{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T15:28:04Z","timestamp":1761060484813,"version":"3.37.3"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2017,12,23]],"date-time":"2017-12-23T00:00:00Z","timestamp":1513987200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.1007\/s11042-017-5475-2","type":"journal-article","created":{"date-parts":[[2017,12,23]],"date-time":"2017-12-23T02:39:52Z","timestamp":1513996792000},"page":"11219-11240","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Robust and efficient face recognition via low-rank supported extreme learning machine"],"prefix":"10.1007","volume":"77","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8117-2012","authenticated-orcid":false,"given":"Tao","family":"Lu","sequence":"first","affiliation":[]},{"given":"Yingjie","family":"Guan","sequence":"additional","affiliation":[]},{"given":"Yanduo","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Shenming","family":"Qu","sequence":"additional","affiliation":[]},{"given":"Zixiang","family":"Xiong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,23]]},"reference":[{"issue":"12","key":"5475_CR1","doi-asserted-by":"crossref","first-page":"2037","DOI":"10.1109\/TPAMI.2006.244","volume":"28","author":"T Ahonen","year":"2006","unstructured":"Ahonen T, Hadid A, Pietikainen M (2006) Face description with local binary patterns: application to face recognition. IEEE Trans Pattern Anal Mach Intell 28(12):2037\u20132041","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"5475_CR2","unstructured":"Al-Ayyoub M, AlZu\u2019bi S, Jararweh Y, Shehab MA, Gupta BB (2016) Accelerating 3D medical volume segmentation using GPUs. Multimedia Tools and Applications. Springer New York LLC, New York, pp. 1\u201320"},{"issue":"3","key":"5475_CR3","doi-asserted-by":"crossref","first-page":"3537","DOI":"10.1007\/s11042-016-3884-2","volume":"76","author":"MA Alsmirat","year":"2017","unstructured":"Alsmirat MA, Jararweh Y, Al-Ayyoub M, Shehab MA, Gupta BB (2017) Accelerating compute intensive medical imaging segmentation algorithms using hybrid CPU-GPU implementations. Multimedia Tools and Applications 76(3):3537\u20133555","journal-title":"Multimedia Tools and Applications"},{"issue":"18","key":"5475_CR4","doi-asserted-by":"crossref","first-page":"18451","DOI":"10.1007\/s11042-016-3930-0","volume":"76","author":"S Atawneh","year":"2017","unstructured":"Atawneh S, Almomani A, Al Bazar H, Sumari P, Gupta B (2017) Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain. Multimedia Tools and Applications 76(18):18451\u201318472","journal-title":"Multimedia Tools and Applications"},{"issue":"3","key":"5475_CR5","doi-asserted-by":"crossref","first-page":"346","DOI":"10.1016\/j.cviu.2007.09.014","volume":"110","author":"H Bay","year":"2008","unstructured":"Bay H, Ess A, Tuytelaars T, Van Gool L (2008) Speeded-up robust features (SURF). Comput Vis Image Underst 110(3):346\u2013359","journal-title":"Comput Vis Image Underst"},{"issue":"7","key":"5475_CR6","doi-asserted-by":"crossref","first-page":"711","DOI":"10.1109\/34.598228","volume":"19","author":"PN Belhumeur","year":"1997","unstructured":"Belhumeur PN, Hespanha JP, Kriegman DJ (1997) Eigenfaces vs. fisherfaces: recognition using class specific linear projection. IEEE Trans Pattern Anal Mach Intell 19(7):711\u2013720","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"5475_CR7","doi-asserted-by":"crossref","unstructured":"Cai S, Zhang L, Zuo W, Feng X (2016) A probabilistic collaborative representation based approach for pattern classification. In Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 2950\u20132959","DOI":"10.1109\/CVPR.2016.322"},{"issue":"3","key":"5475_CR8","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1145\/1970392.1970395","volume":"58","author":"EJ Cand\u00e8s","year":"2011","unstructured":"Cand\u00e8s EJ, Li X, Ma Y, Wright J (2011) Robust principal component analysis? Journal of the ACM (JACM) 58(3):11","journal-title":"Journal of the ACM (JACM)"},{"issue":"12","key":"5475_CR9","doi-asserted-by":"crossref","first-page":"5017","DOI":"10.1109\/TIP.2015.2475625","volume":"24","author":"TH Chan","year":"2015","unstructured":"Chan TH, Jia K, Gao S, Lu J, Zeng Z, Ma Y (2015) PCANet: a simple deep learning baseline for image classification? IEEE Trans Image Process 24(12):5017\u20135032","journal-title":"IEEE Trans Image Process"},{"issue":"9","key":"5475_CR10","doi-asserted-by":"crossref","first-page":"1864","DOI":"10.1109\/TPAMI.2012.30","volume":"34","author":"W Deng","year":"2012","unstructured":"Deng W, Hu J, Guo J (2012) Extended SRC: Undersampled face recognition via intraclass variant dictionary. IEEE Trans Pattern Anal Mach Intell 34(9):1864\u20131870","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"6","key":"5475_CR11","doi-asserted-by":"crossref","first-page":"579","DOI":"10.1007\/s11633-015-0901-2","volume":"12","author":"HS Du","year":"2015","unstructured":"Du HS, Hu QP, Qiao DF, Pitas I (2015) Robust face recognition via low-rank sparse representation-based classification. Int J Autom Comput 12(6):579\u2013587","journal-title":"Int J Autom Comput"},{"issue":"10","key":"5475_CR12","doi-asserted-by":"crossref","first-page":"906","DOI":"10.1093\/bioinformatics\/16.10.906","volume":"16","author":"TS Furey","year":"2000","unstructured":"Furey TS, Cristianini N, Duffy N, Bednarski DW, Schummer M, Haussler D (2000) Support vector machine classification and validation of cancer tissue samples using microarray expression data. Bioinformatics 16(10):906\u2013914","journal-title":"Bioinformatics"},{"issue":"10","key":"5475_CR13","doi-asserted-by":"crossref","first-page":"1","DOI":"10.18637\/jss.v036.i10","volume":"36","author":"R Furrer","year":"2010","unstructured":"Furrer R, Sain SR (2010) Spam: a sparse matrix R package with emphasis on MCMC methods for Gaussian Markov random fields. J Stat Softw 36(10):1\u201325","journal-title":"J Stat Softw"},{"issue":"6","key":"5475_CR14","doi-asserted-by":"crossref","first-page":"643","DOI":"10.1109\/34.927464","volume":"23","author":"AS Georghiades","year":"2001","unstructured":"Georghiades AS, Belhumeur PN, Kriegman DJ (2001) From few to many: illumination cone models for face recognition under variable lighting and pose. IEEE Trans Pattern Anal Mach Intell 23(6):643\u2013660","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"5475_CR15","doi-asserted-by":"publisher","unstructured":"Gupta B, Agrawal DP, Yamaguchi S (2016) Handbook of research on modern cryptographic solutions for computer and cyber security. IGI Global, Hershey. \nhttps:\/\/doi.org\/10.4018\/978-1-5225-0105-3","DOI":"10.4018\/978-1-5225-0105-3"},{"key":"5475_CR16","unstructured":"He X, Niyogi P (2004) Locality preserving projections. In: Advances in Neural Information Processing Systems 16 - Proceedings of the 2003 Conference, NIPS 2003, Vancouver, BC, Canada, pp. 153\u2013160"},{"issue":"5786","key":"5475_CR17","doi-asserted-by":"crossref","first-page":"504","DOI":"10.1126\/science.1127647","volume":"313","author":"GE Hinton","year":"2006","unstructured":"Hinton GE, Salakhutdinov RR (2006) Reducing the dimensionality of data with neural networks. Science 313(5786):504\u2013507","journal-title":"Science"},{"key":"5475_CR18","doi-asserted-by":"crossref","unstructured":"Hu G, Yang Y, Yi D, Kittler J, Christmas W, Li SZ, Hospedales T (2015) When face recognition meets with deep learning: an evaluation of convolutional neural networks for face recognition. In Proceedings of the IEEE international conference on computer vision workshops, pp. 142\u2013150","DOI":"10.1109\/ICCVW.2015.58"},{"issue":"2","key":"5475_CR19","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1109\/TSMCB.2011.2168604","volume":"42","author":"GB Huang","year":"2012","unstructured":"Huang GB, Zhou H, Ding X, Zhang R (2012) Extreme learning machine for regression and multiclass classification. IEEE Trans Syst Man Cybern Part B Cybern 42(2):513\u2013529","journal-title":"IEEE Trans Syst Man Cybern Part B Cybern"},{"key":"5475_CR20","unstructured":"Jararweh Y, Al-Ayyoub M, Fakirah M, Alawneh L, Gupta BB (2017) Improving the performance of the needleman-wunsch algorithm using parallelization and vectorization techniques. Multimedia Tools and Applications. Springer New York LLC, New York, pp. 1\u201317"},{"key":"5475_CR21","doi-asserted-by":"crossref","unstructured":"Learned-Miller E, Huang GB, RoyChowdhury A, Li H, Hua G (2016) Labeled faces in the wild: a survey. In Advances in face detection and facial image analysis, pp. 189\u2013248","DOI":"10.1007\/978-3-319-25958-1_8"},{"key":"5475_CR22","unstructured":"Lin Z, Chen M, Ma Y (2010) The augmented lagrange multiplier method for exact recovery of corrupted low-rank matrices. arXiv preprint arXiv:1009.5055"},{"issue":"11","key":"5475_CR23","first-page":"393","volume":"10","author":"Z Lingling","year":"2011","unstructured":"Lingling Z, Huaxiang W, Yanbin X, Da W (2011) A fast-iterative shrinkage-thresholding algorithm for electrical resistance tomography. WSEAS Trans Circuits Syst 10(11):393\u2013402","journal-title":"WSEAS Trans Circuits Syst"},{"key":"5475_CR24","doi-asserted-by":"crossref","first-page":"13103","DOI":"10.1109\/ACCESS.2017.2717963","volume":"5","author":"T Lu","year":"2017","unstructured":"Lu T, Xiong Z, Zhang Y, Wang B, Lu T (2017) Robust face super-resolution via locality-constrained low-rank representation. IEEE Access 5:13103\u201313117","journal-title":"IEEE Access"},{"key":"5475_CR25","doi-asserted-by":"publisher","unstructured":"Martinez AM, Kak AC (2001) PCA versus LDA. IEEE Trans Pattern Anal Mach Intell 23(2):228\u2013233. \nhttps:\/\/doi.org\/10.1109\/34.908974","DOI":"10.1109\/34.908974"},{"key":"5475_CR26","doi-asserted-by":"crossref","unstructured":"Milborrow S, Nicolls F (2008) Locating facial features with an extended active shape model. In European conference on computer vision. Springer, Berlin. pp. 504\u2013513","DOI":"10.1007\/978-3-540-88693-8_37"},{"issue":"2","key":"5475_CR27","doi-asserted-by":"crossref","first-page":"166","DOI":"10.1109\/TBC.2015.2419824","volume":"61","author":"Z Pan","year":"2015","unstructured":"Pan Z, Zhang Y, Kwong S (2015) Efficient motion and disparity estimation optimization for low complexity multiview video coding. IEEE Trans Broadcast 61(2):166\u2013176","journal-title":"IEEE Trans Broadcast"},{"key":"5475_CR28","doi-asserted-by":"crossref","unstructured":"Sun Y, Wang X, Tang X (2015) Deeply learned face representations are sparse, selective, and robust. In Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 2892\u20132900","DOI":"10.1109\/CVPR.2015.7298907"},{"key":"5475_CR29","unstructured":"Sun Y, Liang D, Wang X, Tang X (2015) Deepid3: face recognition with very deep neural networks. \nhttp:\/\/arxiv.org\/abs\/1502.00873"},{"key":"5475_CR30","doi-asserted-by":"crossref","unstructured":"Taigman Y, Yang M, Ranzato MA, Wolf L (2014) Deepface: closing the gap to human-level performance in face verification. In Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 1701\u20131708","DOI":"10.1109\/CVPR.2014.220"},{"issue":"6","key":"5475_CR31","doi-asserted-by":"crossref","first-page":"1635","DOI":"10.1109\/TIP.2010.2042645","volume":"19","author":"X Tan","year":"2010","unstructured":"Tan X, Triggs B (2010) Enhanced local texture feature sets for face recognition under difficult lighting conditions. IEEE Trans Image Process 19(6):1635\u20131650","journal-title":"IEEE Trans Image Process"},{"key":"5475_CR32","doi-asserted-by":"crossref","unstructured":"Tirkaz C, Albayrak S (2009) Face recognition using active appearance model. In proceedings of the 17th signal processing and communications applications conference. IEEE pp. 940\u2013943","DOI":"10.1109\/SIU.2009.5136552"},{"key":"5475_CR33","doi-asserted-by":"crossref","unstructured":"Turk MA, Pentland AP (1991) Face recognition using eigenfaces. In proceedings of 1991 I.E. Computer Society Conference on Computer Vision and Pattern Recognition pp. 586\u2013591","DOI":"10.1109\/CVPR.1991.139758"},{"issue":"9","key":"5475_CR34","doi-asserted-by":"crossref","first-page":"1417","DOI":"10.1109\/TPAMI.2005.187","volume":"27","author":"CJ Veenman","year":"2005","unstructured":"Veenman CJ, Reinders MJ (2005) The nearest subclass classifier: a compromise between the nearest mean and nearest neighbor classifier. IEEE Trans Pattern Anal Mach Intell 27(9):1417\u20131429","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"5475_CR35","doi-asserted-by":"crossref","unstructured":"Wang X, Han TX, Yan S (2009) An HOG-LBP human detector with partial occlusion handling. In Proceeding of 2009 the12th international conference on computer vision, IEEE. pp. 32\u201339","DOI":"10.1109\/ICCV.2009.5459207"},{"key":"5475_CR36","doi-asserted-by":"crossref","unstructured":"Wang J, Li T, Shi YQ, Lian S, Ye J (2017) Forensics feature analysis in quaternion wavelet domain for distinguishing photographic images and computer graphics. Multimed Tools and Appl 76(22):23721\u201323737","DOI":"10.1007\/s11042-016-4153-0"},{"issue":"2","key":"5475_CR37","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1109\/TPAMI.2008.79","volume":"31","author":"J Wright","year":"2009","unstructured":"Wright J, Yang AY, Ganesh A, Sastry SS, Ma Y (2009) Robust face recognition via sparse representation. IEEE Trans Pattern Anal Mach Intell 31(2):210\u2013227","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"5475_CR38","unstructured":"Yu C, Li J, Li X, Ren X, Gupta BB (2017) Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram. Multimedia Tools and Applications. Springer New York LLC, New York, pp. 1\u201324"},{"key":"5475_CR39","unstructured":"Yuan C, Xia Z, Sun X (2017) Coverless image steganography based on SIFT and BOF. J Int Technol 18(2):435\u2013442"},{"key":"5475_CR40","doi-asserted-by":"crossref","unstructured":"Zhang L, Yang M, Feng X (2011) Sparse representation or collaborative representation: which helps face recognition? In Computer vision (ICCV), 2011 I.E. international conference, pp.471\u2013478","DOI":"10.1109\/ICCV.2011.6126277"},{"issue":"7","key":"5475_CR41","doi-asserted-by":"crossref","first-page":"3973","DOI":"10.1007\/s11042-015-3136-x","volume":"75","author":"Z Zhang","year":"2016","unstructured":"Zhang Z, Liang Y, Bai L, Hancock ER (2016) Discriminative sparse representation for face recognition. Multimedia Tools and Applications 75(7):3973\u20133992","journal-title":"Multimedia Tools and Applications"},{"issue":"7","key":"5475_CR42","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/CC.2016.7559071","volume":"13","author":"Y Zhang","year":"2016","unstructured":"Zhang Y, Sun X, Wang B (2016) Efficient algorithm for k-barrier coverage based on integer linear programming. China Communications 13(7):16\u201323","journal-title":"China Communications"},{"issue":"5","key":"5475_CR43","doi-asserted-by":"crossref","first-page":"1327","DOI":"10.1109\/TIP.2010.2090535","volume":"20","author":"M Zheng","year":"2011","unstructured":"Zheng M, Bu J, Chen C, Wang C, Zhang L, Qiu G, Cai D (2011) Graph regularized sparse coding for image representation. IEEE Trans Image Process 20(5):1327\u20131336","journal-title":"IEEE Trans Image Process"},{"issue":"6","key":"5475_CR44","doi-asserted-by":"crossref","first-page":"1531","DOI":"10.1587\/transinf.2015EDP7341","volume":"99","author":"Z Zhou","year":"2016","unstructured":"Zhou Z, Yang CN, Chen B, Sun X, Liu Q, QM J (2016) Effective and efficient image copy detection with resistance to arbitrary rotation. IEICE Trans Inf Syst 99(6):1531\u20131540","journal-title":"IEICE Trans Inf Syst"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-017-5475-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-5475-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-5475-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,5,10]],"date-time":"2018-05-10T10:14:21Z","timestamp":1525947261000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-017-5475-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,23]]},"references-count":44,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2018,5]]}},"alternative-id":["5475"],"URL":"https:\/\/doi.org\/10.1007\/s11042-017-5475-2","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2017,12,23]]}}}