{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T08:53:57Z","timestamp":1761814437899,"version":"build-2065373602"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"16","license":[{"start":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T00:00:00Z","timestamp":1761782400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T00:00:00Z","timestamp":1761782400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"DOI":"10.1007\/s11227-025-07990-5","type":"journal-article","created":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T08:50:04Z","timestamp":1761814204000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A novel methodology for makeup invariant face recognition based on directional gradient and local derivative descriptors (DGLDD-FR)"],"prefix":"10.1007","volume":"81","author":[{"given":"Rajesh Kumar","family":"Tripathi","sequence":"first","affiliation":[]},{"given":"Subhash Chand","family":"Agrawal","sequence":"additional","affiliation":[]},{"given":"Kanhaiya","family":"Sharma","sequence":"additional","affiliation":[]},{"given":"Anand","family":"Nayyar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,30]]},"reference":[{"key":"7990_CR1","first-page":"1","volume-title":"Biometrics: personal identification in networked society","author":"A Jain","year":"2011","unstructured":"Jain A, Bolle R, Pankanti S (2011) Introduction to biometrics. Biometrics: personal identification in networked society. Springer, US, Boston, pp 1\u201341"},{"key":"7990_CR2","doi-asserted-by":"crossref","unstructured":"Dantcheva A, Chen C, Ross A (2012) Can facial cosmetics affect the matching accuracy of face recognition systems? In: 2012 IEEE Fifth International Conference on Biometrics: Theory, Applications and Systems (BTAS). IEEE. pp. 391\u2013398","DOI":"10.1109\/BTAS.2012.6374605"},{"issue":"5","key":"7990_CR3","first-page":"814","volume":"24","author":"G Guo","year":"2013","unstructured":"Guo G, Wen L, Yan S (2013) Face authentication with makeup changes. IEEE Trans Circuits Syst Video Technol 24(5):814\u2013825","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"7990_CR4","doi-asserted-by":"crossref","unstructured":"Eckert ML, Kose N, Dugelay JL (2013) Facial cosmetics database and impact analysis on automatic face recognition. In: 2013 IEEE 15th International Workshop on Multimedia Signal Processing (MMSP). IEEE. pp. 434\u2013439","DOI":"10.1109\/MMSP.2013.6659328"},{"key":"7990_CR5","unstructured":"Hu X, Huang S, Zhao Q (2022) Makeup-invariant face recognition: a review. IEEE Access. 2022"},{"key":"7990_CR6","unstructured":"Chen D et al. (2021) Benchmark and analysis of makeup-invariant face recognition. IEEE Trans Image Process. 2021."},{"key":"7990_CR7","unstructured":"Guo Y, Sim T (2018) Digital makeup. IEEE Trans Multimed, 2018"},{"key":"7990_CR8","doi-asserted-by":"crossref","unstructured":"Ahonen T, Hadid A, Pietik\u00e4inen M (2006) Face description with local binary patterns: application to face recognition. IEEE TPAMI, 2006","DOI":"10.1109\/TPAMI.2006.244"},{"key":"7990_CR9","doi-asserted-by":"crossref","unstructured":"Zhao W, Chellappa R, Phillips PJ, Rosenfeld A (2003) Face recognition: a literature survey. ACM Comput Surv. 2003","DOI":"10.1145\/954339.954342"},{"key":"7990_CR10","doi-asserted-by":"crossref","unstructured":"Gecer B, Ploumpis S, Kotsia I, Zafeiriou S (2019) Ganfit: generative adversarial network fitting for high fidelity 3d face reconstruction. In Proceedings of the IEEE\/CVF Conferene on Computer Vision and Pattern Recognition. pp. 1155\u20131164","DOI":"10.1109\/CVPR.2019.00125"},{"issue":"1","key":"7990_CR11","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/s11831-024-10134-2","volume":"32","author":"M Shah","year":"2025","unstructured":"Shah M, Sureja N (2025) A comprehensive review of bias in deep learning models: methods, impacts, and future directions. Arch Comput Methods Eng 32(1):255\u2013267","journal-title":"Arch Comput Methods Eng"},{"key":"7990_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.ascom.2022.100617","volume":"40","author":"SE Lake","year":"2022","unstructured":"Lake SE, Tsai CW (2022) An exploration of how training set composition bias in machine learning affects identifying rare objects. Astron Comput 40:100617","journal-title":"Astron Comput"},{"issue":"1","key":"7990_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/digital4010001","volume":"4","author":"S Siddique","year":"2023","unstructured":"Siddique S, Haque MA, George R, Gupta KD, Gupta D, Faruk MJH (2023) Survey on machine learning biases and mitigation techniques. Digital 4(1):1\u201368","journal-title":"Digital"},{"key":"7990_CR14","doi-asserted-by":"crossref","unstructured":"Moeini A, Moeini H, Faez K (2014) Makeup-insensitive face recognition by facial depth reconstruction and gabor filter bank from women's real-world images. In: 2014 IEEE International Conference on Image Processing (ICIP). IEEE. pp. 308\u2013312","DOI":"10.1109\/ICIP.2014.7025061"},{"key":"7990_CR15","doi-asserted-by":"crossref","unstructured":"Wang X, Kambhamettu C (2015) A new approach for face recognition under makeup changes. In: 2015 IEEE Global Conference on Signal and Information Processing (GlobalSIP). IEEE. pp. 423\u2013427","DOI":"10.1109\/GlobalSIP.2015.7418230"},{"key":"7990_CR16","doi-asserted-by":"crossref","unstructured":"Yee KE, Han PY, Yin OS, Kwee WK.(2015) Can subspace based learning approach perform on makeup face recognition. In: IEEE International Conference on Control System, Computing and Engineering, pp.13\u201318","DOI":"10.1109\/ICCSCE.2015.7482150"},{"key":"7990_CR17","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.inffus.2015.09.005","volume":"32","author":"C Chen","year":"2016","unstructured":"Chen C, Dantcheva A, Ross A (2016) An ensemble of patch-based subspaces for makeup-robust face recognition. Inf Fusion 32:80\u201392","journal-title":"Inf Fusion"},{"key":"7990_CR18","unstructured":"Poon B, Amin MA, Yan H (2017) PCA based human face recognition with improved method for distorted images due to facial makeup. In: 25th International Multi Conference of Engineers and Computer Scientists (IMECS 2017). Newswood Limited. pp. 375\u2013380"},{"key":"7990_CR19","doi-asserted-by":"crossref","unstructured":"Zheng Z, Kambhamettu C (2017) Multi-level feature learning for face recognition under makeup changes. In: 2017 12th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2017). pp. 918\u2013923","DOI":"10.1109\/FG.2017.131"},{"key":"7990_CR20","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/j.patcog.2017.01.011","volume":"66","author":"Y Sun","year":"2017","unstructured":"Sun Y, Ren L, Wei Z, Liu B, Zhai Y, Liu S (2017) A weakly supervised method for makeup-invariant face verification. Pattern Recognit 66:153\u2013159","journal-title":"Pattern Recognit"},{"issue":"1","key":"7990_CR21","doi-asserted-by":"crossref","DOI":"10.1155\/2019\/8041413","volume":"2018","author":"M Sajid","year":"2018","unstructured":"Sajid M, Ali N, Dar SH, Iqbal Ratyal N, Butt AR, Zafar B, Baig S (2018) Data augmentation-assisted makeup-invariant face recognition. Math Probl Eng 2018(1):2850632","journal-title":"Math Probl Eng"},{"key":"7990_CR22","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.patcog.2019.01.013","volume":"90","author":"Y Li","year":"2019","unstructured":"Li Y, Song L, Wu X, He R, Tan T (2019) Learning a bi-level adversarial network with global and local perception for makeup-invariant face verification. Pattern Recognit 90:99\u2013108","journal-title":"Pattern Recognit"},{"key":"7990_CR23","doi-asserted-by":"crossref","unstructured":"Wang W, Fu Y, Qian X, Jiang YG, Tian Q, Xue X (2020) Fm2u-net: Face morphological multi-branch network for makeup-invariant face verification. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. pp. 5730\u20135740","DOI":"10.1109\/CVPR42600.2020.00577"},{"key":"7990_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2020.106921","volume":"89","author":"U Saeed","year":"2021","unstructured":"Saeed U, Masood K, Dawood H (2021) Illumination normalization techniques for makeup-invariant face recognition. Comput Electr Eng 89:106921","journal-title":"Comput Electr Eng"},{"key":"7990_CR25","unstructured":"Angeloni MDA, Pedrini H (2021) Improving makeup face verification by exploring part-based representations arXiv:2101.07338"},{"key":"7990_CR26","doi-asserted-by":"crossref","unstructured":"Al-Ghanim FJ, Al-Juboori AM (2021) Face recognition with disguise and makeup variations using image processing and machine learning. In: Advances in Computing and Data Sciences: 5th International Conference, ICACDS 2021, Nashik, India, April 23\u201324, 2021, Revised Selected Papers, Part I 5. Springer International Publishing. pp. 386\u2013400","DOI":"10.1007\/978-3-030-81462-5_35"},{"key":"7990_CR27","doi-asserted-by":"crossref","unstructured":"Selitskiy S, Christou N, Selitskaya N (2021) Challenges in face recognition using machine learning algorithms: case of makeup and occlusions. In: Intelligent Systems and Applications: Proceedings of the 2020 Intelligent Systems Conference (IntelliSys). Springer International Publishing. pp. 86\u2013102","DOI":"10.1007\/978-3-030-55187-2_9"},{"key":"7990_CR28","doi-asserted-by":"crossref","unstructured":"Selitskiy S, Christou N, Selitskaya N (2021) Benchmarking of fully connected and convolutional neural networks on face recognition: case of makeup and occlusions. In: Intelligent Computing: Proceedings of the 2021 Computing Conference. Springer International Publishing. pp. 270\u2013285","DOI":"10.1007\/978-3-030-80129-8_20"},{"key":"7990_CR29","doi-asserted-by":"crossref","unstructured":"Deng H, Han C, Cai H, Han G, He S (2021) Spatially-invariant style-codes controlled makeup transfer. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. pp. 6549\u20136557","DOI":"10.1109\/CVPR46437.2021.00648"},{"issue":"4","key":"7990_CR30","doi-asserted-by":"publisher","first-page":"497","DOI":"10.3390\/ai2040031","volume":"2","author":"T Alzahrani","year":"2021","unstructured":"Alzahrani T, Al-Bander B, Al-Nuaimy W (2021) Deep learning models for automatic makeup detection. AI 2(4):497\u2013511","journal-title":"AI"},{"key":"7990_CR31","doi-asserted-by":"publisher","first-page":"99112","DOI":"10.1109\/ACCESS.2021.3096136","volume":"9","author":"MTH Fuad","year":"2021","unstructured":"Fuad MTH, Fime AA, Sikder D, Iftee MAR, Rabbi J, Al-Rakhami MS, Gumaei A, Sen O, Fuad M, Islam MN (2021) Recent advances in deep learning techniques for face recognition. IEEE Access 9:99112\u201399142","journal-title":"IEEE Access"},{"issue":"21","key":"7990_CR32","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10212666","volume":"10","author":"A Alzu\u2019bi","year":"2021","unstructured":"Alzu\u2019bi A, Albalas F, Al-Hadhrami T, Younis LB, Bashayreh A (2021) Masked face recognition using deep learning: a review. Electronics 10(21):2666","journal-title":"Electronics"},{"issue":"11","key":"7990_CR33","doi-asserted-by":"publisher","first-page":"8538","DOI":"10.1109\/TPAMI.2021.3083484","volume":"44","author":"S Liu","year":"2021","unstructured":"Liu S, Jiang W, Gao C, He R, Feng J, Li B, Yan S (2021) Psgan++: robust detail-preserving makeup transfer and removal. IEEE Trans Pattern Anal Mach Intell 44(11):8538\u20138551","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"7990_CR34","unstructured":"Guetta N, Shabtai A, Singh I, Momiyama S, Elovici Y (2021) Dodging attack using carefully crafted natural makeup. arXiv preprint arXiv:2109.06467."},{"key":"7990_CR35","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1109\/TIFS.2021.3135750","volume":"17","author":"V Albiero","year":"2021","unstructured":"Albiero V, Zhang K, King MC, Bowyer KW (2021) Gendered differences in face recognition accuracy explained by hairstyles, makeup, and facial morphology. IEEE Trans Inf Forensics Secur 17:127\u2013137","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"4","key":"7990_CR36","doi-asserted-by":"publisher","first-page":"2226","DOI":"10.1109\/TCSVT.2021.3089724","volume":"32","author":"L Zhang","year":"2021","unstructured":"Zhang L, Yang H, Qiu T, Li L (2021) Ap-gan: improving attribute preservation in video face swapping. IEEE Trans Circuits Syst Video Technol 32(4):2226\u20132237","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"7990_CR37","doi-asserted-by":"crossref","unstructured":"Hu S, Liu X, Zhang Y, Li M, Zhang LY, Jin H, Wu L (2022) Protecting facial privacy: Generating adversarial identity masks via style-robust makeup transfer. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. pp. 15014\u201315023","DOI":"10.1109\/CVPR52688.2022.01459"},{"issue":"04","key":"7990_CR38","doi-asserted-by":"publisher","first-page":"2256008","DOI":"10.1142\/S0218001422560080","volume":"36","author":"M Eskandari","year":"2022","unstructured":"Eskandari M, Sharifi O (2022) Facial makeup detection using multi-scale local binary patterns and convolutional neural network fusion. Int J Pattern Recognit Artif Intell 36(04):2256008","journal-title":"Int J Pattern Recognit Artif Intell"},{"key":"7990_CR39","doi-asserted-by":"publisher","first-page":"108996","DOI":"10.1016\/j.knosys.2022.108996","volume":"249","author":"M Hao","year":"2022","unstructured":"Hao M, Gu G, Fu H, Liu C, Cui D (2022) Cumtgan: an instance-level controllable U-net GAN for facial makeup transfer. Knowl-Based Syst 249:108996","journal-title":"Knowl-Based Syst"},{"issue":"15","key":"7990_CR40","doi-asserted-by":"publisher","first-page":"44009","DOI":"10.1007\/s11042-023-17240-6","volume":"83","author":"X Zhu","year":"2024","unstructured":"Zhu X, Cao X, Wang L, Liu M, Zhao Z, Wei X, Sun Y (2024) Dccmf-gan: double cycle consistently constrained multi-feature discrimination gan for makeup transfer. Multimedia Tools Appl 83(15):44009\u201344022","journal-title":"Multimedia Tools Appl"},{"key":"7990_CR41","doi-asserted-by":"crossref","unstructured":"Shamshad F, Naseer M, Nandakumar K (2025) Makeup-guided facial privacy protection via untrained neural network priors. In: European Conference on Computer Vision. Springer, Cham. pp. 227\u2013246","DOI":"10.1007\/978-3-031-92089-9_15"},{"key":"7990_CR42","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2025.2510979","author":"E Annie","year":"2025","unstructured":"Annie E, Sule WR (2025) Comparative analysis of deep learning classifiers for face recognition, under variations in makeup and facial expressions. Inf Secur J Glob Persp. https:\/\/doi.org\/10.1080\/19393555.2025.2510979","journal-title":"Inf Secur J Glob Persp"},{"issue":"12","key":"7990_CR43","doi-asserted-by":"publisher","first-page":"6699","DOI":"10.1007\/s00371-022-02757-y","volume":"39","author":"F Ketab","year":"2023","unstructured":"Ketab F, Russel NS, Selvaraj A, Buhari SM (2023) Parallel deep learning architecture with customized and learnable filters for low-resolution face recognition. Visual Comput 39(12):6699\u20136710","journal-title":"Visual Comput"},{"key":"7990_CR44","doi-asserted-by":"crossref","unstructured":"Chen C, Dantcheva A, Ross A (2013) Automatic facial makeup detection with application in face recognition. In: 2013 International Conference on Biometrics (ICB) IEEE. pp. 1\u20138","DOI":"10.1109\/ICB.2013.6612994"},{"issue":"11","key":"7990_CR45","doi-asserted-by":"publisher","first-page":"56066","DOI":"10.1109\/ACCESS.2023.3282451","volume":"2","author":"HB Kim","year":"2023","unstructured":"Kim HB, Choi N, Kwon HJ, Kim H (2023) Surveillance system for real-time high-precision recognition of criminal faces from wild videos. IEEE Access 2(11):56066\u201356082","journal-title":"IEEE Access"},{"key":"7990_CR46","doi-asserted-by":"crossref","unstructured":"Kirsch RA (1970) Computer determination of the constituent structure of biological images. Computers & Biomedical Research, pp. 315\u2013328","DOI":"10.1016\/0010-4809(71)90034-6"},{"key":"7990_CR47","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1007\/s13735-022-00235-8","volume":"11","author":"D Varshney","year":"2022","unstructured":"Varshney D, Vishwakarma DK (2022) A unified approach of detecting misleading images via tracing its instances on web and analyzing its past context for the verification of multimedia content. Int J Multimed Inf Retr 11:445\u2013459. https:\/\/doi.org\/10.1007\/s13735-022-00235-8","journal-title":"Int J Multimed Inf Retr"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-025-07990-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-025-07990-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-025-07990-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T08:50:13Z","timestamp":1761814213000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-025-07990-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,30]]},"references-count":47,"journal-issue":{"issue":"16","published-online":{"date-parts":[[2025,11]]}},"alternative-id":["7990"],"URL":"https:\/\/doi.org\/10.1007\/s11227-025-07990-5","relation":{},"ISSN":["1573-0484"],"issn-type":[{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,30]]},"assertion":[{"value":"24 June 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 October 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 October 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not Applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"Yes.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"Not Applicable.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human and animals rights"}}],"article-number":"1510"}}