<<

Recent Researches in Circuits, Systems, Electronics, Control & Signal Processing

Cybernetic on Human Recipient - Visual Illusion INTERFACE

JIŘÍ F. URBÁNEK, JIŘÍ BARTA, JOZEF HERETÍK, JOSEF NAVRÁTIL and JAROSLAV PRŮCHA* Department of Civil Protection, Dpt of External Relations*, University of Defence, Kounicova 65, 662 10 Brno, CZECH REPUBLIC [email protected]; http://www.unob.cz

Abstract: - Perceptive interface between a human recipient (observer) and visible object can be created by complicated components, domains, actors, agents and mediators. A permeability of this interfece is necessary in an environment of colaborative actors at both sides of the interface. Worse permeability or even impermeability of the interface can be asked between antagonistic enemies. Generally, a lot of various interfaces have “smash / fuzzy/ defocusing” contours but their exact definition is helpful for active and passive protection of living objects in the nature. But, the interfaces between potential enemies ask a merge of camouflage systems & processes implementing on special created interface. So, this interface needs a nature / human made camouflage mediator. This mediator must operationally mediate virtual image in real time/ space/ environment. Cybernetic camouflage implementing virtual image operating in visible range of electromagnetic vave spectrum uses data projectors for projection of image on screen interface. From above fundamental principles are created platforms of cybernetic camouflage of Czech University of Defence R&D Grant solution of National Defence Research. It deals grant Project with acronym - Draft and assertion new adaptive technology for simulation and camouflage in operational environment armed forces of Czech Republic and for infrastructure protection. The resources and “how to” of this Grant asks a finding of new approaches of problems solution, especially in military environment. The architecture and Use Cases of necessary systems and their technologies, represent the milestones of the ADAPTIV solution. ADAPTIV project tends to Active CyberCamouflage by Computerized Aided (CAM) implementations as autonomic outdoor computerized aided Interoper-mobile WiMAX CAM Workshop.

Key-Words: - Cybernetic , Computerised Aided Mimicry Implementation.

1 Camouflage human-made. Camouflage is not limited to the commonly Albert Einstein, 1920: encountered visual way, but encompasses other senses as The significant problems we face can not be solved at well. First, the camouflage must be tailored to the the same level of thinking we were at when we observer. Second, the camouflage must deceive the created them! observer into making a false judgment about the camouflaged object. The Camouflage is concealment [1] by means of Camouflage is an attempt to avoid observation, and as disguise. The likely root of the word camouflage is such, it is tailored to the vision of the expected observer. camoufler, a French term meaning smoke blown in The use of camouflage, no matter what the specific someone's face as a practical joke. Word origin is in application, has certain basic requirements that must be Italian camuffare. The Camouflage is a method of met. First, the camouflage must be tailored to the avoidance of observation that allows an otherwise visible observer. Second, the camouflage must deceive the object (organism or structure to remain indiscernible from observer into making a false judgment about the the surrounding environment through deception. The camouflaged object. The strategies of camouflage can be theory of camouflage covers the various strategies which broken down into up to four categories, which are are used to achieve this effect. The definition of cryptic, disruptive, counter-shading and mimicry. Each camouflage involves the both the concealment and the of these deals with a different method of deceiving the obscurity, whether applied to the natural coloration of observer, and often strategies are combined increase their animals, or used in military environment. The methods effectiveness. These may be applied individually, or in by which concealment or obscurity are attained share a combination with one another providing overall common set of strategies intended to deceive the observer. camouflage strategy. The blending of disruptive and The underlying methodology used in, whether natural or cryptic coloration can be called coincident disruption.

ISBN: 978-960-474-262-2 22 Recent Researches in Circuits, Systems, Electronics, Control & Signal Processing

Cryptic (or blending) camouflage is an attempt to blend intraspecific mimicry occurs within a single species, one into the environment and become effectively case being where one part of an organism's body imperceptible. To do this, the camouflaged object must resembles another part.. The signal-receiver is typically minimize observable differences between itself and the another intermediate organism like the common predator background with respect to the senses of the target of two species, but may actually be the model itself, such observer. The definitive example of camouflage is a as a moth resembling its spider predator. As an cryptic camouflage designed to match the visual interaction, mimicry is in most cases advantageous to the appearance of the expected background, generally using a mimic and harmful to the receiver, but may increase, mottled pattern of greens and browns to match ground and reduce or have no effect on the fitness of the model foliage colour and break up the outline of the depending on the situation. Models themselves are camouflaged object. Cryptic camouflage must match the difficult to define in some cases, for example eye spots colors and spatial frequencies of the background to be may not bear resemblance to any specific organism's eyes, effective, and may have to suppress non-visual cues. and camouflage often cannot be attributed to a particular Disruptive (or dazzle, US) camouflage is not intended model. In some cases this can be quite a complex process, to blend into the environment, and in fact often involves such as in the case of the Mimic , which are bright, eye-catching colours that would be the antithesis extremely flexible. Although all can change of cryptic camouflage. Disruptive camouflage seeks to colour and texture, and many can blend with the sea floor, confuse the observer, by providing visual cues that appearing as rocks, the Mimic Octopus is the first octopus override the camouflaged object's features. This prevents species ever observed to impersonate other creatures – it the observer from accurately identifying characteristics of can change shape to resemble lionfish or other poisonous the camouflaged object(s), such as shape, size, fish in its habitat. Octopus ink cloud also provides orientation, and number of objects in a group combination disruption of the sense of smell e.g. Mimicry is perhaps of counter-shading and cryptic colours and patterns to the broadest example of adaptive camouflage (though blend into its environment. the most obvious form to humans is visual mimicry). Counter-shading is the process of using lighter colours Adaptive camouflage means a capability of an adapting on normally dark areas, and darker colors on normally object appearance to match its environment and/or light areas. This removes some of the visual cues used for impersonate other object. Adaptive camouflage (or active depth perception causing the counter-shaded object to camouflage) is a group of camouflage technologies which appear flat, rather than as an object with depth. This is the would allow an object (usually military in nature) to blend same effect used in the hollow-face illusion where a into its surroundings by using of panels or coatings concave object is shaded in such a way as to appear capable of changing color or luminosity. Active convex. Military doctrine also applies this technique to camouflage can be seen as having the potential to become camouflage paint. The standard method for applying the perfection of the art of camouflaging things from camouflage paint to exposed skin is to use dark paint for visual detection. bright areas of the face, light paint for shadowed areas, and combining this with a disruptive pattern over large areas of skin. 2 CyberCamouflage Processes Modelling The Mimicry is the attempt by the camouflaged object Perceptive processes between human Recipient (see PrS to be observed as some other type of object. Mimicry is 1 in Table 1/ Fig.1) and visible Object of the camouflage the similarity of one object to another which protects one are created by several complicated components, domains, or both. This similarity can be in the appearance, actors, agents and mediators. behaviour, sound, scent and even location, with the Very important agent of these processes, mimics found in similar places to their models. Mimicry intermediating light physical processes perception, is an occurs when a group of organisms, the mimics, evolve to Observer (see PrS 2) always. The function of Observer´s share common perceived characteristics with another Eye (see PrS 3) is relative heavy deceivable, while group, the models. The evolution is driven by the selective Observer with Brian = Observer in Recipient role is action of a signal-receiver, or dupe. For example, birds here the most inclinable to a mystification as regulative, that use sight to identify palatable insects (the mimics), control and evaluative Actor of camouflage process scene whilst avoiding the noxious models. Collectively, this where he to Acquire an Illusion. situation is known as a mimicry complex. The model is A disseminator of this Illusion is whole the Use Case: usually another species except in cases of Automimicry or

ISBN: 978-960-474-262-2 23 Recent Researches in Circuits, Systems, Electronics, Control & Signal Processing

doing Camouflage Operational Scene, including all Entity´s above relevant entities, operating into defined title/symbol semantics determination environment of visible camouflage: the visible ENV (see Object of domain Table 1/ Fig.1). Camouflage Important Mediator of this Illusion is PrS 4: a Screen visible Environment of domain enabling front and back projection of Virtual Light ENV Visible Camouflage Image (see PrS 6) and its perception as an Information PrS CCA Cybernetic 3 notebooks (see PrS 7), perceptible by the Recipient. Generally, the Computerized Aid in safe local net Screen is the Interface enabling 2D/ 3D projection Control System incl. Camouflage (cinerama, screen, monitor, foam, smoke ...). The Screen PrS Plus Technology is crucial means for a deception of the Recipient (PrS 1). Recipient enemy actor In the domain of visible spectrum environment PrS 1 process system (visibleENV), the processes emerging by the use case Observer via brain „doing: CamouflageOperationalScene” are made by PrS 2 various number of infrastructural components, domains, PrS 3 Observer´s Eye human eye actors, mediators and participants. But, from the point of PrS 4 Screen of front and canvas surface 2,2 view of deceitful or tricky camouflage processes – they back projection x 2,2 m are controlled by a Scenario in the role of operational Dataprojector Panasonic function to do Scenario. PrS 5 PrS 6 Virtual Light Image light flow PrS 7 Information light perception visible PrS 8 Information Feed indicating ENV Back & Reflection behaviour from PrS1 to doScenario to doScenario to Create Scenario operational

of Camouflage function

to to Percept Illusion actor acquires the AcquireIllusion illusion P rS CCA UseCase A Visualization of functional use Luminous Flow on case PrS 5 4 screens modular for wide object

figuration type A covering UseCase B Visualization of functional use

UseCas e A/B/C PrS luminous flow on 4 case for square PrS PrS6 8 screens modular object covering 7 figuration type B Visualization of functional use

luminous flow on 4 case for high PrS 3 C +PrS 1 screens modular object covering

UseCase figuration type C PrS 2 UseCase: doing Doing Function of camouflage to AcquireIllusion CamouflageOpe Operational Scene scenery making rationalScene Camouflage

doingCamouflageOperationalScene INTERFACE Mediator of surface of screens HW Human Recipient - modular Visual Illusion figuration Cybernetic Camouflage needs the sensors of Information Feed Back & Reflection from enemy Fig. 1 Analytic Blazon of Camouflage Processes Recipient (PrS1) percepting visual illusion effect = to Table 1 Relations Acquire Illusion. It can be indicated just by a monitoring

ISBN: 978-960-474-262-2 24 Recent Researches in Circuits, Systems, Electronics, Control & Signal Processing

of PrS1´s behaviour in in the domains: visibleENV, real retina and on spectral responsibility of observer eye. time & space. Cybernetic control system is represented by Lower boundary moves within the limits of wave the PrS CA: Cybernetic Computerized Aid. longitude among 0,36 and 0,40 µm and upper boundary among 0,76 and 0,83 µm – see Fig. 2 [4]. Radiation of light is visible radiation that is utilized by observer ocular 3 ADAPTIV Project organ. Every mono-frequency radiation excites quite The survival of human society requires the most effective definite coloured eye´s sensation, hence this radiation is behaviour aiming to the co-operation, collaboration, indicating as monochromatic. In spectra solar radiation integration and technological ascendancy of friendly eye man can detect in circa 128 coloured tones. actors. But security and defence research must offer pertinent means of protection for “native rival´s force” predominance counter antagonists and enemies. A camouflage systems and technologies is one from most important means for it. Cybernetic camouflage solves the Czech University of Defence R&D Grant of National Defence Research Project with acronym ADAPTIV - Draft and assertion wave wave new adaptive technology for simulation and camouflage - in operational environment armed forces of Czech

Republic and for infrastructure protection

ADAPTIV project solution has defined strict conditions which nominatives are a restriction of financial resources and exact definition of Project boundaries and spectrum conditions regarding researched and developed systems and technologies:

a/ Observer would be military person. Electromagnetic Fig. 2: b/ Observer´s sense using for camouflage detection is limited to normal humans vision in visual range of luminous spectrum (see Fig.2), without night vision systems, radar, sonar and thermal imaging as well. c/ Omitting of other senses, such as olfaction (smell), touch, sound and hearing. d/ Using cybernetic computerized aided technologies and dataprojectors for a visualisation acquired by COTS 3.1 Best Practice in Military Environment principle(Commercial Off The Shelf) [3]. Military camouflage did not achieve widespread use until e/ Omitting expensive and in the field untried World War I, after the introduction of airplanes for an technologies, as the lasers… observation. This early camouflage was not restricted to Human Eyes has specific characteristics: Normal just coloring, it applied to shape as well. United States human Eye see though the actions of four types of Army Field Manual [5] in chapter 1(detailed information receptors in the eye; the rods, which are highly sensitive, and how-tos): Camouflage uses concealment and perceive brightness, while three types of cones perceive deception to promote our offensive action, to surprise, to red, green, and blue colors. The density and sensitivity of mislead the enemy, and to prevent him from inflicting these rods and cones determine how sensitive the eye is to damage upon us. It includes hiding from view, making colour. Brightness is the most important factor, followed hard to see clearly, arranging obstructions to vision, by green, red, and blue colours, in that order. Sometimes deceiving and disguising, and deception involving sound. unexpected colours provide good cryptic coloration, such There are four fundamental ways of concealing as pink. E.g. a shade called ´Mountbatten pink´ was used installations activity and camouflage methods: during WWar II for ships. Human eye excites chromatic a. Blending. - An object is concealed by camouflage perception in the conditions of the visible radiation. Exact materials arranged so that both the materials and the extent of visible radiation spectral range is impossible to object seem a part of their background (fig. 33). The aim set, because it is depending on incident radiation to eye

ISBN: 978-960-474-262-2 25 Recent Researches in Circuits, Systems, Electronics, Control & Signal Processing

is to prevent disclosure of the object by a change in the structure with a negative refractive index, since this natural appearance of the site. property is not found in any non-synthetic material. b. Hiding. - Hiding is concealing the identity of an Almost all materials encountered in optics, such as glass object with a screen even though the screen itself may or water, have positive values for both permittivity ε and sometimes be seen. permeability µ. However, many metals (such as silver and c. Deceiving. - Deceiving simulates an object or gold) have negative ε at visible wavelengths. Although the activity of military significance or disguises them so they optical properties of a transparent material are fully appear to be something else. Deceiving accomplishes the specified by the parameters ε and µ, refractive index n is following: often used in practice, which can be determined from d. Decoys. - Imitations of real objects are the basis for (1) most deceptive practices. Although it is possible to make a decoy representation of any object, the most useful are a

decoy roads, paths, rocks, stumps, trees, hedges, guns,

vehicles, planes, and buildings. Disguise changes the 8'). appearance of an object or activity to give a false - impression of its character. The purpose may be either to create a military target or to conceal the object by making it appear to be of non-military significance. : A comparison of of A comparison :

4 metamaterial ( metamaterial

positive but the same, Fig. inthatto metamaterial refracts in a normal (8') or (8') a normal in refracts 3.2 Camouflage top world´s R&D and air from beam 8 enters conventional material having having material conventional incident The index. refractive In this paper, here it is necessary to highlight that problem index negative in a refraction solution is in CyberCamouflage INTERFACE HW - (hardware), see Fig. 1. Input configuration of former HW [2] is shown at next Fig. 3. artist's artist's : An : 5 Drake 2009 Drake

.

K Fig. HW

bending metamaterial. metamaterial. bending Wikipedia Photo Credit: Credit: Photo Wikipedia rendition of the new light new the of rendition Former Former camouflage : 3 INTERFACE

Fig. All known non-metamaterial transparent materials possess positive ε and µ. But a left-handed material (LHM) can be defined (see Fig. 4 [7]). It is a material which exhibits simultaneous negative values for permittivity ε and permeability μ in an overlapping The best possiblefuture solution would be in a frequency region. Since the values are derived from the Metamaterial using with special optical behaviour effects of the composite medium system as a whole, these creating Cloaking of . Metamaterials are are defined as effective permittivity, εeff, and effective artificial materials engineered to provide properties which permeability, μeff [8]. Real values are then derived to may not be readily available in nature. These materials denote the value of negative index of refraction, and wave usually gain their properties from structure rather than vectors. This means that in practice losses will occur for a composition, using the inclusion of small inhomogeneities given medium and environment used to transmit to enact effective macroscopic behaviour. [6] The greatest electromagnetic radiation such as microwave, or infrared potential of metamaterials is the possibility to create a frequencies and/or visible light. But, metamaterials are

ISBN: 978-960-474-262-2 26 Recent Researches in Circuits, Systems, Electronics, Control & Signal Processing

not disposable till this time and the problem solution by Forces and for Czech infrastructure protection. The Active our R&D is pointed at elsewhere. Cybernetic Camouflage by Computerised Aided Mimicry (CAM) implementations follows from the project solution and “how to” and tends to field implementation. Already 4 Solution of ADAPTIV Project now, forming system serves especially for easy and well- Czech University of Defence is in the solution of National arranged creation and displaying of (audio)-visual Defence Research Project with acronym ADAPTIV - information for digital adaptive camouflage protection of Draft and assertion new adaptive technology for critical infrastructure and/or military forces, means & simulation and camouflage in operational environment resources and/or for decoy´s simulation. ADAPTIV grant armed forces of Czech Republic and for infrastructure will continue future two years and will be finished in the protection. This project´s aim: A using of the perspectives, prototype form. research, development, implementation and application of cybernetic computerized aided technologies, intended for References: a protection of troop’s forces and equipments, of the [1] R. Allen. The PENGUIN English Dictionary, Penguin civilians and technological infrastructure and for the Books, 2003, ISBN 978-0-140-51533-6, p 197. simulation and camouflage of military activities and [2] http://en.wikipedia.org/wiki/ targets. [3] W. Perry. US State Secretary, Military Doctrine, 1994. [4] J.E. Moulder, Light, 2004.

ADAPTIV Project R&D tends [5] U.S. Army Field Manuals, Army Publishing Directorate. towards Active Camouflage by 2007, FM 5-20. Computerised Aided Mimicry [6] A. Sihvola, Alexey P. Vinogradov. Metamaterials and (CAM) implementations, using

Attributes Plasmonics: Fundamentals, Modelling, Applications. CAMouflagePlus Technology New York: Springer-Verlag. 2008. ISBN CAM Scenarios: scene, scenery and 9781402094064. : CAM Concept CAM : 6 object copys; rendering [7] Engheta, Nader, Ziolkowski. Metamaterials: physics and (intercepting) and /or engineering explorations. Wiley&Sons. 2006. ISBN Fig. emitting deceptive 9780471761020.

(illusory) virtual reality [8] R. A Shelby, D.R. Smith, S.Shultz, Nemat-Nasser S.C.

for relevant object Microwave transmission through a two-dimensional,

ibility CAD change in isotropic, left-handed metamaterial. Applied Physic Flex the Letters 78. 2001. N theaters of [9] J.F. Urbánek. Effective Modelling of Know-How for th Integration E protective operations. Cyber-Informatics Practitioners, In 8 Int. Conf. on C The (M.O.) Mimic Simulation, modelling and optimization, SMO '08,

Interoperability Octopus is “general Santander, Spain, WSEAS Press, 2008, pp. 252 - 255, ISBN 978-960-474-007-9, ISSN 1790-2769.

pattern how-to “ of the [10] J.F. Urbánek. Application Modelling Simulation of ADAPTIV Project. th CAM concept is here imagined as M.O. (see Fig. 6). Its Data Flow in Disaster Events Management, In 8 Int. “eye” is CAM (Computerised Aided Mimicry) and its body Conf. on Simulation, modelling and optimization, SMO is builded by formalized DATABASE of the Pictures. The '08, Santander, Spain, WSEAS Press, Sept. 2008, ISBN 978-960-474-007-9, ISSN 1790-2769, pp 256-260. tentacles manifest capabilities of the Flexibility, [11] J.F. Urbánek, J. Průcha, A Development of Wireless Interoperability, Integration, Network Enabled Capability Interoper-mobile Application for Outdoor Operation (NEC) and Computerized Aided Design (CAD). Management, In 8th Int. Conf. on Electronics, hardware, wireless and optical communications, EHAC ´09,, Cambridge, UK, WSEAS Press, Feb. 2009, ISBN 978- 5 Conclusions 960-474-053-6, ISSN 1790-5117, ID 609-289, pp 57-64. Initiative milestones of Computerised aided camouflage [12] J.F. Urbánek, J.Barta, J.Heretik, J. Průcha, Computer of R&D Grant ADAPTIV were introduced in [12] and here Aided Camouflage, In 10th WSEAS Int. Conf. on Applied they are developed. They draft, content and use of new Informatics and Communications, AIC ´10, Taipei, adaptive technologies for simulation and camouflage in Taiwan, WSEAS Press, Aug. 2010, ISBN 978-960-474- operational environment for Czech Republic Armed 216-5, ISSN 1792-460X, ID 609-289, pp 289-294.

ISBN: 978-960-474-262-2 27