various fields of science and technology, camouflage technology that simulates animal camouflage, such as camouflage clothing and nets [2], has been widely used in modern warfare.
In addition to its military application, camouflaged object detection (COD) can be applied in industrial detection (e.g., equipment defect detection [3]), medical diagnoses (e.g., testing whether lungs are infected with pneumonia [4,5]), monitoring and protection (e.g., suspicious person or unmanned aerial vehicle intrusion detection [6,7]), and unmanned driving (e.g., road obstacle detection [8]).
The task of COD is to detect objects that have similar patterns (e.g., color and texture) to their surroundings. However, studies on COD are lacking. For example, in military fields, military camouflaged objects are often identified by means of infrared-, polarization-, and hyperspectral-based imaging and other technologies [9,10,11]. However, the challenge of accurately segmenting camouflaged objects in the visible light band has been largely neglected in scientific research. Despite this, television guidance is still widely used by most countries because of its low cost and better visualization. The common method of countering television guidance is to camouflage the object, so the study of COD for visible images is greatly significant in military applications.
Before the rapid development of deep learning, researchers commonly used traditional digital image processing methods, such as spectral transforms [12], sparse matrices [13], and human vision systems [14]. However, the traditional methods achieve image segmentation by some artificially set rules. Primarily, scholars theoretically argue for the rationality of the rule and then experimentally verify its effectiveness. Nevertheless, actual segmentation scenes are often more complex than validation scenes, and predefined rules cannot be flexibly adjusted according to image features, which leads to less-than-ideal results from traditional methods (Some of the experimental results are published at https://github.com/jiangxinhao2020/Magnet_eval (accessed on 1 December 2022)). Now, with the development of deep learning technology, some scholars have applied segmentation to the detection of camouflaged objects, providing new ideas for the detection of camouflaged objects in visible wavelengths [15]. However, existing COD models based on deep learning are often complex in terms of design principles and network structure in the pursuit of higher accuracy rates, which will make the computational complexity and number of parameters of the model large.
The originality of this study is that, instead of rigidly solving the problem from the perspective of deep learning, we took our inspiration from life observations and designed a segmentation network suitable for camouflaged objects by simulating the magnifying glass observation effect on a target. This is called the MAGnifier Network (MAGNet). MAGNet differs from other COD methods in that it has a clearer structure and can achieve a better segmentation performance with lower computational complexity. Figure 1 is a schematic diagram demonstrating a search for camouflaged military objects based on observation with a magnifier. With the influence of the camouflage coating, external camouflage materials, smoke barriers, and ground object shielding, the soldier and tank in Figure 1a achieve near-perfect integration with the background. However, Figure 1b shows that the camouflaged objects in the picture can be simply and effectively observed with a magnifier. Firstly, the magnifier visually enlarges the observation area, and we can then observe edge information and key parts of camouflaged objects in the enlarged area. Therefore, we can focus on the key points to accurately identify camouflaged objects in the region.
In summary, the major contributions of this paper are threefold:
  • We apply the concept of observation with a magnifier to the COD problem and propose a novel camouflaged object segmentation network called MAGNet with a clear structure. MAGNet can achieve higher segmentation accuracy with lower computational complexity.
  • We design a parallel structure with the ergodic magnification module (EMM) and attention focus module (AFM) to simulate the magnifier functions. We propose a weighted key point area perception loss function to improve the focus of the camouflaged object, thus improving segmentation performance.
  • We perform extensive experiments using public COD benchmark datasets and a camouflaged military object dataset constructed in-house. MAGNet has the best comprehensive effect in eight evaluation metrics in comparison with 19 cutting-edge detection models, and it can enable real-time segmentation. Finally, we experimentally explore several potential applications of camouflaged object segmentation.
This paper is organized as follows. Similar previous research is introduced in Section 2. Section 3 provides detailed descriptions of our MAGNet and the associated modules. Section 4 presents comparative experiments and quantitative and qualitative analyses of the experimental results. Finally, Section 5 concludes the paper.

2. Related Research

2.1. Semantic Segmentation Based on Deep Learning

In recent years, scene understanding technologies for use in autonomous driving [16], virtual reality [17], and augmented reality [18] have rapidly developed. As the basic scene understanding task, semantic segmentation technology based on pixel-by-pixel classification has been widely studied [19,20,21]. Many semantic segmentation methods based on deep learning have been proposed [22,23,24,25]. Currently, there are four main types of networks: fully convolutional networks (FCNs) [26], convolutional neural networks (CNNs) [27], recurrent neural networks (RNNs) [28], and generative adversarial networks (GANs) [29].

2.2. Salient Object Detection Based on Deep Learning

In contrast to camouflaged objects, salient objects are the most noticeable objects in an image. The research of salient object detection (SOD) can promote image understanding [30], stereo matching [31,32], and medical disease detection [33,34,35]. In recent years, salient object detection based on deep learning has been improved by multi-scale feature fusion [36], attention mechanisms [37], and edge information [38]. Research on SOD can provide insights into COD in terms of design principles.

2.3. Camouflaged Object Detection Based on Deep Learning

Figure 2 shows the difference between a camouflaged object and a salient object. As can be seen, COD is more difficult than SOD. It should be noted that scholars commonly use the terms “camouflage target segmentation” and “camouflage object detection” interchangeably; therefore, this paper continues to use the term COD. The year 2020 can be regarded as the first year of research on COD based on deep learning. Fan et al. [39] constructed a complete camouflaged object dataset named COD10K and presented a corresponding camouflaged object segmentation network that promotes rapid COD development. In 2021, Mei et al. [40] simulated the predation process of animals and proposed PFNet, a camouflaged object segmentation network based on distraction mining. Lv et al. [41] proposed a joint learning network that can simultaneously localize, segment, and rank camouflaged objects and proposed a new COD dataset called NC4K. However, the design principles and network structures of the existing COD models are relatively complex. This paper presents a bionic model based on observation with a magnifier. This principle is easy to understand, and its structure is simple and efficient.

2.4. COD Dataset

Because of the similarity between a camouflaged object and the background, the boundary between the foreground and the background is very difficult to distinguish; therefore, the production of a camouflaged object dataset is very time-consuming [42]. Currently, three major published datasets are the most commonly used. The number of images in the CHAMELEON dataset is small, with only 76 published images collected from the internet [43]. The CAMO dataset contains 1250 images in eight categories [44]. In 2020, Fan et al. proposed the COD10K universal camouflaged object dataset, which has 78 subclasses of 10K images, and this dataset is very precise and challenging [39].

3. MAGNet Detection Model

A magnifier can help an observer quickly find a camouflaged object in an image. This is because the magnifying effect of the magnifier makes it easier for the observer to spot the center, key points, and minuscule details of the camouflaged object. Inspired by the magnifier, we applied the magnifier observation effect to the COD problem and designed the EMM and the AFM. The EMM is designed to mimic the process of a magnifier enlarging an image, mainly using the designed central excitation module to excite the center and magnify the receptive field. Additionally, AFM is used to simulate the human visual system, and its channel-spatial attention module can simulate the effect of a human focusing on observing objects in the magnifier’s field of view. Finally, we design a more applicable weighted key point area perception loss function for camouflaged object segmentation, which directs more attention to the camouflaged object in the region by weighting. The network structure of MAGNet is shown in Figure 3, which has a clear structure with two sets of branches forming a parallel structure and finally fuses two sets of feature maps to achieve the final camouflage object recognition.

3.1. Network Overview

We input a camouflaged object image into this network. MAGNet first extracts multi-scale feature maps through a Res2Net-50 backbone [45], and Res2Net consists of one layer of CBRM (Conv+BatchNorm+ReLU Module) and four standard Res2-Layers. Additionally, the latter three feature maps were then fed to the EMM and the AFM in parallel. Finally, the output feature maps of the two modules are fused to simulate observation with a magnifier.

3.2. Ergodic Magnification Module (EMM)

As shown in Figure 3, the EMM consists of two parts, i.e., the central excitation module (CEM) and the multi-scale feature fusion module (MFFM).
The CEM is used to traverse the feature maps of the different scales of output from the last three layers of the backbone to expand the receptive field and intensify the central point and key points.
The MFFM is designed to fully integrate the multi-scale feature maps after the CEM to realize the efficient utilization of high-level and low-level features.

3.2.1. Central Excitation Module (CEM)

We find that when observers use a magnifier to observe an object, they observe the central area of the magnifying glass more carefully than the edge areas. With the human visual receptive field mechanism, an observer is more attracted to the center of an object. Then, we use the magnifier to traverse the whole picture until the center of the magnifier coincides with the center of the object. Several studies [46] discuss the differences between the receptive field mechanism in deep learning and the biological receptive field mechanism through a large number of experiments and points out that the value of the pixel in the center of the receptive field responds more to the output feature map than the pixel at the edges. This inspired us to design a receptive field mechanism not only to expand the receptive field but also to motivate key points.
To simulate the visual magnification and central excitation of the magnifier, we design a simple and efficient CEM, as shown in Figure 4. The realization of the above functions mainly depends on dilated convolution (DConv) with different sizes of convolution kernels [47].
Specifically, the CEM consists of four branches, and the input feature maps are simultaneously fed into all four branches. The four branches first use a 1 × 1 convolution to change the number of output channels. Then, to achieve efficient multi-scale visual amplification, three of the branches use 3 × 3, 5 × 5, and 7 × 7 DConvs with an expansion factor of 2. After the three sets of output feature maps were connected, a 3 × 3 convolutional layer was used for fusion between channels. The fourth branch is the residual connection module, which aims to retain part of the original features to reduce the feature loss due to convolution. The two sets of features are connected to obtain a centrally excited feature map. The multi-scale centrally excited feature maps obtained from the last three layers of backbone input to the CEM have the same number of channels to ensure a balanced utilization of information at each scale.
The connection of three sets of DConvs can increase the importance of the central features while increasing the receptive field, thus achieving a central excitation of the input. The visualization of the feature map output from the CEM is shown on the right in Figure 5.

3.2.2. Multi-Scale Feature Fusion Module (MFFM)

The function of the MFFM is to fully integrate the feature maps after central excitation of different scales, thereby outputting a camouflaged object map that contains abundant high- and low-level features. The MFFM structure diagram is shown in Figure 6. The small-scale excitation feature map transmits the feature information to the large-scale feature map through continuous upsampling and fusion and then generates an output feature map with a size of 44 × 44 × 1.
The front-end fusion method of the module adopts the Hadamard product (⊙). The Hadamard product calculation method is a pixel-by-pixel multiplication, which can better achieve feature crossover, eliminating the difference between the two groups of features and improving the feature fusion capabilities.
The back end of the module is fused by adding the channels, which can fuse the features of each layer to increase the feature dimension but does not increase the internal feature information, making full use of the semantic information of the high-level and low-level features.
The module output map is denoted as Fout. Algorithm 1 is the pseudocode of the MFFM:
Algorithm 1: MFFM Algorithm
Input: CEM2, CEM3, CEM4.
   CEM4_1 = CEM4
   CEM3_1 = CBR (UP (CEM4))⊙CEM3
   CEM3_2 = Concat (CEM3_1, CBR (UP (CEM4_1)))
   CEM2_1 = CBR (UP (CEM3))⊙CEM2
   CEM2_2 = CBR (UP (CEM3_1))⊙CEM2_1
   CEM2_3 = Concat (CEM2_2, CBR (UP (CEM3_2)))
   Fout = CBR (CEM2_3)
Output: Fout.

3.3. Attention Focus Module (AFM)

AFM has two steps. First, through upsampling and convolution operations, the three sets of feature maps output by the backbone are processed into feature maps of the same size with the same number of channels. Then, the maps are input into the channel-spatial attention module (CSAM) to simulate the effect of human attention focused on observing objects in the magnifier field of view.

Channel-Spatial Attention Module (CSAM)

Attention mechanisms in deep learning can simulate the human visual attention mechanism, where the goal is to obtain more important information [46]. Attention mechanisms are divided into two types: spatial attention mechanisms and channel attention mechanisms. A spatial attention mechanism module can extract the most important regional features in the spatial domain and retain locally important information by spatial transformation. A channel attention mechanism module can assign different weights according to the importance of each channel so that the model focuses more on channels with more critical information [48]. The two methods have advantages and disadvantages, and the CSAM that we propose is a parallel fusion mechanism of spatial attention and channel attention, as shown in Figure 7.
As illustrated in Figure 7, the CSAM is implemented in four steps. Algorithm 2 is the pseudocode of the CSAM:
Algorithm 2: CSAM Algorithm
Input: L2, L3, L4.
   # 1. Feature Maps Concat
   X_original = Concat(L2, L3, L4)
   For i = 2, 3, 4:
   # 2. Spatial Attention
   xsa_i = SAmodule (Li)
   # 3. Channel Attention
   xca_i = CAmodule(Li)
   Xsa = Concat (xsa_3, xsa_4, xsa_5)
   Xsa = Softmax (Xsa)
   Xca = Concat (xca_3, xca_4, xca_5)
   # 4. Fusion Attention Maps
   Xout = X_original ⊙ Xca ⊙ Xsa
Output: Xout.
Feature Maps Concat: Superimposing the feature maps of the same size with the same number of channels in the latter three layers of the backbone after processing can achieve the average utilization of feature maps of each scale and fully fuse the semantic information of high- and low-level features. Therefore, the feature maps of the three different layers were input into the channel attention and spatial attention mechanism branches to generate a channel attention map and a spatial attention map, respectively.
Channel Attention: The squeeze-and-excitation (SE) module is the most commonly used method of channel attention [49]. It can extract important features by assigning weights to each channel but does not learn the importance of location information. Therefore, we embedded the coordinate attention (CA) module [50], which can fully perceive position information, into CSAM. The CA module first aggregates features near key points in the image into a pair of key point direction-aware feature maps K H ( C , H , 1 )   K W ( C , 1 , W ) with different orientations using two 2D-average-pooling operations in the horizontal and vertical dimensions.
K W ( c , 1 , w ) = 1 H 0 i < H F i n p u t ( c , i , w ) , 0 c < C , 0 w < W
K H ( c , h , 1 ) = 1 W 0 j < W F i n p u t ( c , h , j ) , 0 c < C , 0 h < H
where F i n p u t denotes the input feature maps, and the two direction-aware feature maps are fused by cascade and convolution operations, yielding the following:
F ( C 1 , 1 , W + H ) = ξ ( C o n v C 1 ( K ( C , H , 1 ) , K ( C , 1 , W ) ) )
where , denotes the concatenation operation along the spatial dimension, C o n v C 1 ( ) denotes the 1 × 1 convolution with C1 convolution kernels, and ξ ( ) denotes BatchNorm and HardSwish operations on feature maps. The fused feature maps were sliced and encoded into two attention maps storing location information.
F H ( C , H , 1 ) , F W ( C , 1 , W ) = δ ( C o n v C ( S l i c e [ F ( C 1 , 1 , W + H ) ] ) )
where S l i c e [ ] denotes the slice operation along the spatial dimension and C o n v C ( ) denotes the 1 × 1 convolution with C convolution kernels. δ ( ) denotes the sigmoid activation function.
Finally, the new and old feature maps were multiplied pixel by pixel by a Hadamard convolution to generate a channel attention map with embedded location and direction information.
F o u t p u t ( c , i , j ) = F i n p u t ( c , i , j ) F H ( c , i , 1 ) F W ( c , 1 , j ) , 0 c < C , 0 i < H , 0 j < W
Spatial Attention: The spatial attention mechanism is particularly important for finding special targets and can retain important local information. For the input feature map F I n , we first used GroupNorm (GN) for group normalization. The second step was to use a set of trainable parameters, weight ( ω ) and bias ( β ), to assign spatial weights to enhance the representation abilities of the feature map. The third step is to use a sigmoid function for activation and then multiply the F I n pixel by pixel to obtain the spatial attention map F S A M :
F S A M = F I n δ ( ω G N ( F I n ) + β )
Finally, we connect three sets of spatial attention maps and use softmax to normalize again.
Fusion Channel and Spatial Attention Maps: We use the Hadamard product for the fusion of attention maps, that is, the pixel-by-pixel multiplication method, which can better enhance feature information to obtain a more accurate feature map.

3.4. Output Prediction and Loss Function

Finally, the feature maps output by the EMM and AFM are transformed into a single-channel camouflaged object map through an upsampling operation. The two feature maps are fused by pixel-by-pixel addition.
The binary cross entropy (BCE) loss function and the intersection over union (IOU) loss function are the most common [51] functions for a large number of target segmentation algorithms. However, the BCE loss and IOU loss averages of all the pixel points cannot be applied to COD. In these images, camouflaged objects require more attention than other objects (especially salient objects) due to their indistinguishable characteristics.
Combining the designed pair of focusing and amplifying modules, we propose a weighted key point area perception loss based on the BCE loss and IOU loss ( L k a p w ), adding the key point area perception weight to jointly obtain the loss function:
L k a p w = L w b c e ( P , G T ) + L w i o u ( P , G T )
L w b c e ( P , G T ) = i = 1 H j = 1 W w i j * L b c e ( P , G T ) i = 1 H j = 1 W w i j
L w i o u ( P , G T ) = 1 i = 1 H j = 1 W L i , j e n t e r * w i j i = 1 H j = 1 W L i , j u n i o n * w i j
where P is the prediction map, GT is the ground truth map, H and W are the picture length and width, respectively, and L b c e ( P , G T ) is the original BCE loss function. The expression for the key point area perception weight w i , j is as follows:
w i , j = h , w G T h , w h w G T i , j , h , w G T h , w h w < 1 2 1 h , w G T h , w h w G T i , j , h , w G T h , w h w > 1 2
where h and w are the sizes of the regions around the pixel points in the GT map, and h , w G T h , w denotes the sum of the values of all the pixel points within the region h × w centered on the pixel point ( i , j ) in the GT map. h and w are as small as possible because taking a value that is too large will affect model efficiency. However, it should not be smaller than the maximum perceptual field of 32 × 32 for a single pixel (i.e., the maximum number of downsampling multiples). Therefore, a region range of size 33 × 33 was selected in this experiment, and 33 as an odd number also avoids the case where the weight is equal to 1/2 and G T i , j is the value of the pixel point ( x , y ) in the GT map. From Equation (10), it can be seen that the key point area perception weight directs more attention to the camouflaged object regardless of the percentage of the camouflaged object in the region, thus making the model training favorable to segmenting camouflaged objects.

4. Experimental Results and Analysis

4.1. Preparation Work

In this experiment, the experimental platform system used was Windows 10, the GPU of the platform was an NVIDIA Quadro GV100, and the video memory was 32 GB. The CPU was an Intel Xeon Silver 4210. The experiment used the PyTorch deep learning development framework, and the computing platform was CUDA11.0. We used the Adam optimizer for network optimization during training, the image input size was set to 352 × 352, and the learning rate was set to 0.0001.

4.1.1. Dataset Preprocessing

We evaluate the CAMO [44] and COD10K [39] datasets with relatively large data volumes. CAMO includes 1250 images, and COD10K includes 5066 camouflage images. The combined total of 6316 images is divided into a training set, validation set, and testing set according to a ratio of 6:2:2. In addition, we performed validation experiments on a military camouflaged object dataset that we constructed. The dataset contains 2700 images of camouflaged soldiers and tanks. The details of the dataset are shown in Table 1, and the division ratio is also 6:2:2.

4.1.2. Evaluation Metrics

At present, there are many evaluation metrics suitable for COD, and each metric focuses on different points. Based on previous scholars’ research, we selected eight evaluation metrics. A brief introduction of the metrics is as follows: The structure measure ( S α ) is a structural similarity evaluation metric focusing on evaluating the structural information of the prediction map [52]. The weighted F-measure ( F β w ) is a comprehensive evaluation of the accuracy and recall rate of the prediction map [53]. The mean absolute error (MAE) is the sum of the absolute values of differences between the pixels of the prediction map and the GT map [54]. The adaptive enhanced alignment measure ( E ϕ a d ) can evaluate the pixel-level similarity effect and obtain image-level statistics [55]. The mean Dice coefficient (meanDic) represents the percentage of correctly segmented area to true area in the GT image [56]. The mean intersection over union (meanIOU) is the ratio of the area of overlap and concatenation between the predicted and ground truth maps. The mean sensitivity (meanSen) measures the percentage of predicted correct results according to the GT image. The mean specificity (meanSpe) measures the percentage of predicted incorrect results according to the GT image. The FPS uses NVIDIA 3060 for evaluating segmentation speed.

4.1.3. Comparison Methods

To prove the effectiveness of the MAGNet proposed in this paper, we compared it with 19 classical and state-of-the-art algorithms. These include generic object detection methods, MaskRCNN [57], HTC [58], Swin-S [59], and DetectoRS [60]; medical image segmentation methods, UNet++ [61], HarDNet [62], PraNet [5], SANet [25], CaraNet [63], and UACANet-L [64]; SOD methods BASNet [65], SCRN [66], F3Net [51], and GCPANet [67]; and COD methods SINet-V1 [39], Rank-Net [41], PFNet [40], SINet-V2 [68], and ZoomNet [69]. For a fair comparison of segmentation performance, all algorithms are trained, validated, and tested using the partitioned dataset discussed in Section 4.1.1, and the input sizes are set to 352 × 352. In addition, the evaluation metrics are calculated using the same set of codes. The evaluation code uses the toolboxes disclosed by PFNet [40] and SINet-V2 [68].

4.2. Comparison with State-of-the-Art Algorithms on Public Datasets

4.2.1. Quantitative Comparison

Table 2 comprehensively reports the quantitative results of MAGNet and the latest algorithms on the combined dataset. Figure 8 is a radar plot of eight indicators. As seen from the table, MAGNet exhibits the best comprehensive performance according to the eight standard accuracy evaluation metrics, achieving the best performance in the S α , F β w , meanDic and meanIOU metrics. The meanSpe MAGNet is essentially equal to that of SINet-V2. MAGNet does not optimize this metric because it can extract the features of camouflaged objects, which readily results in a certain number of false positives. From the perspective of detection speed, the fastest methods are the lightweight algorithms, SANet and F3Net. The main innovation of these two algorithms is to increase the detection speed and reduce the computational complexity and parameters, which inevitably affects segmentation accuracy. As seen from the table, these two algorithms are the networks with the lowest segmentation accuracy in the corresponding years. It is noteworthy that the MAGNet has the highest FPS among the existing COD algorithms (>30FPS means real-time), and the GFLOPs of MAGNet rank third among all algorithms, surpassing the lightweight algorithm F3Net. Taken together, MAGNet can segment camouflage targets accurately in real-time.
Figure 9 shows the training loss value curves of MAGNet and the optimal COD detection algorithm SINet-V2 [68]. From the figure, we can see that the loss value of MAGNet decreases faster, leveling off at 20 epochs and the final loss value is lower.
It can be seen from the table that the FPS and computational complexity of non-COD methods are generally better than that of COD methods. This is because the existing COD models based on deep learning in the pursuit of higher accuracy rates are often complex in terms of design principles and network structures. Therefore, we compared the computational complexity of all COD methods. As shown in Table 3, MAGNet’s FPS and FLOPs are ahead of other networks, and the number of parameters is essentially the same as SINet-V2. This is attributed to the clear and efficient network structure of MAGNet, which makes the model more lightweight and faster in segmentation.

4.2.2. Qualitative Comparisons

As shown in Table 2, the algorithms from 2021 onwards perform better in COD. Figure 10 shows the visualization results of all algorithms since 2021. It can be observed that MAGNet can more accurately segment camouflaged targets. The EMM can better identify small targets hidden in complex backgrounds by magnifying the receptive field and fusing multi-scale features, as the hidden GhostPipefish in the second column, the MAGNet achieves the lowest missed segmentation. In contrast, most non-COD algorithms (e.g., UACANet-L, DetectoRS) tend to be more effective in salient regions of the image, and thus, do not apply to COD. AFM can acquire more important information in channels and space by simulating the human visual attention mechanism to accurately segment the details of camouflaged objects. As observed in the fifth column, MAGNet can better segment the frog’s obscured head. Using the weighted key point area, perception-loss function causes the model to focus more on the regions near the key points of a camouflaged object. As shown in the first column and the third column, MAGNet can achieve the lowest segmentation false positive rate.

4.3. Ablation Experiment

We conducted ablation experiments to verify the effectiveness of two specific modules designed for COD: the EMM and AFM.

4.3.1. Quantitative Comparison

The results of the MAGNet ablation experiments are comprehensively reported in Table 4. Adding the two modules alone improves model performance significantly. Adding AFM optimizes meanSen due to the effect of the attention mechanism of the model, which reduces the probability of missed detection. The addition of the EMM optimizes meanSpe since the model’s receptive field magnifying mechanism works to reduce the model’s false positive probability. We also compare the results with the two key modules connected in series and parallel, ultimately finding that the parallel structure better maximizes the effects of both modules.

4.3.2. Qualitative Comparisons

We visualize the feature maps output by the EMM and AFM and compare them with the final fused camouflaged object map. The results are shown in Figure 11. The feature map output by the EMM proves that this module focuses more on the center of a camouflaged object, while the AFM can retain more important information about the target. The fused output camouflage feature map combines the advantages of both modules. The center of the camouflaged object is used as a key point to precisely find important information in the vicinity of the point, and thus, improving the accuracy of segmentation.

4.4. Comparison Experiment of Loss Function Parameter Settings

In Section 3.4, we detail the weighted, key-point-area perception loss. In Equation (10), h and w are the sizes of the regions around the pixel points in the GT map. We discuss the rules for the selection of h and w from a theoretical perspective, i.e., the following points need to be satisfied: (1) h and w should not be smaller than the maximum perceptual field of 32 × 32 for a single pixel; (2) should be as small as possible; and (3) should be set to an odd number. In this section, we selected 23 × 23, 33 × 33, and 43 × 43 for comparison experiments. Figure 12 shows the decreasing curve of the Loss value. From the figure, we can see that the decrease in the training loss value is not significant when set to 23 × 23 because the area involved in the calculation is smaller than the maximum perceptual field. When set to 43 × 43, the final loss value is similar to that when set to 33 × 33, but the area involved in the calculation is too large, resulting in a slight decrease in the loss value and a significant final fluctuation. Table 5 shows the quantitative evaluation of each group of experiments, and the evaluation results are not that different when set to 43 × 43. Still, it takes a longer time to train an epoch.
Therefore, experiments prove that when h and w are set to 33 × 33, they are more conducive to efficient training and can achieve the best performance.

4.5. Comparison of the In-House Military Camouflaged Object Dataset

Table 6 shows the experimental comparison results of the MAGNet method proposed in this paper and other methods on the military camouflaged object dataset built in-house. As seen in Table 6, MAGNet reaches the optimum in seven metrics and has the best comprehensive segmentation ability; in particular, the meanSen is improved by 6.4% compared with the next-best method UACANet-L, which means that the MAGNet model has the lowest missing detection rate. Since each image contains camouflaged objects, the meanSpe of each model is relatively high, while that of MAGNet is still 1% higher, which means that MAGNet simultaneously has the lowest false positive rate. The balance of the missed detection rate and the false positive rate is a testament to the stability of the network model and is particularly important in practical military applications. Figure 13 shows the results of the comparison experiments in this subsection on the in-house-built military camouflaged object dataset. We selected the two algorithms with the best overall performance besides MAGNet for comparison. We found that our MAGNet is better at extracting details (e.g., it can better segment the gun in the soldier’s hand, as shown in the first column) and has fewer missed regions and false alarm regions (e.g., the second and third columns).

4.6. Discussion

From the comparison with the latest methods in Section 4.2, we find that the results of several saliency object detection algorithms are unsatisfactory, which proves that it is not reasonable to apply saliency object detection algorithms to the detection of camouflaged objects. COD methods and medical image segmentation methods accounted for 96% (23/24) of the top three values of the eight metrics. The results show that medical image segmentation methods can achieve better results in camouflaged object segmentation tasks because some medical image datasets (e.g., polyp datasets) have properties similar to those of camouflaged objects, i.e., inconspicuous edges and high integration with the surrounding environment [70,71,72]. Therefore, COD has a high potential application in the medical field. Figure 14 shows the visualization results of MAGNET applied to polyp detection, where the dataset used for the experiment is the Kvasir-SEG polyp dataset [70]. Table 7 shows the experimental comparison between the MAGNet method proposed in this paper and other medical image segmentation methods in the Kvasir-SEG polyp dataset. Here, we follow the experimental setup used in the literature [5]. The quantitative results of other algorithms are used from the original paper. It is worth noting that although MAGNet is not specifically designed for polyp detection; its performance is close to that of the best polyp-detection networks (where it achieves sub-optimal performance) and where it is evident that MAGNet has high potential for applications. When using migration learning coupled with model optimization for MAGNet, quantitative evaluation may be an even better option.
In addition, we explore other extended applications similar to COD. Figure 15 shows the visualization results applied for defect detection in industry, where the used dataset is the magnetic tile defect dataset [73]. Figure 16 shows the visualization results from applying MAGNET to infrared vehicle detection in rain and fog at night with the AAU-RainSnow dataset [74]. In these applications, similar to camouflaged objects, the object to be detected exhibits a high degree of fusion with the background, so the detection of camouflaged objects can be extended to similar applications.

5. Conclusions

This paper is dedicated to achieving more accurate detection of camouflaged objects. By simulating the search function of a magnifier, we propose a new network based on the observed effect of a magnifier named MAGNet. We designed two bionic modules that can be processed in parallel and presented a more applicable weighted key-point- area perception loss that allows the network to exploit important information about an object further, and thus, achieving an accurate search for camouflaged objects. The results demonstrate the accuracy advantages of MAGNet for COD through quantitative and qualitative evaluation of challenging public datasets and an in-house-built dataset. MAGNet also offers lower computational complexity and faster segmentation than other COD methods. Additionally, MAGNet has potential value for applications in other fields (e.g., medical image segmentation, nighttime vehicle detection, and industrial defect detection). In the future, we will continue to explore the accurate recognition of low-detectability objects.

Author Contributions

Conceptualization, X.J.; Validation, Z.Y.; Formal analysis, X.J.; Data curation, B.J.; Writing—review & editing, Z.Z.; Visualization, X.W.; Supervision, W.C.; Project administration, X.J. All authors have read and agreed to the published version of the manuscript.

Funding

The authors would like to acknowledge the National Defense Science and Technology 173 Program Technical Field Fund Project (Grant No. 2021-JCJQ-JJ-0871) for funding our experiments.

Data Availability Statement

Data related to the current study are available from the corresponding author upon reasonable request. The codes used during the study are available from the corresponding author upon request. Additionally, some of the codes and results of this paper can be found at: https://github.com/jiangxinhao2020/Magnet_eval (accessed on 1 December 2022).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Stevens M, Merilaita S Animal camouflage: Current issues and new perspectives. Philos. Trans. R. Soc. B Biol. Sci. 2009, 364, 423–427. [CrossRef] [PubMed] [Green Version]
  2. Puzikova, N.; Uvarova, E.; Filyaev, I.; Yarovaya, L. Principles of an approach coloring military camouflage. Fibre. Chem. 2008, 40, 155–159. [Google Scholar] [CrossRef]
  3. Li, Y.; Zhang, D.; Lee, D.J. Automatic fabric defect detection with a wide-and-compact network. Neurocomputing 2019, 329, 329–338. [Google Scholar] [CrossRef]
  4. Zhang, M.; Li, H.; Pan, S.; Lyu, J.; Ling, S.; Su, S. Convolutional neural networks-based lung nodule classification: A surrogate-assisted evolutionary algorithm for hyperparameter optimization. IEEE Trans. Evol. Comput. 2021, 25, 869–882. [Google Scholar] [CrossRef]
  5. Fan, D.-P.; Ji, G.-P.; Zhou, T.; Chen, G.; Fu, H.; Shen, J.; Shao, L. PraNet: Parallel reverse attention network for polyp segmentation. In Medical Image Computing and Computer Assisted Intervention–MICCAI 2020; Springer International Publishing: Cham, Switzerland, 2020; pp. 263–273. [Google Scholar] [CrossRef]
  6. Zhou, M.; Li, Y.; Yuan, H.; Wang, J.; Pu, Q. Indoor WLAN personnel intrusion detection using transfer learning-aided generative adversarial network with light-loaded database. Mob. Netw. Appl. 2021, 26, 1024–1042. [Google Scholar] [CrossRef]
  7. Wang, K.; Du, S.; Liu, C.; Cao, Z. Interior Attention-Aware Network for Infrared Small Target Detection. IEEE Trans. Geosci. Remote Sens. 2022, 60, 1–13. [Google Scholar] [CrossRef]
  8. Ghose, D.; Desai, S.M.; Bhattacharya, S.; Chakraborty, D.; Fiterau, M.; Rahman, T. Pedestrian detection in thermal images using saliency maps. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), Long Beach, CA, USA, 16–17 June 2019; pp. 988–997. [Google Scholar] [CrossRef] [Green Version]
  9. Mangale, S.; Khambete, M. Camouflaged Target Detection and tracking using thermal infrared and visible spectrum imaging. In Intelligent Systems Technologies and Applications 2016. Advances in Intelligent Systems and Computing; Springer: Cham, Switzerland, 2016; Volume 530, pp. 193–207. [Google Scholar] [CrossRef]
  10. Zhang, J.; Zhang, X.; Li, T.; Zeng, Y.; Lv, G.; Nian, F. Visible light polarization image desmogging via cycle convolutional neural network. Multimed. Syst. 2022, 28, 45–55. [Google Scholar] [CrossRef]
  11. Shen, Y.; Li, J.; Lin, W.; Chen, L.; Huang, F.; Wang, S. Camouflaged Target Detection Based on Snapshot Multispectral Imaging. Remote Sens. 2021, 13, 3949. [Google Scholar] [CrossRef]
  12. Suryanto, N.; Kim, Y.; Kang, H.; Larasati, H.; Yun, Y.; Le, T.; Yang, H.; Oh, S.; Kim, H. DTA: Physical Camouflage Attacks using Differentiable Transformation Network. arXiv 2022, arXiv:abs/2203.09831. [Google Scholar] [CrossRef]
  13. Zhang, Y.; Fan, Y.; Xu, M.; Li, W.; Zhang, G.; Liu, L.; Yu, D. An Improved Low Rank and Sparse Matrix Decomposition-Based Anomaly Target Detection Algorithm for Hyperspectral Imagery. IEEE J. Sel. Top. Appl. Earth Obs. Remote Sens. 2020, 13, 2663–2672. [Google Scholar] [CrossRef]
  14. Chandesa, T.; Pridmore, T.P.; Bargiela, A. Detecting occlusion and camouflage during visual tracking. In Proceedings of the 2009 IEEE International Conference on Signal and Image Processing Applications, Kuala Lumpur, Malaysia, 18–19 November 2009; pp. 468–473. [Google Scholar] [CrossRef]
  15. Mondal, A. Camouflaged Object Detection and Tracking: A Survey. Int. J. Image Graph. 2020, 20, 2050028:1–2050028:13. [Google Scholar] [CrossRef]
  16. Caesar, H.; Bankiti, V.; Lang, A.H.; Vora, S.; Liong, V.E.; Xu, Q.; Krishnan, A.; Pan, Y.; Baldan, G.; Beijbom, O. nuScenes: A multimodal dataset for autonomous driving. In Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Seattle, WA, USA, 13–19 June 2020; IEEE: Piscataway, NJ, USA, 2020; pp. 11618–11628. [Google Scholar] [CrossRef]
  17. Chen, Y.J.; Tu, Z.D.; Kang, D.; Bao, L.C.; Zhang, Y.; Zhe, X.F.; Chen, R.Z.; Yuan, J.S. Model-based 3D hand reconstruction via self-supervised learning. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Nashville, TN, USA, 20–25 June 2021; Cornell University: Ithaca, NY, USA, 2021; pp. 10451–10460. [Google Scholar] [CrossRef]
  18. An, S.; Che, G.; Guo, J.; Zhu, H.; Ye, J.; Zhou, F.; Zhu, Z.; Wei, D.; Liu, A.; Zhang, W. ARShoe: Real-time augmented reality shoe try-on system on smartphones. In Proceedings of the 29th ACM International Conference on Multimedia, Chengdu, China, 20–24 October 2021; Association for Computing Machinery: New York, NY, USA, 2021; pp. 1111–1119. [Google Scholar] [CrossRef]
  19. Hou, J.; Graham, B.; Nießner, M.; Xie, S.N. Exploring data-efficient 3D scene understanding with contrastive scene contexts. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Nashville, TN, USA, 20–25 June 2021; Cornell University: Ithaca, NY, USA, 2021; pp. 15587–15597. [Google Scholar] [CrossRef]
  20. Huang, J.; Wang, H.; Birdal, T.; Sung, M.; Arrigoni, F.; Hu, S.M.; Guibas, L. MultiBodySync: Multi-body segmentation and motion estimation via 3D scan synchronization. In Proceedings of the 2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Nashville, TN, USA, 20–25 June 2021; Cornell University: Ithaca, NY, USA, 2021; pp. 7104–7114. [Google Scholar] [CrossRef]
  21. Liu, Z.; Qi, X.; Fu, C.W. One thing one click: A self-training approach for weakly supervised 3D semantic segmentation. In Proceedings of the 2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Nashville, TN, USA, 20–25 June 2021; Cornell University: Ithaca, NY, USA, 2021; pp. 1726–1736. [Google Scholar] [CrossRef]
  22. Yuan, K.; Zhuang, X.; Schaefer, G.; Feng, J.; Guan, L.; Fang, H. Deep-Learning-Based Multispectral Satellite Image Segmentation for Water Body Detection. IEEE J. Sel. Top. Appl. Earth Obs. Remote Sens. 2021, 14, 7422–7434. [Google Scholar] [CrossRef]
  23. Yuan, K.; Schaefer, G.; Lai, Y.; Wang, Y.; Liu, X.; Guan, L.; Fang, H. MuSCLe: A Multi-Strategy Contrastive Learning Framework for Weakly Supervised Semantic Segmentation. arXiv 2022, arXiv:2201.07021. Available online: https://arxiv.org/abs/2201.07021 (accessed on 5 December 2022).
  24. Wang, Y.; Zhang, J.; Kan, M.; Shan, S.; Chen, X. Self-Supervised Equivariant Attention Mechanism for Weakly Supervised Semantic Segmentation. In Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Seattle, WA, USA, 13–19 June 2020; pp. 12272–12281. [Google Scholar] [CrossRef]
  25. Wei, J.; Hu, Y.; Zhang, R.; Li, Z.; Zhou, S.K.; Cui, S. Shallow attention network for polyp segmentation. In Medical Image Computing and Computer Assisted Intervention–MICCAI 2021; Springer International Publishing: Cham, Switzerland, 2021; pp. 699–708. [Google Scholar] [CrossRef]
  26. Wang, J.F.; Song, L.; Li, Z.M.; Sun, H.B.; Sun, J.; Zheng, N.N. End-to-end object detection with fully convolutional network. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Nashville, TN, USA, 20–25 June 2021; Cornell University: Ithaca, NY, USA, 2021; pp. 15849–15858. [Google Scholar] [CrossRef]
  27. Patel, K.; Bur, A.M.; Wang, G. Enhanced U-Net: A feature enhancement network for polyp segmentation. In Proceedings of the 2021 18th Conference on Robots and Vision (CRV), Burnaby, BC, Canada, 26–28 May 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 181–188. [Google Scholar] [CrossRef]
  28. Fan, H.; Mei, X.; Prokhorov, D.; Ling, H. RGB-D scene labeling with multimodal recurrent neural networks. In Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), Honolulu, HI, USA, 21–26 July 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 203–211. [Google Scholar] [CrossRef]
  29. Liu, K.; Ye, Z.; Guo, H.; Cao, D.; Chen, L.; Wang, F.Y. FISS GAN: A generative adversarial network for foggy image semantic segmentation. IEEE/CAA J. Autom Sin. 2021, 8, 1428–1439. [Google Scholar] [CrossRef]
  30. Tan, W.; Qin, N.; Ma, L.; Li, Y.; Du, J.; Cai, G.; Yang, K.; Li, J. Toronto-3D: A large-scale mobile LiDAR dataset for semantic segmentation of urban roadways. In Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), Seattle, WA, USA, 14-19 June 2020; Cornell University: Ithaca, NY, USA, 2020; pp. 797–806. [Google Scholar] [CrossRef]
  31. Dovesi, P.L.; Poggi, M.; Andraghetti, L.; Martí, M.; Kjellström, H.; Pieropan, A.; Mattoccia, S. Real-time semantic stereo matching. In Proceedings of the 2020 IEEE International Conference on Robotics and Automation (ICRA), Paris, France, 31 May–31 August 2020; IEEE: Piscataway, NJ, USA, 2020; pp. 10780–10787. [Google Scholar] [CrossRef]
  32. Gan, W.; Wong, P.K.; Yu, G.; Zhao, R.; Vong, C.M. Light-weight network for real-time adaptive stereo depth estimation. Neurocomputing 2021, 441, 118–127. [Google Scholar] [CrossRef]
  33. Ahn, E.; Feng, D.; Kim, J. A spatial guided self-supervised clustering network for medical image segmentation. In Medical Image Computing and Computer Assisted Intervention–MICCAI 2021; Springer International Publishing: Cham, Switzerland, 2021; pp. 379–388. [Google Scholar] [CrossRef]
  34. Liu, Z.; Manh, V.; Yang, X.; Huang, X.; Lekadir, K.; Campello, V.; Ravikumar, N.; Frangi, A.F.; Ni, D. Style curriculum learning for robust medical image segmentation. In Medical Image Computing and Computer Assisted Intervention–MICCAI 2021; Springer International Publishing: Cham, Switzerland, 2021; pp. 451–460. [Google Scholar] [CrossRef]
  35. Hu, X.; Zeng, D.; Xu, X.; Shi, Y. Semi-supervised contrastive learning for label-efficient medical image segmentation. In Medical Image Computing and Computer Assisted Intervention–MICCAI 2021; Springer International Publishing: Cham, Switzerland, 2021; pp. 481–490. [Google Scholar] [CrossRef]
  36. Chen, H.; Li, Y.; Su, D. Multi-modal fusion network with multi-scale multi-path and cross-modal interactions for RGB-D salient object detection. Pattern Recognit. 2019, 86, 376–385. [Google Scholar] [CrossRef]
  37. Chen, H.; Li, Y. Three-stream attention-aware network for RGB-D salient object detection. IEEE Trans. Image Process. 2019, 28, 2825–2835. [Google Scholar] [CrossRef]
  38. Su, J.; Li, J.; Zhang, Y.; Xia, C.; Tian, Y. Selectivity or invariance: Boundary-aware salient object detection. In Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision (ICCV), Seoul, Republic of Korea, 27 October–2 November 2019; Cornell University: Ithaca, NY, USA, 2019; pp. 3798–3807. [Google Scholar] [CrossRef] [Green Version]
  39. Fan, D.P.; Ji, G.P.; Sun, G.; Cheng, M.M.; Shen, J.; Shao, L. Camouflaged object detection. In Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Seattle, WA, USA, 13–19 June 2020; Cornell University: Ithaca, NY, USA, 2020; pp. 2774–2784. [Google Scholar] [CrossRef]
  40. Mei, H.; Ji, G.P.; Wei, Z.; Yang, X.; Wei, X.; Fan, D.P. Camouflaged object segmentation with distraction mining. In Proceedings of the 2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Nashville, TN, USA, 20–25 June 2021; Cornell University: Ithaca, NY, USA, 2021; pp. 8768–8777. [Google Scholar] [CrossRef]
  41. Lv, Y.; Zhang, J.; Dai, Y.; Li, A.; Liu, B.; Barnes, N.; Fan, D.P. Simultaneously localize, segment and rank the camouflaged objects. In Proceedings of the 2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Nashville, TN, USA, 20–25 June 2021; Cornell University: Ithaca, NY, USA, 2021; pp. 11586–11596. [Google Scholar] [CrossRef]
  42. Liang, X.; Lin, H.; Yang, H.; Xiao, K.; Quan, J. Construction of semantic segmentation dataset of camouflage target image. Laser Optoelectron. Prog. 2021, 58, 0410015. [Google Scholar] [CrossRef]
  43. Skurowski, P.; Abdulameer, H.; Błaszczyk, J.; Depta, T.; Kornacki, A.; Kozieł, P. Animal camouflage analysis: Chameleon database. Unpubl. Manuscr. 2018, 2, 7. Available online: https://www.polsl.pl/rau6/chameleon-database-animal-camouflage-analysis/ (accessed on 1 January 2022).
  44. Le, T.-N.; Nguyen, T.V.; Nie, Z.; Tran, M.-T.; Sugimoto, A. Anabranch network for camouflaged object segmentation. Comput. Vis. Image Underst. 2019, 184, 45–56. [Google Scholar] [CrossRef]
  45. Gao, S.H.; Cheng, M.M.; Zhao, K.; Zhang, X.Y.; Yang, M.H.; Torr, P. Res2Net: A new multi-scale backbone architecture. IEEE Trans. Pattern Anal. Mach. Intell. 2021, 43, 652–662. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  46. Luo, W.; Li, Y.; Urtasun, R.; Zemel, R. Understanding the effective receptive field in deep convolutional neural networks. In Proceedings of the 30th International Conference on Neural Information Processing Systems, Barcelona, Spain, 5–10 December 2016; Curran Associates Inc.: Red Hook, NY, USA, 2016; pp. 4905–4913. [Google Scholar] [CrossRef]
  47. Yu, F.; Koltun, V. Multi-scale context aggregation by dilated convolutions. arXiv 2015, arXiv:1511.07122. Available online: https://arxiv.org/abs/1511.07122 (accessed on 5 December 2022).
  48. Zhu, X.; Cheng, D.; Zhang, Z.; Lin, S.; Dai, J. An empirical study of spatial attention mechanisms in deep networks. In Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision (ICCV), Seoul, Republic of Korea, 27 October–2 November 2019; Cornell University: Ithaca, NY, USA; pp. 6687–6696. [Google Scholar] [CrossRef] [Green Version]
  49. Hu, J.; Shen, L.; Albanie, S.; Sun, G.; Wu, E. Squeeze-and-excitation networks. IEEE Trans. Pattern Anal. Mach. Intell. 2020, 42, 2011–2023. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  50. Hou, Q.; Zhou, D.; Feng, J. Coordinate attention for efficient mobile network design. In Proceedings of the 2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Nashville, TN, USA, 20–25 June 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 13708–13717. [Google Scholar] [CrossRef]
  51. Wei, J.; Wang, S. F³Net: Fusion, feedback and focus for salient object detection. Proc. AAAI Conf. Artif. Intell. 2020, 34, 12321–12328. [Google Scholar] [CrossRef]
  52. Fan, D.P.; Cheng, M.M.; Liu, Y.; Li, T.; Borji, A. Structure-measure: A new way to evaluate foreground maps. In Proceedings of the 2017 IEEE International Conference on Computer Vision (ICCV), Venice, Italy, 22–29 October 2017; Cornell University: Ithaca, NY, USA, 2017; pp. 4558–4567. [Google Scholar] [CrossRef] [Green Version]
  53. Margolin, R.; Zelnik-Manor, L.; Tal, A. How to evaluate foreground maps. In Proceedings of the 2014 IEEE Conference on Computer Vision and Pattern Recognition, Columbus, OH, USA, 23–28 June 2014; Cornell University: Ithaca, NY, USA, 2014; pp. 248–255. [Google Scholar] [CrossRef]
  54. Perazzi, F.; Krähenbühl, P.; Pritch, Y.; Hornung, A. Saliency filters: Contrast based filtering for salient region detection. In Proceedings of the 2012 IEEE Conference on Computer Vision and Pattern Recognition, Providence, RI, USA, 16–21 June 2012; IEEE: Piscataway, NJ, USA, 2012; pp. 733–740. [Google Scholar] [CrossRef]
  55. Fan, D.P.; Gong, C.; Cao, Y.; Ren, B.; Cheng, M.M.; Borji, A. Enhanced-alignment measure for binary foreground map evaluation. In Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, Stockholm, Sweden, 13–19 July 2018; Cornell University: Ithaca, NY, USA, 2018; pp. 698–704. [Google Scholar] [CrossRef] [Green Version]
  56. Milletari, F.; Navab, N.; Ahmadi, S. V-Net: Fully convolutional neural networks for volumetric medical image segmentation. In Proceedings of the 2016 Fourth International Conference on 3D Vision (3DV), Stanford, CA, USA, 25–28 October 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 565–571. [Google Scholar] [CrossRef] [Green Version]
  57. He, K.; Gkioxari, G.; Dollár, P.; Girshick, R.B. Mask R-CNN. In Proceedings of the 2017 IEEE International Conference on Computer Vision (ICCV), Venice, Italy, 22–29 October 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 2980–2988. [Google Scholar] [CrossRef]
  58. Chen, K.; Pang, J.; Wang, J.; Xiong, Y.; Li, X.; Sun, S.; Feng, W.; Liu, Z.; Shi, J.; Ouyang, W.; et al. Hybrid Task Cascade for Instance Segmentation. In Proceedings of the 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Long Beach, CA, USA, 15–20 June 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 4969–4978. [Google Scholar] [CrossRef] [Green Version]
  59. Carion, N.; Massa, F.; Synnaeve, G.; Usunier, N.; Kirillov, A.; Zagoruyko, S. End-to-End Object Detection with Transformers. In Proceedings of the 2020 ECCV: European Conference on Computer Vision, Glasgow, UK, 23–28 August 2020; Springer: Glasgow, UK, 2020; pp. 213–229. [Google Scholar] [CrossRef]
  60. Qiao, S.; Chen, L.; Yuille, A.L. DetectoRS: Detecting Objects with Recursive Feature Pyramid and Switchable Atrous Convolution. In Proceedings of the 2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Nashville, TN, USA, 20–25 June 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 10208–10219. [Google Scholar] [CrossRef]
  61. Zhou, Z.; Siddiquee, M.M.R.; Tajbakhsh, N.; Liang, J. UNet++: Redesigning skip connections to exploit multiscale features in image segmentation. IEEE Trans. Med. Imaging 2020, 39, 1856–1867. [Google Scholar] [CrossRef] [Green Version]
  62. Chao, P.; Kao, C.Y.; Ruan, Y.; Huang, C.H.; Lin, Y.L. HarDNet: A low memory traffic network. In Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision (ICCV), Seoul, Republic of Korea, 27 October–November 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 3551–3560. [Google Scholar] [CrossRef] [Green Version]
  63. Lou, A.G.; Guan, S.Y.; Loew, M. CaraNet: Context axial reverse attention network for segmentation of small medical objects. In Proceedings of the Medical Imaging 2022: Image Processing, San Diego, CA, USA, 20 February–28 March 2022; SPIE: Bellingham, WA, USA, 2022; Volume 12032, pp. 81–92. [Google Scholar] [CrossRef]
  64. Kim, T.; Lee, H.; Kim, D. UACANet: Uncertainty augmented context attention for polyp segmentation. In Proceedings of the 29th ACM International Conference on Multimedia, New York, NY, USA, 20–24 October 2021; Association for Computing Machinery: New York, NY, USA, 2021; pp. 2167–2175. [Google Scholar] [CrossRef]
  65. Qin, X.; Zhang, Z.; Huang, C.; Gao, C.; Dehghan, M.; Jagersand, M. BASNet: Boundary-aware salient object detection. In Proceedings of the 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Long Beach, CA, USA, 15–20 June 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 7471–7481. [Google Scholar] [CrossRef]
  66. Wu, Z.; Su, L.; Huang, Q. Stacked cross refinement network for edge-aware salient object detection. In Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision (ICCV), Seoul, Republic of Korea, 27 October–2 November 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 7263–7272. [Google Scholar] [CrossRef]
  67. Chen, Z.; Xu, Q.; Cong, R.; Huang, Q. Global context-aware progressive aggregation network for salient object detection. Proc. AAAI Conf. Artif. Intell. 2020, 34, 10599–10606. [Google Scholar] [CrossRef]
  68. Fan, D.P.; Ji, G.P.; Cheng, M.M.; Shao, L. Concealed object detection. IEEE Trans. Pattern Anal. Mach. Intell. 2021, 44, 6024–6042. [Google Scholar] [CrossRef]
  69. Pang, Y.; Zhao, X.; Xiang, T.; Zhang, L.; Lu, H. Zoom In and Out: A Mixed-scale Triplet Network for Camouflaged Object Detection. In Proceedings of the 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), New Orleans, LA, USA, 18–24 June 2022; pp. 2150–2160. [Google Scholar] [CrossRef]
  70. Jha, D.; Smedsrud, P.H.; Riegler, M.A.; Halvorsen, P.; de Lange, T.; Johansen, D.; Johansen, H.D. Kvasir-SEG: A segmented polyp dataset. In MultiMedia Modeling; Springer International Publishing: Cham, Switzerland, 22 December 2020; pp. 451–462. [Google Scholar] [CrossRef] [Green Version]
  71. Vázquez, D.; Bernal, J.; Sánchez, F.J.; Fernández-Esparrach, G.; López, A.M.; Romero, A.; Drozdzal, M.; Courville, A. A benchmark for endoluminal scene segmentation of colonoscopy images. J. Healthc. Eng. 2017, 2017, 4037190. [Google Scholar] [CrossRef] [Green Version]
  72. Tajbakhsh, N.; Gurudu, S.R.; Liang, J. Automatic polyp detection in colonoscopy videos using an ensemble of convolutional neural networks. In Proceedings of the 2015 IEEE 12th International Symposium on Biomedical Imaging (ISBI), Brooklyn, NY, USA, 16–19 April 2015; IEEE: Piscataway, NJ, USA, 2015; pp. 79–83. [Google Scholar] [CrossRef]
  73. Huang, Y.; Qiu, C.; Yuan, K. Surface defect saliency of magnetic tile. Vis. Comput. 2020, 36, 85–96. [Google Scholar] [CrossRef]
  74. Bahnsen, C.H.; Moeslund, T.B. Rain removal in traffic surveillance: Does it matter? IEEE Trans. Intell. Transp. Syst. 2019, 20, 2802–2819. [Google Scholar] [CrossRef]
Figure 1. Schematic diagram of the observation of a camouflaged soldier and tank with a magnifier. (a) Camouflaged objects; (b) Observe camouflage objects with a magnifier.
Figure 1. Schematic diagram of the observation of a camouflaged soldier and tank with a magnifier. (a) Camouflaged objects; (b) Observe camouflage objects with a magnifier.
Entropy 24 01804 g001
Figure 2. The difference between camouflage objects and salient objects. (a) Image; (b) Salient object; (c) Camouflaged object.
Figure 2. The difference between camouflage objects and salient objects. (a) Image; (b) Salient object; (c) Camouflaged object.
Entropy 24 01804 g002
Figure 3. MAGNet structure.
Figure 3. MAGNet structure.
Entropy 24 01804 g003
Figure 4. The structure of the CEM.
Figure 4. The structure of the CEM.
Entropy 24 01804 g004
Figure 5. Schematic diagram of the central excitation effect of CEM.
Figure 5. Schematic diagram of the central excitation effect of CEM.
Entropy 24 01804 g005
Figure 6. Structure of the MFFM module. (UP: upsample, CBR: Conv+BatchNorm+ReLU).
Figure 6. Structure of the MFFM module. (UP: upsample, CBR: Conv+BatchNorm+ReLU).
Entropy 24 01804 g006
Figure 7. The structure of the CSAM. (H refers to the Hadamard product, L2, L3, and L4 refer to Res2-Layer2, Res2-Layer3, and Res2-Layer4, respectively).
Figure 7. The structure of the CSAM. (H refers to the Hadamard product, L2, L3, and L4 refer to Res2-Layer2, Res2-Layer3, and Res2-Layer4, respectively).
Entropy 24 01804 g007
Figure 8. Comparison of the algorithm’s radar plot on each indicator. (For the convenience of display, set MAE = 1 − MAE; best viewed in color. †: generic object detection methods, ⁑: medical image segmentation method, ◊: saliency object detection method, ⸙: COD method.).
Figure 8. Comparison of the algorithm’s radar plot on each indicator. (For the convenience of display, set MAE = 1 − MAE; best viewed in color. †: generic object detection methods, ⁑: medical image segmentation method, ◊: saliency object detection method, ⸙: COD method.).
Entropy 24 01804 g008
Figure 9. Loss value curves.
Figure 9. Loss value curves.
Entropy 24 01804 g009
Figure 10. Visualization results for all algorithms on public datasets.(†: generic object detection methods, ⁑: medical image segmentation method, ⸙: COD method, bold: our method.)
Figure 10. Visualization results for all algorithms on public datasets.(†: generic object detection methods, ⁑: medical image segmentation method, ⸙: COD method, bold: our method.)
Entropy 24 01804 g010
Figure 11. Visualization of MAGNet feature maps. (FEMM: output by the EMM, FAFM: output by the AFM, Ffuse: final fused camouflaged object map).
Figure 11. Visualization of MAGNet feature maps. (FEMM: output by the EMM, FAFM: output by the AFM, Ffuse: final fused camouflaged object map).
Entropy 24 01804 g011
Figure 12. Decline curve of Loss value (solid line is the smoothed decline curve).
Figure 12. Decline curve of Loss value (solid line is the smoothed decline curve).
Entropy 24 01804 g012
Figure 13. Visualization results on the in-house military camouflaged object dataset. (⁑: medical image segmentation method, ◊: saliency object detection method, ⸙: COD method, bold: our method).
Figure 13. Visualization results on the in-house military camouflaged object dataset. (⁑: medical image segmentation method, ◊: saliency object detection method, ⸙: COD method, bold: our method).
Entropy 24 01804 g013
Figure 14. Visualization of detection results on the Kvasir-SEG polyp dataset.
Figure 14. Visualization of detection results on the Kvasir-SEG polyp dataset.
Entropy 24 01804 g014
Figure 15. Visualization of the detection results on the magnetic tile defect dataset.
Figure 15. Visualization of the detection results on the magnetic tile defect dataset.
Entropy 24 01804 g015
Figure 16. Visualization of detection results on the AAU-RainSnow dataset.
Figure 16. Visualization of detection results on the AAU-RainSnow dataset.
Entropy 24 01804 g016
Table 1. Military camouflaged object dataset overview.
Table 1. Military camouflaged object dataset overview.
CategoriesDescriptionsQuantities
Disguised personsThe woods in spring800
The woods in summer900
The woods in autumn400
The woods in winter500
Disguised tanksComplex environments100
Total 2700
Table 2. The comparison results of MAGNet and 19 algorithms on public datasets. (†: generic ob-ject detection methods, ⁑: medical image segmentation method, ◊: saliency object detection method, ⸙: COD method, bold: our method. The top three performances are highlighted in red, blue, and green).
Table 2. The comparison results of MAGNet and 19 algorithms on public datasets. (†: generic ob-ject detection methods, ⁑: medical image segmentation method, ◊: saliency object detection method, ⸙: COD method, bold: our method. The top three performances are highlighted in red, blue, and green).
MethodsPub. ‘Year S α F β w MAE E ϕ a d meanDicmeanIoUmeanSenmeanSpeFPSGFLOPsParams (M)
UNet++ ⁑DLMIA ‘170.6780.4910.0670.7630.5290.4160.5530.85960.29106.7424.89
MaskRCNN †ICCV ‘170.7560.6430.0420.7900.6250.5340.6530.80326.9075.8243.75
BASNet ◊CVPR ‘190.6630.4390.0970.7320.4900.3810.6110.8659.36481.1487.06
SCRN ◊ICCV ‘190.7910.5830.0520.7990.6400.5290.6760.92635.2730.3225.22
HarDNet ⁑ICCV ‘190.7850.6510.0430.8740.6760.5750.6900.93061.5122.8017.42
HTC †CVPR ‘190.7380.6110.0410.7410.5760.5010.5960.7109.20188.8479.73
F3Net ◊AAAI ‘200.7810.6360.0490.8510.6750.5650.7090.94062.1232.8625.54
PraNet ⁑MICCAI ‘200.7990.6650.0450.8660.7000.5950.7370.93945.8326.1532.58
GCPANet ◊AAAI ‘200.8000.6460.0420.8510.6740.5730.6910.9349.36131.4067.06
SINet-V1 ⸙CVPR ‘200.8060.6840.0390.8830.7140.6080.7370.94837.6438.7648.95
Swin-S †ICCV ‘200.7800.6810.0400.8400.6760.5800.7120.87314.3089.8268.69
SANet ⁑MICCAI ‘210.7910.6590.0460.8620.7020.5930.7660.93869.0922.5623.90
RankNet ⸙CVPR ‘210.7990.6610.0430.8600.6960.5880.7230.94729.5166.6350.94
PFNet ⸙CVPR ‘210.8050.6830.0400.8820.7140.6070.7370.95133.7453.2446.50
DetectoRS †CVPR ‘210.8040.7250.0390.8510.7120.6240.7390.8615.50188.36134.00
UACANet-L ⁑ACMMM ‘210.8160.7240.0340.9010.7450.6460.7630.94523.19119.0569.6
SINet-V2 ⸙TPAMI ‘210.8220.7000.0380.8830.7350.6270.7670.95552.2024.4826.98
CaraNet ⁑MIIP ‘220.8150.6790.0440.8620.7220.6180.7890.93731.8843.3046.63
ZoomNet ⸙CVPR ‘220.8180.7030.0370.8750.7210.6250.7160.94112.06203.5032.38
MAGNet ⸙Ours0.8290.7270.0340.9010.7570.6560.7890.95456.9124.3627.12
Table 3. Computational complexity comparison results of MAGNet and other COD methods (based on https://github.com/lartpang/MethodsCmp (accessed on 1 November 2022) [69]. ⸙: COD method, bold: our method. The top three performances are highlighted in red, blue, and green.).
Table 3. Computational complexity comparison results of MAGNet and other COD methods (based on https://github.com/lartpang/MethodsCmp (accessed on 1 November 2022) [69]. ⸙: COD method, bold: our method. The top three performances are highlighted in red, blue, and green.).
MethodsPub. ‘YearFPSFLOPs (G)Params (M)
SINet-V1 ⸙CVPR ‘2037.6438.7648.95
RankNet ⸙CVPR ‘2129.5166.6350.94
PFNet ⸙CVPR ‘2133.7453.2446.50
SINet-V2 ⸙TPAMI ‘2152.2024.4826.98
ZoomNet ⸙CVPR ‘2212.06203.5032.38
MAGNet ⸙Ours56.9124.3627.12
Table 4. MAGNet ablation experiment results.(✓ indicates that the module is used. The top three performances are highlighted in red, blue, and green).
Table 4. MAGNet ablation experiment results.(✓ indicates that the module is used. The top three performances are highlighted in red, blue, and green).
BaselineWith
AFM
With
EMM
In
Series
In
Parallel
S α F β w MAE E ϕ a d meanDicmeanIoUmeanSenmeanSpe
0.6630.3150.1510.7110.5220.3990.7610.826
0.6750.3080.1630.8430.6160.5090.8240.812
0.8250.7150.0350.9000.7420.6380.7550.956
0.8270.7230.0340.9020.7530.6520.7850.949
0.8290.7270.0340.9010.7570.6560.7890.954
Table 5. Comparison results with different parameter settings. (The last column is the time required to train an epoch. The top performance are highlighted in red).
Table 5. Comparison results with different parameter settings. (The last column is the time required to train an epoch. The top performance are highlighted in red).
Settings S α F β w MAE E ϕ a d meanDicmeanIoUmeanSenmeanSpeTime/s
23 × 230.8090.6440.0460.8470.7190.6100.7870.946137.2
43 × 430.8240.7230.0340.9030.7460.6480.7600.952146.9
33 × 330.8290.7270.0340.9010.7570.6560.7890.954142
Table 6. Comparison results on the in-house military camouflaged object dataset. (†: generic object detection methods, ⁑: medical image segmentation method, ◊: saliency object detection method, ⸙: COD method, bold: our method. The top three performances are highlighted in red, blue, and green.)
Table 6. Comparison results on the in-house military camouflaged object dataset. (†: generic object detection methods, ⁑: medical image segmentation method, ◊: saliency object detection method, ⸙: COD method, bold: our method. The top three performances are highlighted in red, blue, and green.)
MethodsPub. ‘Year S α F β w MAE E ϕ a d meanDicmeanIoUmeanSenmeanSpe
UNet++ ⁑DLMIA ‘170.7170.5940.0090.7360.5130.4210.4710.747
MaskRCNN †ICCV ‘170.8250.7620.0080.8560.6950.5430.7460.874
BASNet ◊CVPR ‘190.8650.7570.0080.9280.7630.6660.7580.950
SCRN ◊ICCV ‘190.8470.6030.0100.6770.6870.5750.7260.955
HarDNet ⁑ICCV ‘190.8760.7840.0050.9530.7950.6950.8060.967
HTC †CVPR ‘190.8480.7660.0060.8240.7530.5040.7640.858
F3Net ◊AAAI ‘200.8890.7980.0050.9440.8160.7160.8460.972
PraNet ⁑MICCAI ‘200.8870.7810.0060.9150.8020.6960.8340.977
GCPANet ◊AAAI ‘200.8740.7210.0060.8210.7330.6230.7140.971
SINet-V1 ⸙CVPR ‘200.8760.8000.0050.9650.8100.7060.8420.977
Swin-S †ICCV ‘200.8580.7100.0080.8340.7410.6350.8370.951
SANet ⁑MICCAI ‘210.8040.6470.0100.8530.6730.5630.7200.917
RankNet ⸙CVPR ‘210.8470.6930.0080.8250.7370.6220.8400.960
PFNet ⸙CVPR ‘210.8730.7710.0060.9410.7850.6820.8040.965
DetectoRS †CVPR ‘210.8630.7840.0070.9170.8030.6980.8260.965
UACANet-L ⁑ACM MM ‘210.8800.8230.0040.9630.8170.7150.8530.979
SINet-V2 ⸙TPAMI ‘210.8840.7880.0040.9260.8060.6990.8430.982
CaraNet ⁑MIIP ‘220.8650.7290.0060.8730.7630.6540.8320.964
ZoomNet ⸙CVPR ‘220.8810.7980.0050.8880.7830.6850.7840.965
MAGNet ⸙Ours0.9240.8640.0030.9460.8680.7790.9170.992
Table 7. Comparison results on the Kvasir-SEG polyp dataset. (⁑: medical image segmentation method, ⸙: COD method, bold: our method. The top three performances are highlighted in red, blue, and green.)
Table 7. Comparison results on the Kvasir-SEG polyp dataset. (⁑: medical image segmentation method, ⸙: COD method, bold: our method. The top three performances are highlighted in red, blue, and green.)
MethodsPub. ‘YearmeanDicMAE S α E ϕ a d meanIoU
UNet++ ⁑DLMIA ‘170.8210.0480.8620.910/
HarDNet ⁑ICCV ‘190.9120.0250.9230.9580.857
PraNet ⁑MICCAI ‘200.8980.0300.9150.9480.849
UACANet-L ⁑ACM MM ‘210.9120.0250.9170.9580.862
CaraNet ⁑MIIP ‘220.9180.0230.9290.9680.865
MAGNet ⸙Ours0.8900.0330.9120.9600.830
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Jiang, X.; Cai, W.; Zhang, Z.; Jiang, B.; Yang, Z.; Wang, X. MAGNet: A Camouflaged Object Detection Network Simulating the Observation Effect of a Magnifier. Entropy 2022, 24, 1804. https://doi.org/10.3390/e24121804

AMA Style

Jiang X, Cai W, Zhang Z, Jiang B, Yang Z, Wang X. MAGNet: A Camouflaged Object Detection Network Simulating the Observation Effect of a Magnifier. Entropy. 2022; 24(12):1804. https://doi.org/10.3390/e24121804

Chicago/Turabian Style

Jiang, Xinhao, Wei Cai, Zhili Zhang, Bo Jiang, Zhiyong Yang, and Xin Wang. 2022. "MAGNet: A Camouflaged Object Detection Network Simulating the Observation Effect of a Magnifier" Entropy 24, no. 12: 1804. https://doi.org/10.3390/e24121804

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop