{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T21:31:33Z","timestamp":1772659893772,"version":"3.50.1"},"reference-count":65,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2021,1,7]],"date-time":"2021-01-07T00:00:00Z","timestamp":1609977600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,7]],"date-time":"2021-01-07T00:00:00Z","timestamp":1609977600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Vis Comput"],"published-print":{"date-parts":[[2022,2]]},"DOI":"10.1007\/s00371-020-02031-z","type":"journal-article","created":{"date-parts":[[2021,1,7]],"date-time":"2021-01-07T17:03:48Z","timestamp":1610039028000},"page":"509-523","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":29,"title":["An automated and efficient convolutional architecture for disguise-invariant face recognition using noise-based data augmentation and deep transfer learning"],"prefix":"10.1007","volume":"38","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5912-0504","authenticated-orcid":false,"given":"Muhammad Junaid","family":"Khan","sequence":"first","affiliation":[]},{"given":"Muhammad Jaleed","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Adil Masood","family":"Siddiqui","sequence":"additional","affiliation":[]},{"given":"Khurram","family":"Khurshid","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,7]]},"reference":[{"key":"2031_CR1","unstructured":"About Face ID advanced technology (2020). https:\/\/support.apple.com\/en-us\/HT208108"},{"key":"2031_CR2","unstructured":"Use Face ID on your iPhone or iPad Pro (2020). https:\/\/support.apple.com\/en-us\/HT208109"},{"issue":"11","key":"2031_CR3","doi-asserted-by":"publisher","first-page":"1617","DOI":"10.1007\/s00371-017-1428-z","volume":"34","author":"SH Abdurrahim","year":"2018","unstructured":"Abdurrahim, S.H., Samad, S.A., Huddin, A.B.: Review on the effects of age, gender, and race demographics on automatic face recognition. Vis. Comput. 34(11), 1617\u20131630 (2018)","journal-title":"Vis. Comput."},{"issue":"1","key":"2031_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2174\/1573405615666191219100824","volume":"15","author":"HM Ahmad","year":"2020","unstructured":"Ahmad, H.M., Khan, M.J., Yousaf, A., Ghuffar, S., Khurshid, K.: Deep Learning: A breakthrough in Medical Imaging. Curr. Med. Imaging Formerly Curr. Med. Imaging Rev. 15(1), 1\u201314 (2020). https:\/\/doi.org\/10.2174\/1573405615666191219100824","journal-title":"Curr. Med. Imaging Formerly Curr. Med. Imaging Rev."},{"issue":"12","key":"2031_CR5","doi-asserted-by":"publisher","first-page":"2037","DOI":"10.1109\/TPAMI.2006.244","volume":"28","author":"T Ahonen","year":"2006","unstructured":"Ahonen, T., Hadid, A., Pietik\u00e4inen, M.: Face description with local binary patterns: application to face recognition. IEEE Trans. Pattern Anal. Mach. Intell. 28(12), 2037\u20132041 (2006). https:\/\/doi.org\/10.1109\/TPAMI.2006.244","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"2031_CR6","doi-asserted-by":"publisher","unstructured":"Arsenovic, M., Sladojevic, S., Anderla, A., Stefanovic, D.: FaceTime - Deep learning based face recognition attendance system. In: Proceedings of the SISY 2017\u2014IEEE 15th International Symposium on Intelligent Systems and Informatics, pp. 53\u201357. Institute of Electrical and Electronics Engineers Inc. (2017). https:\/\/doi.org\/10.1109\/SISY.2017.8080587","DOI":"10.1109\/SISY.2017.8080587"},{"key":"2031_CR7","doi-asserted-by":"publisher","unstructured":"Bansal, A., Ranjan, R., Castillo, C.D., Chellappa, R.: Deep features for recognizing disguised faces in the wild. In: IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops, vol. 2018, pp. 10\u201316. IEEE Computer Society (2018). https:\/\/doi.org\/10.1109\/CVPRW.2018.00009","DOI":"10.1109\/CVPRW.2018.00009"},{"key":"2031_CR8","doi-asserted-by":"publisher","unstructured":"Cao, Z., Yin, Q., Tang, X., Sun, J.: Face recognition with learning-based descriptor. In: Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, pp. 2707\u20132714 (2010). https:\/\/doi.org\/10.1109\/CVPR.2010.5539992","DOI":"10.1109\/CVPR.2010.5539992"},{"key":"2031_CR9","doi-asserted-by":"publisher","unstructured":"Chen, C., Dantcheva, A., Ross, A.: Automatic facial makeup detection with application in face recognition. In: Proceedings\u20142013 International Conference on Biometrics, ICB 2013. IEEE Computer Society (2013). https:\/\/doi.org\/10.1109\/ICB.2013.6612994","DOI":"10.1109\/ICB.2013.6612994"},{"key":"2031_CR10","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.inffus.2015.09.005","volume":"32","author":"C Chen","year":"2016","unstructured":"Chen, C., Dantcheva, A., Ross, A.: An ensemble of patch-based subspaces for makeup-robust face recognition. Inf. fus. 32, 80\u201392 (2016)","journal-title":"Inf. fus."},{"key":"2031_CR11","doi-asserted-by":"publisher","unstructured":"Chen, C., Dantcheva, A., Swearingen, T., Ross, A.: Spoofing faces using makeup: An investigative study. In: IEEE International Conference on Identity, Security and Behavior Analysis, ISBA 2017. Institute of Electrical and Electronics Engineers Inc. (2017). https:\/\/doi.org\/10.1109\/ISBA.2017.7947686","DOI":"10.1109\/ISBA.2017.7947686"},{"issue":"11","key":"2031_CR12","doi-asserted-by":"publisher","first-page":"1483","DOI":"10.1007\/s00371-017-1357-x","volume":"33","author":"Y Cheng","year":"2017","unstructured":"Cheng, Y., Jiao, L., Cao, X., Li, Z.: Illumination-insensitive features for face recognition. Vis. Comput. 33(11), 1483\u20131493 (2017)","journal-title":"Vis. Comput."},{"key":"2031_CR13","doi-asserted-by":"publisher","unstructured":"Dantcheva, A., Chen, C., Ross, A.: Can facial cosmetics affect the matching accuracy of face recognition systems? In: 2012 IEEE 5th International Conference on Biometrics: Theory, Applications and Systems, BTAS 2012, pp. 391\u2013398 (2012). https:\/\/doi.org\/10.1109\/BTAS.2012.6374605","DOI":"10.1109\/BTAS.2012.6374605"},{"key":"2031_CR14","doi-asserted-by":"crossref","unstructured":"Deng, J., Guo, J., Xue, N., Zafeiriou, S.: ArcFace: Additive Angular Margin Loss for Deep Face Recognition. Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition 2019-June, 4685\u20134694 (2018). arxiv: 1801.07698","DOI":"10.1109\/CVPR.2019.00482"},{"key":"2031_CR15","doi-asserted-by":"crossref","unstructured":"Deng, J., Guo, J., Zhou, Y., Yu, J., Kotsia, I., Zafeiriou, S.: RetinaFace: Single-stage Dense Face Localisation in the Wild (2019). arxiv: 1905.00641","DOI":"10.1109\/CVPR42600.2020.00525"},{"key":"2031_CR16","doi-asserted-by":"publisher","unstructured":"Deng, J., Zafeririou, S.: Arcface for disguised face recognition. In: Proceedings - 2019 International Conference on Computer Vision Workshop, ICCVW 2019, pp. 485\u2013493. Institute of Electrical and Electronics Engineers Inc. (2019). https:\/\/doi.org\/10.1109\/ICCVW.2019.00061","DOI":"10.1109\/ICCVW.2019.00061"},{"issue":"3","key":"2031_CR17","doi-asserted-by":"publisher","first-page":"758","DOI":"10.1109\/TPAMI.2018.2800008","volume":"41","author":"W Deng","year":"2019","unstructured":"Deng, W., Hu, J., Guo, J.: Compressive Binary Patterns: Designing a Robust Binary Face Descriptor with Random-Field Eigenfilters. IEEE Trans. Pattern Anal. Mach. Intell. 41(3), 758\u2013767 (2019). https:\/\/doi.org\/10.1109\/TPAMI.2018.2800008","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"2031_CR18","doi-asserted-by":"publisher","unstructured":"Dhamecha, T.I., Nigam, A., Singh, R., Vatsa, M.: Disguise detection and face recognition in visible and thermal spectrums. In: Proceedings of 2013 International Conference on Biometrics, ICB 2013. IEEE Computer Society (2013). https:\/\/doi.org\/10.1109\/ICB.2013.6613019","DOI":"10.1109\/ICB.2013.6613019"},{"issue":"7","key":"2031_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1371\/journal.pone.0099212","volume":"9","author":"TI Dhamecha","year":"2014","unstructured":"Dhamecha, T.I., Singh, R., Vatsa, M., Kumar, A.: Recognizing disguised faces: human and machine evaluation. PLoS One 9(7), 1 (2014). https:\/\/doi.org\/10.1371\/journal.pone.0099212","journal-title":"PLoS One"},{"key":"2031_CR20","unstructured":"Fredj, H.B., Bouguezzi, S., Souani, C.: Face recognition in unconstrained environment with CNN. The Visual Computer pp. 1\u201310 (2020)"},{"issue":"1","key":"2031_CR21","doi-asserted-by":"publisher","first-page":"607","DOI":"10.1007\/s00521-017-3035-3","volume":"31","author":"Y Gao","year":"2019","unstructured":"Gao, Y., Lee, H.J.: Pose-invariant features and personalized correspondence learning for face recognition. Neural Comput. Appl. 31(1), 607\u2013616 (2019)","journal-title":"Neural Comput. Appl."},{"issue":"5","key":"2031_CR22","doi-asserted-by":"publisher","first-page":"814","DOI":"10.1109\/TCSVT.2013.2280076","volume":"24","author":"G Guo","year":"2014","unstructured":"Guo, G., Wen, L., Yan, S.: Face authentication with makeup changes. IEEE Trans. Circuits Syst. Video Technol. 24(5), 814\u2013825 (2014). https:\/\/doi.org\/10.1109\/TCSVT.2013.2280076","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"2031_CR23","first-page":"1","volume":"1","author":"S Gupta","year":"2020","unstructured":"Gupta, S., Thakur, K., Kumar, M.: 2d-human face recognition using sift and surf descriptors of face\u2019s feature regions. Vis. Comput. 1, 1\u201310 (2020)","journal-title":"Vis. Comput."},{"key":"2031_CR24","unstructured":"Huang, G.B., Mattar, M., Berg, T., Learned-Miller, E.: Labeled faces in the wild: a database forstudying face recognition in unconstrained environments (2008)"},{"key":"2031_CR25","doi-asserted-by":"publisher","unstructured":"Hung, K.M., Wu, J.A., Wen, C.H., Chen, L.M.: A system for disguised face recognition with convolution neural networks. In: ACM International Conference Proceeding Series, pp. 65\u201369. Association for Computing Machinery (2018). https:\/\/doi.org\/10.1145\/3299852.3299858","DOI":"10.1145\/3299852.3299858"},{"key":"2031_CR26","doi-asserted-by":"publisher","unstructured":"Khan, M.J., Khan, H.S., Yousaf, A., Khurshid, K., Abbas, A.: Modern Trends in Hyperspectral Image Analysis: A Review. IEEE Access 6, 14118\u201314129 (2018). https:\/\/doi.org\/10.1109\/ACCESS.2018.2812999. https:\/\/ieeexplore.ieee.org\/document\/8314827\/","DOI":"10.1109\/ACCESS.2018.2812999"},{"key":"2031_CR27","doi-asserted-by":"crossref","unstructured":"Khan, M.J., Khurshid, K., Shafait, F.: A Spatio-spectral hybrid convolutional architecture for hyperspectral document authentication. In: 2019 15th IAPR International Conference on Document Analysis and Recognition (ICDAR). IEEE (2019)","DOI":"10.1109\/ICDAR.2019.00178"},{"issue":"05","key":"2031_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1117\/1.JEI.27.5.053001","volume":"27","author":"MJ Khan","year":"2018","unstructured":"Khan, M.J., Yousaf, A., Abbas, A., Khurshid, K.: Deep learning for automated forgery detection in hyperspectral document images. J. Electron. Imaging 27(05), 1 (2018). https:\/\/doi.org\/10.1117\/1.JEI.27.5.053001","journal-title":"J. Electron. Imaging"},{"issue":"1","key":"2031_CR29","first-page":"44","volume":"7","author":"MJ Khan","year":"2017","unstructured":"Khan, M.J., Yousaf, A., Javed, N., Nadeem, S., Khurshid, K.: Automatic Target Detection in Satellite Images using Deep Learning. J. Space Technol. 7(1), 44\u201349 (2017)","journal-title":"J. Space Technol."},{"key":"2031_CR30","doi-asserted-by":"publisher","unstructured":"Khan, M.J., Yousaf, A., Khurshid, K., Abbas, A., Shafait, F.: Automated forgery detection in multispectral document images using fuzzy clustering. In: 13th IAPR International Workshop on Document Analysis Systems. IEEE, Vienna (2018). https:\/\/doi.org\/10.1109\/DAS.2018.26","DOI":"10.1109\/DAS.2018.26"},{"key":"2031_CR31","doi-asserted-by":"publisher","unstructured":"Kim, J., Sung, Y., Yoon, S.M., Park, B.G.: A new video surveillance system employing occluded face detection. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 3533 LNAI, pp. 65\u201368 (2005). https:\/\/doi.org\/10.1007\/11504894_10","DOI":"10.1007\/11504894_10"},{"key":"2031_CR32","doi-asserted-by":"publisher","unstructured":"Kohli, N., Yadav, D., Noore, A.: Face verification with disguise variations via deep disguise recognizer. In: IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops, vol. 2018-June, pp. 17\u201324. IEEE Computer Society (2018). https:\/\/doi.org\/10.1109\/CVPRW.2018.00010","DOI":"10.1109\/CVPRW.2018.00010"},{"key":"2031_CR33","doi-asserted-by":"publisher","unstructured":"Kose, N., Apvrille, L., Dugelay, J.L.: Facial makeup detection technique based on texture and shape analysis. In: 11th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition, FG 2015. Institute of Electrical and Electronics Engineers Inc. (2015). https:\/\/doi.org\/10.1109\/FG.2015.7163104","DOI":"10.1109\/FG.2015.7163104"},{"key":"2031_CR34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/tbiom.2019.2946175","volume":"1","author":"K Kotwal","year":"2019","unstructured":"Kotwal, K., Mostaani, Z., Marcel, S.: Detection of age-induced makeup attacks on face recognition systems using multi-layer deep features. IEEE Trans. Biomet. Behav. Ident. Sci. 1, 1 (2019). https:\/\/doi.org\/10.1109\/tbiom.2019.2946175","journal-title":"IEEE Trans. Biomet. Behav. Ident. Sci."},{"key":"2031_CR35","unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.E.: ImageNet classification with deep convolutional neural networks (2012)"},{"key":"2031_CR36","doi-asserted-by":"publisher","unstructured":"Kushwaha, V., Singh, M., Singh, R., Vatsa, M., Ratha, N., Chellappa, R.: Disguised faces in the wild. In: IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops, vol. 2018, pp. 1\u20139. IEEE Computer Society (2018). https:\/\/doi.org\/10.1109\/CVPRW.2018.00008","DOI":"10.1109\/CVPRW.2018.00008"},{"issue":"2","key":"2031_CR37","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1109\/TPAMI.2013.112","volume":"36","author":"Z Lei","year":"2014","unstructured":"Lei, Z., Pietikainen, M., Li, S.Z.: Learning discriminant face descriptor. IEEE Trans. Pattern Anal. Mach. Intell. 36(2), 289\u2013302 (2014). https:\/\/doi.org\/10.1109\/TPAMI.2013.112","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"2031_CR38","unstructured":"Li, Y., Song, L., Wu, X., He, R., Tan, T.: Anti-makeup: learning a bi-level adversarial network for makeup-invariant face verification (2017). arxiv: 1709.03654"},{"issue":"4","key":"2031_CR39","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1109\/TIP.2002.999679","volume":"11","author":"C Liu","year":"2002","unstructured":"Liu, C., Wechsler, H.: Gabor feature based classification using the enhanced Fisher linear discriminant model for face recognition. IEEE Trans. Image Process. 11(4), 467\u2013476 (2002). https:\/\/doi.org\/10.1109\/TIP.2002.999679","journal-title":"IEEE Trans. Image Process."},{"issue":"6","key":"2031_CR40","doi-asserted-by":"publisher","first-page":"748","DOI":"10.1109\/TPAMI.2002.1008382","volume":"24","author":"AM Mart\u00ednez","year":"2002","unstructured":"Mart\u00ednez, A.M.: Recognizing imprecisely localized, partially occluded, and expression variant faces from a single sample per class. IEEE Trans. Pattern Anal. Mach. Intell. 24(6), 748\u2013763 (2002). https:\/\/doi.org\/10.1109\/TPAMI.2002.1008382","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"2031_CR41","doi-asserted-by":"publisher","unstructured":"Min, R., Hadid, A., Dugelay, J.L.: Improving the recognition of faces occluded by facial accessories. In: IEEE International conference on automatic face and gesture recognition and workshops, FG 2011, pp. 442\u2013447 (2011). https:\/\/doi.org\/10.1109\/FG.2011.5771439","DOI":"10.1109\/FG.2011.5771439"},{"key":"2031_CR42","doi-asserted-by":"publisher","unstructured":"Peri, S.V., Dhall, A.: DisguiseNet: A contrastive approach for disguised face verification in the wild. In: IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops, vol. 2018, pp. 25\u201331. IEEE Computer Society (2018). https:\/\/doi.org\/10.1109\/CVPRW.2018.00011","DOI":"10.1109\/CVPRW.2018.00011"},{"key":"2031_CR43","doi-asserted-by":"publisher","first-page":"1999","DOI":"10.1109\/ICIP.2004.1421474","volume":"3","author":"N Ramanathan","year":"2004","unstructured":"Ramanathan, N., Chellappa, R., Roy Chowdhury, A.K.: Facial similarity across age, disguise, illumination and pose. Proc. Int. Conf. Image Process. ICIP 3, 1999\u20132002 (2004). https:\/\/doi.org\/10.1109\/ICIP.2004.1421474","journal-title":"Proc. Int. Conf. Image Process. ICIP"},{"key":"2031_CR44","unstructured":"Ranjan, R., Sankaranarayanan, S., Castillo, C.D., Chellappa, R.: An all-in-one convolutional neural network for face analysis (2016). arxiv: 1611.00851"},{"issue":"6","key":"2031_CR45","doi-asserted-by":"publisher","first-page":"530","DOI":"10.1049\/iet-bmt.2018.5059","volume":"7","author":"S Rasti","year":"2018","unstructured":"Rasti, S., Yazdi, M., Masnadi-Shirazi, M.A.: Biologically inspired makeup detection system with application in face recognition. IET Biomet. 7(6), 530\u2013535 (2018). https:\/\/doi.org\/10.1049\/iet-bmt.2018.5059","journal-title":"IET Biomet."},{"issue":"3","key":"2031_CR46","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/s11263-015-0816-y","volume":"115","author":"O Russakovsky","year":"2015","unstructured":"Russakovsky, O., Deng, J., Su, H., Krause, J., Satheesh, S., Ma, S., Huang, Z., Karpathy, A., Khosla, A., Bernstein, M., Berg, A.C., Fei-Fei, L.: ImageNet large scale visual recognition challenge. Int. J. Comput. Vis. 115(3), 211\u2013252 (2015). https:\/\/doi.org\/10.1007\/s11263-015-0816-y","journal-title":"Int. J. Comput. Vis."},{"key":"2031_CR47","doi-asserted-by":"publisher","unstructured":"Sajid, M., Ali, N., Dar, S.H., Iqbal\u00a0Ratyal, N., Butt, A.R., Zafar, B., Shafique, T., Baig, M.J.A., Riaz, I., Baig, S.: Data augmentation-assisted makeup-invariant face recognition. Math. Problems Eng. 2018 (2018). https:\/\/doi.org\/10.1155\/2018\/2850632","DOI":"10.1155\/2018\/2850632"},{"key":"2031_CR48","doi-asserted-by":"crossref","unstructured":"Shu, X., Qi, G.J., Tang, J., Wang, J.: Weakly-shared deep transfer networks for heterogeneous-domain knowledge propagation. In: Proceedings of the 23rd ACM International Conference on Multimedia, pp. 35\u201344 (2015)","DOI":"10.1145\/2733373.2806216"},{"issue":"2","key":"2031_CR49","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1109\/tbiom.2019.2903860","volume":"1","author":"M Singh","year":"2019","unstructured":"Singh, M., Singh, R., Vatsa, M., Ratha, N.K., Chellappa, R.: Recognizing disguised faces in the wild. IEEE Trans. Biometr. Behav. Ident. Sci. 1(2), 97\u2013108 (2019). https:\/\/doi.org\/10.1109\/tbiom.2019.2903860","journal-title":"IEEE Trans. Biometr. Behav. Ident. Sci."},{"issue":"3","key":"2031_CR50","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1016\/j.imavis.2007.06.010","volume":"27","author":"R Singh","year":"2009","unstructured":"Singh, R., Vatsa, M., Noore, A.: Face recognition with disguise and single gallery images. Image Vis. Comput. 27(3), 245\u2013257 (2009). https:\/\/doi.org\/10.1016\/j.imavis.2007.06.010","journal-title":"Image Vis. Comput."},{"key":"2031_CR51","doi-asserted-by":"publisher","unstructured":"Smirnov, E., Ivanova, E., Melnikov, A., Kalinovskiy, I., Oleinik, A., Luckyanets, E.: Hard example mining with auxiliary embeddings. In: IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops, vol. 2018, pp. 37\u201346. IEEE Computer Society (2018). https:\/\/doi.org\/10.1109\/CVPRW.2018.00013","DOI":"10.1109\/CVPRW.2018.00013"},{"key":"2031_CR52","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/j.patcog.2017.01.011","volume":"66","author":"Y Sun","year":"2017","unstructured":"Sun, Y., Ren, L., Wei, Z., Liu, B., Zhai, Y., Liu, S.: A weakly supervised method for makeup-invariant face verification. Pattern Recognit. 66, 153\u2013159 (2017). https:\/\/doi.org\/10.1016\/j.patcog.2017.01.011","journal-title":"Pattern Recognit."},{"key":"2031_CR53","doi-asserted-by":"publisher","unstructured":"Suri, S., Sankaran, A., Vatsa, M., Singh, R.: On matching faces with alterations due to plastic surgery and disguise. In: IEEE 9th International Conference on Biometrics Theory, Applications and Systems, BTAS 2018. Institute of Electrical and Electronics Engineers Inc. (2018). https:\/\/doi.org\/10.1109\/BTAS.2018.8698571","DOI":"10.1109\/BTAS.2018.8698571"},{"key":"2031_CR54","doi-asserted-by":"crossref","unstructured":"Taigman, Y., Yang, M., Ranzato, M., Wolf, L.: Deepface: Closing the gap to human-level performance in face verification. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1701\u20131708 (2014)","DOI":"10.1109\/CVPR.2014.220"},{"issue":"4","key":"2031_CR55","first-page":"1","volume":"12","author":"J Tang","year":"2016","unstructured":"Tang, J., Shu, X., Li, Z., Qi, G.J., Wang, J.: Generalized deep transfer networks for knowledge propagation in heterogeneous domains. ACM Trans. Multimed. Comput. Commun. Appl. (TOMM) 12(4), 1\u201322 (2016)","journal-title":"ACM Trans. Multimed. Comput. Commun. Appl. (TOMM)"},{"issue":"1","key":"2031_CR56","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1162\/jocn.1991.3.1.71","volume":"3","author":"M Turk","year":"1991","unstructured":"Turk, M., Pentland, A.: Eigenfaces for recognition. J. Cognit. Neurosci. 3(1), 71\u201386 (1991). https:\/\/doi.org\/10.1162\/jocn.1991.3.1.71","journal-title":"J. Cognit. Neurosci."},{"issue":"2","key":"2031_CR57","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1023\/B:VISI.0000013087.49260.fb","volume":"57","author":"P Viola","year":"2004","unstructured":"Viola, P., Jones, M.J.: Robust Real-Time Face Detection. Int. J. Comput. Vis. 57(2), 137\u2013154 (2004). https:\/\/doi.org\/10.1023\/B:VISI.0000013087.49260.fb","journal-title":"Int. J. Comput. Vis."},{"key":"2031_CR58","doi-asserted-by":"publisher","unstructured":"Wang, T.Y., Kumar, A.: Recognizing human faces under disguise and makeup. In: ISBA 2016\u2014IEEE International Conference on Identity, Security and Behavior Analysis. Institute of Electrical and Electronics Engineers Inc. (2016). https:\/\/doi.org\/10.1109\/ISBA.2016.7477243","DOI":"10.1109\/ISBA.2016.7477243"},{"issue":"4","key":"2031_CR59","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1007\/s00371-013-0861-x","volume":"30","author":"Z Wang","year":"2014","unstructured":"Wang, Z., Miao, Z., Wu, Q.J., Wan, Y., Tang, Z.: Low-resolution face recognition: a review. Vis. Comput. 30(4), 359\u2013386 (2014)","journal-title":"Vis. Comput."},{"key":"2031_CR60","doi-asserted-by":"publisher","unstructured":"Wu, F., Yan, S., Smith, J.S., Lu, W., Zhang, B.: Unsupervised domain adaptation for disguised face recognition. In: Proceedings of the 2019 IEEE International Conference on Multimedia and Expo Workshops, ICMEW 2019, pp. 537\u2013542. Institute of Electrical and Electronics Engineers Inc. (2019). https:\/\/doi.org\/10.1109\/ICMEW.2019.00098","DOI":"10.1109\/ICMEW.2019.00098"},{"key":"2031_CR61","doi-asserted-by":"publisher","unstructured":"Yang, M., Zhang, L.: Gabor feature based sparse representation for face recognition with Gabor occlusion dictionary. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 6316 LNCS, pp. 448\u2013461 (2010). https:\/\/doi.org\/10.1007\/978-3-642-15567-3_33","DOI":"10.1007\/978-3-642-15567-3_33"},{"key":"2031_CR62","doi-asserted-by":"publisher","unstructured":"Yousaf, A., Khan, M.J., Khan, M.J., Javed, N., Ibrahim, H., Khurshid, K., Khurshid, K.: Size invariant handwritten character recognition using single layer feedforward backpropagation neural networks. In: 2nd International Conference on Computing, Mathematics and Engineering Technologies, iCoMET 2019 (2019). https:\/\/doi.org\/10.1109\/ICOMET.2019.8673459","DOI":"10.1109\/ICOMET.2019.8673459"},{"key":"2031_CR63","doi-asserted-by":"crossref","unstructured":"Yousaf, A., Khan, M.J., Khan, M.J., Siddiqui, A.M., Khurshid, K.: A robust and efficient convolutional deep learning framework for age-invariant face recognition. Expert Syst. e12503 (2019)","DOI":"10.1111\/exsy.12503"},{"key":"2031_CR64","doi-asserted-by":"publisher","unstructured":"Zhang, K., Chang, Y.L., Hsu, W.: Deep disguised faces recognition. In: IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops, vol. 2018, pp. 32\u201336. IEEE Computer Society (2018). https:\/\/doi.org\/10.1109\/CVPRW.2018.00012","DOI":"10.1109\/CVPRW.2018.00012"},{"key":"2031_CR65","doi-asserted-by":"crossref","unstructured":"Zhao, J., Cheng, Y., Xu, Y., Xiong, L., Li, J., Zhao, F., Jayashree, K., Pranata, S., Shen, S., Xing, J., et\u00a0al.: Towards pose invariant face recognition in the wild. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 2207\u20132216 (2018)","DOI":"10.1109\/CVPR.2018.00235"}],"container-title":["The Visual Computer"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00371-020-02031-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00371-020-02031-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00371-020-02031-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,21]],"date-time":"2022-02-21T19:16:44Z","timestamp":1645471004000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00371-020-02031-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,7]]},"references-count":65,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,2]]}},"alternative-id":["2031"],"URL":"https:\/\/doi.org\/10.1007\/s00371-020-02031-z","relation":{},"ISSN":["0178-2789","1432-2315"],"issn-type":[{"value":"0178-2789","type":"print"},{"value":"1432-2315","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,7]]},"assertion":[{"value":"21 November 2020","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 January 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}