1951
DOI: 10.1163/156853951x00151
|View full text |Cite
|
Sign up to set email alerts
|

Some Experiments On the Camouflage of Stick Caterpillars1)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
35
0

Year Published

1973
1973
2013
2013

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 118 publications
(35 citation statements)
references
References 0 publications
0
35
0
Order By: Relevance
“…In this phenomenon, which has also been termed special resemblance (Cott 1957) or masquerade (Endler 1981), the animal evolves a detailed likeness to some specific, local feature of its envi-ronment (Edmunds 1990, Robinson 1969, Vane-Wright 1980. Pattern mimicry has produced some of the most spectacular examples of protective coloration, such as stick caterpillars (de Ruiter 1952), leaf-mimicking katydids (Castner & Nickle 1995), and leafy seadragons (Connolly et al 2002). However, most cryptically colored species display a more global, statistical resemblance to the background, in which the wavelength, intensity, and size of prey color patches converge on the mean of a multivariate distribution of background features.…”
Section: Components Of Crypticitymentioning
confidence: 99%
“…In this phenomenon, which has also been termed special resemblance (Cott 1957) or masquerade (Endler 1981), the animal evolves a detailed likeness to some specific, local feature of its envi-ronment (Edmunds 1990, Robinson 1969, Vane-Wright 1980. Pattern mimicry has produced some of the most spectacular examples of protective coloration, such as stick caterpillars (de Ruiter 1952), leaf-mimicking katydids (Castner & Nickle 1995), and leafy seadragons (Connolly et al 2002). However, most cryptically colored species display a more global, statistical resemblance to the background, in which the wavelength, intensity, and size of prey color patches converge on the mean of a multivariate distribution of background features.…”
Section: Components Of Crypticitymentioning
confidence: 99%
“…Predators guided by vision often prey differentially on different prey types (1), a response frequently taken as evidence for a predator's use of a specific search image (2,3). This evidence has included a number of different behavioral patterns, such as a predator's choosing one prey type more frequently than would be expected from the prey's relative density (1), a predator's responding to a familiar prey type before responding to a newly introduced type (2), or a predator's delaying before responding to a novel, cryptic prey type (3).…”
mentioning
confidence: 99%
“…Predators hunting in this way will tend to avoid widely spaced prey. Many cryptic and palatable prey are solitary (de Ruiter, 1952;Edmunds, 1974), and Croze(1970) andTinbergen etaL(1967)found that widely spaced cryptic baits suffered relatively less predation, perhaps because of a concentration by predators on a small area to reduce the time and energy involved in hunting (Curio, 1976). This behaviour will penalise groups of palatable prey, both because any searching image is more frequently reinforced and because any tendency to concentrate on the site of a successful first encounter with a particular food item will ensure that the predator takes more of them.…”
Section: Discussionmentioning
confidence: 99%