{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T17:31:16Z","timestamp":1743010276164,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030522452"},{"type":"electronic","value":"9783030522469"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-52246-9_24","type":"book-chapter","created":{"date-parts":[[2020,7,3]],"date-time":"2020-07-03T11:03:49Z","timestamp":1593774229000},"page":"337-349","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Raspberry Pi-Based Identity Verification Through Face Recognition Using Constrained Images"],"prefix":"10.1007","author":[{"given":"Alvin Jason A.","family":"Virata","sequence":"first","affiliation":[]},{"given":"Enrique D.","family":"Festijo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,4]]},"reference":[{"issue":"6","key":"24_CR1","first-page":"2533","volume":"2","author":"S Ohlyan","year":"2013","unstructured":"Ohlyan, S., Sangwan, S., Ahuja, T.: A survey on various problems & challenges in face recognition. Int. J. Eng. Res. Technol. (IJERT) 2(6), 2533\u20132538 (2013)","journal-title":"Int. J. Eng. Res. Technol. (IJERT)"},{"issue":"18","key":"24_CR2","doi-asserted-by":"publisher","first-page":"1587","DOI":"10.1002\/wcm.1203","volume":"13","author":"HT Dinh","year":"2013","unstructured":"Dinh, H.T., Lee, C., Niyato, D., Wang, P.: A survey of mobile cloud computing: architecture, applications, and approaches. Wireless Commun. Mobile comput. 13(18), 1587\u20131611 (2013)","journal-title":"Wireless Commun. Mobile comput."},{"key":"24_CR3","doi-asserted-by":"crossref","unstructured":"Virata, A.J.A., Festijo, E.D.: Understanding the acceptance of a face recognition-based identity verification system: an input to its design and development in the Philippines. In: 2019 IEEE 4th International Conference on Computer and Communication Systems (ICCCS), pp. 218\u2013222. IEEE, February 2019","DOI":"10.1109\/CCOMS.2019.8821785"},{"issue":"5","key":"24_CR4","doi-asserted-by":"publisher","first-page":"1278","DOI":"10.1016\/j.future.2012.08.003","volume":"29","author":"AN Khan","year":"2013","unstructured":"Khan, A.N., Kiah, M.M., Khan, S.U., Madani, S.A.: Towards secure mobile cloud computing: a survey. Future Generation Comput. Syst. 29(5), 1278\u20131299 (2013)","journal-title":"Future Generation Comput. Syst."},{"key":"24_CR5","doi-asserted-by":"crossref","unstructured":"Huerta-Canepa, G., Lee, D.: A virtual cloud computing provider for mobile devices. In: Proceedings of the 1st ACM Workshop on Mobile Cloud Computing & Services: Social Networks and Beyond, p. 6. ACM, June 2010","DOI":"10.1145\/1810931.1810937"},{"key":"24_CR6","doi-asserted-by":"crossref","unstructured":"Rimal, B.P., Choi, E., Lumb, I.: A taxonomy and survey of cloud computing systems. In: 2009 Fifth International Joint Conference on INC, IMS and IDC, pp. 44\u201351. IEEE, August 2009","DOI":"10.1109\/NCM.2009.218"},{"issue":"1","key":"24_CR7","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/0031-3203(94)90017-5","volume":"27","author":"G Yang","year":"1994","unstructured":"Yang, G., Huang, T.S.: Human face detection in a complex background. Pattern Recogn. 27(1), 53\u201363 (1994)","journal-title":"Pattern Recogn."},{"key":"24_CR8","doi-asserted-by":"crossref","unstructured":"Nguyen, A., Yosinski, J., Clune, J.: Deep neural networks are easily fooled: high confidence predictions for unrecognizable images. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 427\u2013436 (2015)","DOI":"10.1109\/CVPR.2015.7298640"},{"issue":"3","key":"24_CR9","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1006\/cviu.2001.0921","volume":"83","author":"E Hjelm\u00e5s","year":"2001","unstructured":"Hjelm\u00e5s, E., Low, B.K.: Face detection: a survey. Comput. Vis. Image Underst. 83(3), 236\u2013274 (2001)","journal-title":"Comput. Vis. Image Underst."},{"key":"24_CR10","unstructured":"Amos, B., Ludwiczuk, B., Satyanarayanan, M.: Openface: a general-purpose face recognition library with mobile applications. CMU School Comput. Sci., 6 (2016)"},{"key":"24_CR11","doi-asserted-by":"crossref","unstructured":"Lei, Z., Li, S.Z.: Face recognition models: computational approaches (2015)","DOI":"10.1016\/B978-0-08-097086-8.43041-2"},{"key":"24_CR12","doi-asserted-by":"crossref","unstructured":"Chellappa, R., Du, M., Turaga, P., Zhou, S.K.: Ace tracking and recognition in video. In: Handbook of Face Recognition, pp. 323\u2013351. Springer, London (2011)","DOI":"10.1007\/978-0-85729-932-1_13"},{"key":"24_CR13","doi-asserted-by":"crossref","unstructured":"Sun, Y., Wang, X., Tang, X.: Deep convolutional network cascade for facial point detection. In: Proceedings of the IEEE Conference on Computer Vision and pattern recognition, pp. 3476\u20133483 (2013)","DOI":"10.1109\/CVPR.2013.446"},{"key":"24_CR14","unstructured":"Zhang, C., Zhang, Z.: A survey of recent advances in face detection (2010)"},{"issue":"2","key":"24_CR15","first-page":"41","volume":"5","author":"R Jafri","year":"2009","unstructured":"Jafri, R., Arabnia, H.R.: A survey of face recognition techniques. Jips 5(2), 41\u201368 (2009)","journal-title":"Jips"},{"issue":"2","key":"24_CR16","doi-asserted-by":"publisher","first-page":"41","DOI":"10.3745\/JIPS.2009.5.2.041","volume":"5","author":"R Jafri","year":"2009","unstructured":"Jafri, R., Arabnia, H.R.: A survey of face recognition techniques. J. Inf. Process. Syst. 5(2), 41\u201368 (2009)","journal-title":"J. Inf. Process. Syst."},{"key":"24_CR17","doi-asserted-by":"crossref","unstructured":"Ahonen, T., Pietikainen, M., Hadid, A.: Face recognition with local binary pattern, ECCV (2004)","DOI":"10.1007\/978-3-540-24670-1_36"},{"issue":"8","key":"24_CR18","doi-asserted-by":"publisher","first-page":"1213","DOI":"10.1016\/j.jvcir.2013.08.004","volume":"24","author":"M Bereta","year":"2013","unstructured":"Bereta, M., Pedrycz, W., Reformat, M.: Local descriptors and similarity measures for frontal face recognition: a comparative analysis. J. Vis. Commun. Image Represent. 24(8), 1213\u20131231 (2013)","journal-title":"J. Vis. Commun. Image Represent."},{"key":"24_CR19","doi-asserted-by":"crossref","unstructured":"Ting, K.M.: Confusion matrix. In: Encyclopedia of Machine Learning and Data Mining, p. 260 (2017)","DOI":"10.1007\/978-1-4899-7687-1_50"}],"container-title":["Advances in Intelligent Systems and Computing","Intelligent Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-52246-9_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,3]],"date-time":"2020-07-03T23:04:10Z","timestamp":1593817450000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-52246-9_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030522452","9783030522469"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-52246-9_24","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"4 July 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SAI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Science and Information Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"London","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sai2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/saiconference.com\/Computing","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}