{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T06:28:31Z","timestamp":1776407311222,"version":"3.51.2"},"publisher-location":"Singapore","reference-count":26,"publisher":"Springer Singapore","isbn-type":[{"value":"9789811566332","type":"print"},{"value":"9789811566349","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-6634-9_27","type":"book-chapter","created":{"date-parts":[[2020,7,17]],"date-time":"2020-07-17T14:27:09Z","timestamp":1594996029000},"page":"293-304","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Real-Time Biometric System for Security and Surveillance Using Face Recognition"],"prefix":"10.1007","author":[{"given":"Arvind","family":"Jaiswal","sequence":"first","affiliation":[]},{"given":"Sandhya","family":"Tarar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,18]]},"reference":[{"key":"27_CR1","doi-asserted-by":"publisher","first-page":"121236","DOI":"10.1109\/ACCESS.2019.2937810","volume":"7","author":"M Awais","year":"2019","unstructured":"Awais, M., et al.: Real-time surveillance through face recognition using HOG and feedforward neural networks. IEEE Access 7, 121236\u2013121244 (2019)","journal-title":"IEEE Access"},{"issue":"8","key":"27_CR2","doi-asserted-by":"publisher","first-page":"2229","DOI":"10.1109\/TCSVT.2018.2866701","volume":"29","author":"W Heng","year":"2019","unstructured":"Heng, W., Jiang, T., Gao, W.: How to assess the quality of compressed surveillance videos using face recognition. IEEE Trans. Circuits Syst. Video Technol. 29(8), 2229\u20132243 (2019)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"3","key":"27_CR3","doi-asserted-by":"publisher","first-page":"757","DOI":"10.1109\/TIFS.2018.2866295","volume":"14","author":"F Mokhayeri","year":"2009","unstructured":"Mokhayeri, F., Granger, E., Bilodeau, G.-A.: Domain-specific face synthesis for video face recognition from a single sample per person. IEEE Trans. Inf. Forensics Secur. 14(3), 757\u2013772 (2009)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"27_CR4","doi-asserted-by":"crossref","unstructured":"Mantoro, T., et al.: Multi-faces recognition process using Haar cascades and eigenface methods. In: 2018 6th International Conference on Multimedia Computing and Systems (ICMCS), pp. 1\u20135 (2018)","DOI":"10.1109\/ICMCS.2018.8525935"},{"issue":"5","key":"27_CR5","doi-asserted-by":"publisher","first-page":"1188","DOI":"10.1109\/TPAMI.2018.2827389","volume":"41","author":"G Mai","year":"2019","unstructured":"Mai, G., et al.: On the reconstruction of face images from deep face templates. IEEE Trans. Pattern Anal. Mach. Intell. 41(5), 1188\u20131202 (2019). \nhttps:\/\/doi.org\/10.1109\/TPAMI.2018.2827389","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"27_CR6","doi-asserted-by":"publisher","unstructured":"Roomi, M., Beham, M.P.: A review of face recognition methods. Int. J. Pattern Recogn. Artif. Intell. 27 (2013). \nhttps:\/\/doi.org\/10.1142\/s0218001413560053","DOI":"10.1142\/s0218001413560053"},{"key":"27_CR7","doi-asserted-by":"publisher","first-page":"7991","DOI":"10.1016\/j.eswa.2015.06.016","volume":"42","author":"R Arroyo","year":"2015","unstructured":"Arroyo, R., Torres, J.J.Y., Bergasa, L.M., Daza, I.G., Almaz\u00e1n, J.: Expert video-surveillance system for real-time detection of suspicious behaviors in shopping malls. Expert Syst. Appl. 42, 7991\u20138005 (2015)","journal-title":"Expert Syst. Appl."},{"key":"27_CR8","doi-asserted-by":"publisher","first-page":"9691","DOI":"10.1109\/ACCESS.2017.2700162","volume":"5","author":"SC Loke","year":"2017","unstructured":"Loke, S.C.: Astronomical image acquisition using an improved track and accumulate method. IEEE Access 5, 9691\u20139698 (2017)","journal-title":"IEEE Access"},{"key":"27_CR9","unstructured":"Kumar, M.P.R., Keerthi Sravan, R., Aishwarya, K.M.: Artificial neural networks for face recognition using PCA and BPNN. In: TENCON 2015 - 2015 IEEE Region 10 Conference, pp 1\u20136 (2015)"},{"key":"27_CR10","doi-asserted-by":"crossref","unstructured":"Wong, Y., Chen, S., Mau, S., Sanderson, C., Lovell, B.C.: Patch-based probabilistic image quality assessment for face selection and improved video-based face recognition. In: CVPR 2011 Workshops, Colorado Springs, CO, pp. 74\u201381 (2011)","DOI":"10.1109\/CVPRW.2011.5981881"},{"key":"27_CR11","doi-asserted-by":"publisher","first-page":"578","DOI":"10.1016\/j.procs.08.076,2015)","volume":"58","author":"S Arya","year":"2015","unstructured":"Arya, S., Pratap, N., Bhatia, K.: Future of face recognition: a review. Procedia Comput. Sci. 58, 578\u2013585 (2015). \nhttps:\/\/doi.org\/10.1016\/j.procs.08.076,2015)","journal-title":"Procedia Comput. Sci."},{"issue":"6","key":"27_CR12","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1049\/el.2017.0023","volume":"53","author":"Y Kim","year":"2017","unstructured":"Kim, Y., Kim, H., Kim, S., Kim, H., Ko, S.: Illumination normalization using a convolutional neural network with application to face recognition. Electron. Lett. 53(6), 399\u2013401 (2017). \nhttps:\/\/doi.org\/10.1049\/el.2017.0023","journal-title":"Electron. Lett."},{"key":"27_CR13","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-85729-932-1","volume-title":"Handbook of Face Recognition","author":"SZ Li","year":"2011","unstructured":"Li, S.Z., Jain, A.K.: Handbook of Face Recognition. Springer, New York (2011). \nhttps:\/\/doi.org\/10.1007\/978-0-85729-932-1"},{"key":"27_CR14","first-page":"7","volume":"3","author":"D Malik","year":"2016","unstructured":"Malik, D., Bansal, S.: Face recognition based on principal component analysis and linear discriminant analysis. Int. J. Res. Electron. Commun. Technol. (IJRECT 2016) 3, 7\u201310 (2016)","journal-title":"Int. J. Res. Electron. Commun. Technol. (IJRECT 2016)"},{"key":"27_CR15","doi-asserted-by":"publisher","first-page":"5149","DOI":"10.1109\/ACCESS.2017.2685079","volume":"5","author":"P Padilla","year":"2017","unstructured":"Padilla, P., et al.: Electromagnetic near-field inhomogeneity reduction for image acquisition optimization in high-resolution multi-channel magnetic resonance imaging (MRI) systems. IEEE Access 5, 5149\u20135157 (2017)","journal-title":"IEEE Access"},{"key":"27_CR16","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1109\/TBDATA.2017.2715815","volume":"4","author":"Z Shao","year":"2018","unstructured":"Shao, Z., Cai, J., Wang, Z.: Smart monitoring cameras driven intelligent processing to big surveillance video data. IEEE Trans. Big Data 4, 105\u2013116 (2018)","journal-title":"IEEE Trans. Big Data"},{"key":"27_CR17","doi-asserted-by":"publisher","unstructured":"Abuzneid, M., Mahmood, A.: Enhanced human face recognition using LBPH descriptor, multi-KNN, and back-propagation neural network. IEEE Access, 1 (2018). \nhttps:\/\/doi.org\/10.1109\/ACCESS.2018.2825310","DOI":"10.1109\/ACCESS.2018.2825310"},{"key":"27_CR18","doi-asserted-by":"crossref","unstructured":"Meena, D., Sharan, R.: An approach to face detection and recognition. In: 2016 International Conference on Recent Advances and Innovations in Engineering (ICRAIE), pp. 1\u20136 (2016)","DOI":"10.1109\/ICRAIE.2016.7939462"},{"key":"27_CR19","doi-asserted-by":"crossref","unstructured":"Satari, B.S., Rahman, N.A.A., Abidin, Z.M.Z.: Face recognition for security efficiency in managing and monitoring visitors of an organization. In: 2014 International Symposium on Biometrics and Security Technologies (ISBAST), pp. 95\u2013101 (2014)","DOI":"10.1109\/ISBAST.2014.7013101"},{"key":"27_CR20","doi-asserted-by":"publisher","unstructured":"Jamil, N., Lqbal, S., Iqbal, N.: Face recognition using neural networks. In: 2001 Proceedings of the IEEE International Multi Topic Conference. IEEE INMIC 2001. Technology for the 21st Century, Lahore, Pakistan, pp. 277\u2013281 (2001). \nhttps:\/\/doi.org\/10.1109\/INMIC.2001.995351","DOI":"10.1109\/INMIC.2001.995351"},{"key":"27_CR21","doi-asserted-by":"publisher","unstructured":"Khokher, R., Singh, R.C., Kumar, R.: Footprint recognition with principal component analysis and independent component analysis. In: Macromolecular Symposia, vol. 347 (2015). \nhttps:\/\/doi.org\/10.1002\/masy.201400045","DOI":"10.1002\/masy.201400045"},{"key":"27_CR22","doi-asserted-by":"publisher","unstructured":"Dalal, N., Triggs, B.: Histograms of oriented gradients for human detection. In: 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2005), San Diego, CA, USA, vol. 1, pp. 886\u2013893 (2005). \nhttps:\/\/doi.org\/10.1109\/CVPR.2005.177","DOI":"10.1109\/CVPR.2005.177"},{"key":"27_CR23","first-page":"24","volume":"115","author":"D Meva","year":"2015","unstructured":"Meva, D., Kumbharana, C.K.: Identification of best suitable samples for training database for face recognition using principal component analysis with eigenface method. Int. J. Comput. Appl. 115, 24\u201326 (2015)","journal-title":"Int. J. Comput. Appl."},{"key":"27_CR24","doi-asserted-by":"publisher","first-page":"658","DOI":"10.1109\/TAES.2015.140167","volume":"52","author":"T Sakamoto","year":"2016","unstructured":"Sakamoto, T., Sato, T., Aubry, P., Yarovoy, A.: Fast imaging method for security systems using ultrawideband radar. IEEE Trans. Aerosp. Electron. Syst. 52, 658\u2013670 (2016)","journal-title":"IEEE Trans. Aerosp. Electron. Syst."},{"key":"27_CR25","doi-asserted-by":"publisher","first-page":"1063","DOI":"10.1109\/TCSVT.2014.2367352","volume":"25","author":"J Xu","year":"2015","unstructured":"Xu, J., Denman, S., Sridharan, S., Fookes, C.: An efficient and robust system for multiperson event detection in real-world indoor surveillance scenes. IEEE Trans. Circuits Syst. Video Technol. 25, 1063\u20131076 (2015)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"27_CR26","doi-asserted-by":"publisher","unstructured":"Hou, B., Zheng, R., Yang, G.: Quick search algorithms based on ethnic facial image database, pp. 573\u2013576 (2014). \nhttps:\/\/doi.org\/10.1109\/ICSESS.2014.6933633","DOI":"10.1109\/ICSESS.2014.6933633"}],"container-title":["Communications in Computer and Information Science","Advances in Computing and Data Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-6634-9_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,17]],"date-time":"2020-07-17T14:38:38Z","timestamp":1594996718000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-6634-9_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789811566332","9789811566349"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-6634-9_27","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"18 July 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICACDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advances in Computing and Data Sciences","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Valletta","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Malta","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 April 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 April 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icacds2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/icacds.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"354","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"46","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"13% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}