IDEAS home Printed from https://ideas.repec.org/a/oup/beheco/v26y2015i1p45-54..html
   My bibliography  Save this article

Camouflage through behavior in moths: the role of background matching and disruptive coloration

Author

Listed:
  • Changku Kang
  • Martin Stevens
  • Jong-yeol Moon
  • Sang-Im Lee
  • Piotr G. Jablonski

Abstract

Camouflage can be attained via mechanisms such as background matching (resembling the general background) and disruptive coloration (hindering the detection of an animal’s outline). However, despite much conceptual work with artificial stimuli there have to date been few studies of how such camouflage types work in real animals in their natural environments. Here, using avian vision models and image analysis, we tested which concealing mechanisms operate to provide camouflage during behavioral choice of a resting position in 2 bark-resting moths, Hypomecis roboraria and Jankowskia fuscaria. Our results suggest that both species reinforced their crypticity in terms of both background matching and disruptive coloration. However, the detailed mechanisms (such as achromatic/chromatic matching or pattern direction matching) that each species exploits differed between the 2 species. Our results demonstrate that an appropriate behavioral choice of background and body orientation is important to improve camouflage against natural predators, and highlight the mechanisms that confer camouflage to cryptic animals in their natural habitats.

Suggested Citation

  • Changku Kang & Martin Stevens & Jong-yeol Moon & Sang-Im Lee & Piotr G. Jablonski, 2015. "Camouflage through behavior in moths: the role of background matching and disruptive coloration," Behavioral Ecology, International Society for Behavioral Ecology, vol. 26(1), pages 45-54.
  • Handle: RePEc:oup:beheco:v:26:y:2015:i:1:p:45-54.
    as

    Download full text from publisher

    File URL: http://hdl.handle.net/10.1093/beheco/aru150
    Download Restriction: Access to full text is restricted to subscribers.
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Marina Dimitrova & Sami Merilaita, 2012. "Prey pattern regularity and background complexity affect detectability of background-matching prey," Behavioral Ecology, International Society for Behavioral Ecology, vol. 23(2), pages 384-390.
    2. Marina Dimitrova & Sami Merilaita, 2014. "Hide and seek: properties of prey and background patterns affect prey detection by blue tits," Behavioral Ecology, International Society for Behavioral Ecology, vol. 25(2), pages 402-408.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Ossi Nokelainen & Sanni A. Silvasti & Sharon Y. Strauss & Niklas Wahlberg & Johanna Mappes, 2024. "Predator selection on phenotypic variability of cryptic and aposematic moths," Nature Communications, Nature, vol. 15(1), pages 1-12, December.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Melia G. Nafus & Jennifer M. Germano & Jeanette A. Perry & Brian D. Todd & Allyson Walsh & Ronald R. Swaisgood, 2015. "Hiding in plain sight: a study on camouflage and habitat selection in a slow-moving desert herbivore," Behavioral Ecology, International Society for Behavioral Ecology, vol. 26(5), pages 1389-1394.
    2. Joanna R Hall & Roland Baddeley & Nicholas E Scott-Samuel & Adam J Shohet & Innes C Cuthill, 2017. "Camouflaging moving objects: crypsis and masquerade," Behavioral Ecology, International Society for Behavioral Ecology, vol. 28(5), pages 1248-1255.
    3. Ossi Nokelainen & Sanni A. Silvasti & Sharon Y. Strauss & Niklas Wahlberg & Johanna Mappes, 2024. "Predator selection on phenotypic variability of cryptic and aposematic moths," Nature Communications, Nature, vol. 15(1), pages 1-12, December.

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:oup:beheco:v:26:y:2015:i:1:p:45-54.. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Oxford University Press (email available below). General contact details of provider: https://academic.oup.com/beheco .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.