{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T20:40:13Z","timestamp":1737492013394,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540403029"},{"type":"electronic","value":"9783540448877"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-44887-x_53","type":"book-chapter","created":{"date-parts":[[2007,10,20]],"date-time":"2007-10-20T18:16:42Z","timestamp":1192904202000},"page":"446-454","source":"Crossref","is-referenced-by-count":0,"title":["Discriminative Face Recognition"],"prefix":"10.1007","author":[{"given":"Florent","family":"Perronnin","sequence":"first","affiliation":[]},{"given":"Jean-Luc","family":"Dugelay","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,6,24]]},"reference":[{"key":"53_CR1","unstructured":"Perronnin, F., Dugelay, J.-L. and Rose, K., \u201cA Probabilistic Model of Face Transformation Applied to Person Identification\u201d, submitted to the Special Issue on Biometric Signal Processing of the EURASIP Journal."},{"issue":"3","key":"53_CR2","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1109\/12.210173","volume":"42","author":"M. Lades","year":"1993","unstructured":"Lades, M., Vorbr\u00fcggen, J.C., Buhmann J., Lange, J., von der Malsburg, C., W\u00fcrtz, R. and Konen, W., \u201cDistortion Invariant Object Recognition in the Dynamic Link Architecture\u201d, IEEE Trans. on Computers, 1993, Vol. 42, No. 3, pp 300\u2013311, March.","journal-title":"IEEE Trans. on Computers"},{"key":"53_CR3","doi-asserted-by":"crossref","unstructured":"Rabiner L.R., \u201cA Tutorial on Hidden Markov Models and Selected Applications\u201d, Proc. of the IEEE, 1989, Vol. 77, No. 2, Feb.","DOI":"10.1109\/5.18626"},{"key":"53_CR4","doi-asserted-by":"crossref","unstructured":"Perronnin, F., Dugelay J.-L. and Rose, K., \u201cIterative Decoding of Two-Dimensional Hidden Markov Models\u201d, ICASSP 2003.","DOI":"10.1109\/ICASSP.2003.1199474"},{"issue":"4","key":"53_CR5","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1109\/83.753738","volume":"8","author":"B. Duc","year":"1999","unstructured":"Duc, B., Fischer, S. and Big\u00fcn, J. \u201cFace Authentication with Gabor Information on Deformable Graphs\u201d, IEEE Trans. on Image Processing, 1999, Vol. 8, No. 4, pp. 504\u2013516, April.","journal-title":"IEEE Trans. on Image Processing"},{"issue":"1","key":"53_CR6","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/6046.825791","volume":"2","author":"C. Kotropoulos","year":"2000","unstructured":"Kotropoulos C., Tefas A. and Pitas I., \u201cFrontal Face Authentication Using Discriminating Grids with Morphological Feature Vectors\u201d, IEEE Trans. on Multimedia, 2000, Vol. 2, No. 1, pp. 14\u201326, March.","journal-title":"IEEE Trans. on Multimedia"},{"key":"53_CR7","unstructured":"Duda, R.O., Hart, P.E. and Stork D.G., \u201cPattern Classification\u201d, John Wiley & Sons, 2nd edition, 2001."},{"key":"53_CR8","unstructured":"Normandin, Y., \u201cAn Improved MMIE Training Algorithm for Speaker Independent, Small Vocabulary, Continuous Speech Recognition\u201d, ICASSP 91, pp. 537\u2013540."},{"key":"53_CR9","unstructured":"Woodland, P. C. and Povey, D., \u201cLarge Scale MMIE Training for Conversational Telephone Speech Recognition\u201d, Proc. Speech Transcription Workshop, College Park, 2000."},{"issue":"1","key":"53_CR10","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1109\/18.61108","volume":"37","author":"P. S. Gopalakrishnan","year":"1991","unstructured":"Gopalakrishnan, P. S., Kanevsky, D., Nadas, A. and Nahamoo, D., \u201cAn Inequality for Rational Functions with Applications to Some Statistical Estimation Problems\u201d, IEEE Trans. on Information Theory, 1991, Vol. 37, No. 1, pp. 107\u2013113.","journal-title":"IEEE Trans. on Information Theory"},{"key":"53_CR11","doi-asserted-by":"crossref","unstructured":"Merialdo, B., \u201cPhonetic Recognition Using Hidden Markov Models and Maximum Mutual Information Training\u201d, ICASSP 88, Vol. 1, pp. 111\u2013114.","DOI":"10.1109\/ICASSP.1988.196524"},{"issue":"5","key":"53_CR12","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1016\/S0262-8856(97)00070-X","volume":"16","author":"P. J. Phillips","year":"1998","unstructured":"Phillips, P. J., Wechsler, H., Huang, J. and Rauss, P. \u201cThe FERET Database and Evaluation Procedure for Face Recognition Algorithms,\u201d Image and Vision Computing Journal, 1998, Vol. 16, No. 5, pp. 295\u2013306.","journal-title":"Image and Vision Computing Journal"}],"container-title":["Lecture Notes in Computer Science","Audio- and Video-Based Biometric Person Authentication"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44887-X_53","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T20:01:47Z","timestamp":1737489707000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44887-X_53"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540403029","9783540448877"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/3-540-44887-x_53","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}