{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,31]],"date-time":"2025-07-31T00:45:51Z","timestamp":1753922751622},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2022,10,30]],"date-time":"2022-10-30T00:00:00Z","timestamp":1667088000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,10,30]],"date-time":"2022-10-30T00:00:00Z","timestamp":1667088000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SIViP"],"published-print":{"date-parts":[[2023,6]]},"DOI":"10.1007\/s11760-022-02366-1","type":"journal-article","created":{"date-parts":[[2022,10,30]],"date-time":"2022-10-30T07:03:06Z","timestamp":1667113386000},"page":"1571-1579","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A one-shot face detection and recognition using deep learning method for access control system"],"prefix":"10.1007","volume":"17","author":[{"given":"Tsung-Han","family":"Tsai","sequence":"first","affiliation":[]},{"given":"Chi-En","family":"Tsai","sequence":"additional","affiliation":[]},{"given":"Po-Ting","family":"Chi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,30]]},"reference":[{"key":"2366_CR1","doi-asserted-by":"crossref","unstructured":"Qu, X., Wei, T., Peng C., Du, P.: \u201cA fast face recognition system based on deep learning,\u201d IEEE Conf. in proceedings of the 2018 11th international symposium on computational intelligence and design (ISCID), Hangzhou, China, 8\u20139 December 2018; pp. 289\u2013292","DOI":"10.1109\/ISCID.2018.00072"},{"issue":"2","key":"2366_CR2","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/TBIOM.2019.2908436","volume":"1","author":"R Ranjan","year":"2019","unstructured":"Ranjan, R., et al.: A fast and accurate system for face detection, identification, and verification. IEEE Trans. Biometr. Behav. Ident. Sci. 1(2), 82\u201396 (2019)","journal-title":"IEEE Trans. Biometr. Behav. Ident. Sci."},{"key":"2366_CR3","doi-asserted-by":"crossref","unstructured":"Rai, A., Karnani R., et al.: \u201cAn end-to-end real-time face identification and attendance system using convolutional neural networks,\u201d 2019 IEEE 16th India Council International Conference (INDICON), 2019","DOI":"10.1109\/INDICON47234.2019.9029001"},{"key":"2366_CR4","doi-asserted-by":"crossref","unstructured":"Liu, W., Anguelov, D., Erhan D., et al.: SSD: Single shot multibox detector. European conference on computer vision. Springer, Amsterdam, The Netherlands, October, (2016) pp. 21\u201337","DOI":"10.1007\/978-3-319-46448-0_2"},{"key":"2366_CR5","doi-asserted-by":"crossref","unstructured":"Parkhi, O.M., Vedaldi A., Zisserman, A.: Deep face recognition. proceedings of the british machine vision conference, Swansea, UK, September, pp. 41.1\u201341.12 (2015)","DOI":"10.5244\/C.29.41"},{"key":"2366_CR6","unstructured":"Dalal, N., Triggs, B.: Histograms of oriented gradients for human detection. IEEE Conf. Computer Vision and Pattern Recognition, San Diego, CA, USA, June (2005)"},{"key":"2366_CR7","doi-asserted-by":"crossref","unstructured":"Lowe, D.G., Object recognition from local scale-invariant features. Proceedings of the international conference on computer vision, Kerkyra, Corfu, Greece, September 20\u201325, pp.1150\u20131157 (1999)","DOI":"10.1109\/ICCV.1999.790410"},{"key":"2366_CR8","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/34.982883","volume":"24","author":"M Yang","year":"2002","unstructured":"Yang, M., Kriegman, D., Ahuja, N.: Detecting faces in images: a survey. IEEE Trans. Pattern Anal. Mach. Intell. 24, 34\u201358 (2002)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"2366_CR9","unstructured":"Zhang, Z., Zhang, C.: A survey of recent advances in face detection. Microsoft research technical report (2010)"},{"key":"2366_CR10","doi-asserted-by":"crossref","unstructured":"Girshick, R., Donahue, J., Darrell, T., Malik, J., Rich feature hierarchies for accurate object detection and semantic segmentation. IEEE Conference on Computer Vision and Pattern Recognition, Columbus, OH, USA, Nov (2013)","DOI":"10.1109\/CVPR.2014.81"},{"key":"2366_CR11","doi-asserted-by":"crossref","unstructured":"Girshick, R.: Fast R-CNN. International conference on computer vision, Santiago, Chile, Apr (2015)","DOI":"10.1109\/ICCV.2015.169"},{"issue":"9","key":"2366_CR12","doi-asserted-by":"publisher","first-page":"1904","DOI":"10.1109\/TPAMI.2015.2389824","volume":"37","author":"K He","year":"2015","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Spatial pyramid pooling in deep convolutional networks for visual recognition. IEEE Trans. Pattern Anal. Mach. Intell. 37(9), 1904\u20131916 (2015)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"2366_CR13","doi-asserted-by":"publisher","first-page":"1137","DOI":"10.1109\/TPAMI.2016.2577031","volume":"39","author":"S Ren","year":"2017","unstructured":"Ren, S., He, K., Girshick, R., Sun, J.: Faster R-CNN: towards real-time object detection with region proposal networks. IEEE Trans. Pattern Anal. Mach. Intell. 39, 1137\u20131149 (2017)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"2366_CR14","doi-asserted-by":"crossref","unstructured":"Shrivastava, A., Gupta, A., Girshick, R.: Training region based object detectors with online hard example mining. In Proc. IEEE Conf. Comput. Vis. Pattern Recognit., pages 761\u2013769 (2016)","DOI":"10.1109\/CVPR.2016.89"},{"key":"2366_CR15","doi-asserted-by":"crossref","unstructured":"Zhu, Y., Zhao, C., Wang, J., Zhao, X., Wu, Y., Lu, H.: Couplenet: Coupling global structure with local parts for object detection. In Proc. IEEE Int. Conf. Comput. Vis., pages 4126\u20134134 (2017)","DOI":"10.1109\/ICCV.2017.444"},{"key":"2366_CR16","doi-asserted-by":"crossref","unstructured":"Dai, J., Qi, H., Xiong, Y., Li, Y., Zhang, G., Hu, H., Wei, Y.: Deformable convolutional networks. In Proc. IEEE Int. Conf. Comput. Vis., pages 764\u2013773 (2017)","DOI":"10.1109\/ICCV.2017.89"},{"key":"2366_CR17","doi-asserted-by":"crossref","unstructured":"Singh, B., Davis, L.S.: An analysis of scale invariance in object detection\u2013snip. In: Proc. IEEE Conf. Comput. Vis. Pattern Recognit., pages 3578\u20133587 (2018)","DOI":"10.1109\/CVPR.2018.00377"},{"key":"2366_CR18","unstructured":"Shrivastava, A., Sukthankar, R., Malik, J., Gupta, A.: Beyond skip connections: top-down modulation for object detection. arXiv:1612.06851 (2016)"},{"key":"2366_CR19","doi-asserted-by":"crossref","unstructured":"Tychsen-Smith, L., Petersson, L.: Improving object localization with fitness NMS and bounded iou loss. In Proc. IEEE Conf. Comput. Vis. Pattern Recognit., pages 6877\u20136885 (2018)","DOI":"10.1109\/CVPR.2018.00719"},{"key":"2366_CR20","doi-asserted-by":"crossref","unstructured":"Lin, T.-Y., Dollar, P., Girshick, R., He, K., Hariharan, B., Belongie, S.:, Feature pyramid networks for object detection. In: Proc. IEEE Conf. Comput. Vis. Pattern Recognit., pp 2117\u20132125 (2017)","DOI":"10.1109\/CVPR.2017.106"},{"key":"2366_CR21","doi-asserted-by":"crossref","unstructured":"Cai, Z., Vasconcelos, N.: Cascade r-cnn: delving into high quality object detection. In Proc. IEEE Conf. Comput. Vis. Pattern Recognit., pp 6154\u20136162 (2018)","DOI":"10.1109\/CVPR.2018.00644"},{"key":"2366_CR22","doi-asserted-by":"crossref","unstructured":"He, K., Gkioxari, G., Doll\u00e1r, P., Girshick, R.: Mask r-cnn. In Proc. IEEE Int. Conf. Comput. Vis., pp 2961\u20132969 (2017)","DOI":"10.1109\/ICCV.2017.322"},{"key":"2366_CR23","doi-asserted-by":"crossref","unstructured":"Redmon, J., Divvala, S., Girshick, R., Farhadi, A.: You only look once: unified, real-time object detection. IEEE Conf. Computer Vision and Pattern Recognition, Las Vegas, NV, USA, Jun (2016)","DOI":"10.1109\/CVPR.2016.91"},{"key":"2366_CR24","unstructured":"Redmon, J., Farhadi, A.: Yolov3: an incremental improvement. arXiv:1804.02767 (2018)"},{"key":"2366_CR25","unstructured":"Bochkovskiy, A., Wang, C.-Y., Mark Liao, H.-Y.: YOLOv4: optimal speed and accuracy of object detection. arXiv.2004.10934 (2020)"},{"key":"2366_CR26","unstructured":"Qi, D., Tan, W., Yao Q., Liu, J.: YOLO5Face: why reinventing a face detector. arXiv:2105.12931v1 (2021)"},{"key":"2366_CR27","doi-asserted-by":"crossref","unstructured":"Zhang, S., Zhu, X., Lei, Z., Shi, H., Wang, X., Li, S.Z., (2017) FD: single shot scale-invariant face detector. ICCV","DOI":"10.1109\/ICCV.2017.30"},{"key":"2366_CR28","doi-asserted-by":"crossref","unstructured":"Najibi, M., Samangouei, P., Chellappa R., Davis, L.S.: SSH: single stage headless face detector. ICCV (2017)","DOI":"10.1109\/ICCV.2017.522"},{"key":"2366_CR29","doi-asserted-by":"crossref","unstructured":"Li, J., Wang, Y., Wang, C., Tai, Y., Qian, J., Yang, J., Wang, C., Li J., Huang, F.: DSFD: Dual Shot Face Detector. CVPR (2019)","DOI":"10.1109\/CVPR.2019.00520"},{"issue":"1","key":"2366_CR30","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1162\/jocn.1991.3.1.71","volume":"3","author":"M Turk","year":"1991","unstructured":"Turk, M., Pentland, A.: Eigenfaces for recognition. J. Cogn. Neurosci. 3(1), 71\u201386 (1991)","journal-title":"J. Cogn. Neurosci."},{"key":"2366_CR31","unstructured":"Turk, M., Pentland, A.: Face recognition using eigen faces. Proceeding of IEEE conference on computer vision and pattern recognition, Maui, HI, USA, June, pp. 586\u2013591 (1991)"},{"key":"2366_CR32","doi-asserted-by":"crossref","unstructured":"Belhumeur, P.N., Hespanha, J.P., Kriegman, D.J., Eigenfaces vs. fisherfaces: recognition using class specific linear projection. IEEE transaction pattern analysis and machine intelligence, 19, 7, pp 711\u2013720 (1997)","DOI":"10.1109\/34.598228"},{"issue":"2","key":"2366_CR33","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1023\/B:VISI.0000013087.49260.fb","volume":"57","author":"P Viola","year":"2004","unstructured":"Viola, P., Jones, M.: Robust real-time face detection\u201d. Int. J. Comput. Vis. 57(2), 137\u2013154 (2004)","journal-title":"Int. J. Comput. Vis."},{"key":"2366_CR34","first-page":"193","volume":"3","author":"Z Zhuang","year":"2000","unstructured":"Zhuang, Z., Cheng, Y., Sun, Q., Wang, Y.: Robust face detection and analysis\u201d. J. Electron. 3, 193\u2013201 (2000)","journal-title":"J. Electron."},{"key":"2366_CR35","doi-asserted-by":"crossref","unstructured":"Taigman, Y., Yang, M., Ranzato, M., Wolf, L.: Deepface: closing the gap to human-level performance in face verification. IEEE conference on computer vision and pattern recognition, pp. 1701\u20131708 (2014)","DOI":"10.1109\/CVPR.2014.220"},{"key":"2366_CR36","unstructured":"Huang, G.B., Mattar, M., Berg, T., Learned-Miller, E.: Labeled faces in the wild: a database for studying face recognition in unconstrained environments (2008)"},{"key":"2366_CR37","unstructured":"Sun, Y., Liang, D., Wang, X., Tang, X.: Deepid3: face recognition with very deep neural networks. arXiv:1502.00873 (2015)"},{"key":"2366_CR38","doi-asserted-by":"crossref","unstructured":"Schroff, F., Kalenichenko, D., Philbin, J.: Facenet: a unified embedding for face recognition and clustering. IEEE conference on computer vision and pattern recognition, pp. 815\u2013823 (2015)","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"2366_CR39","doi-asserted-by":"crossref","first-page":"7","DOI":"10.36583\/kohl\/2-1-3","volume":"2","author":"W Liu","year":"2016","unstructured":"Liu, W., Wen, Y., Yu, Z., Yang, M.: Large-margin softmax loss for convolutional neural networks. ICML 2, 7 (2016)","journal-title":"ICML"},{"key":"2366_CR40","doi-asserted-by":"crossref","unstructured":"Liu, W., Wen, Y., Yu, Z., Li, M., Raj, B., Song, L.: Sphereface: deep hypersphere embedding for face recognition, IEEE conference on computer vision and pattern recognition, pp. 212\u2013220 (2017)","DOI":"10.1109\/CVPR.2017.713"},{"issue":"7","key":"2366_CR41","doi-asserted-by":"publisher","first-page":"926","DOI":"10.1109\/LSP.2018.2822810","volume":"25","author":"F Wang","year":"2018","unstructured":"Wang, F., Cheng, J., Liu, W., Liu, H.: Additive margin softmax for face verification. IEEE Signal Process. Lett. 25(7), 926\u2013930 (2018)","journal-title":"IEEE Signal Process. Lett."},{"key":"2366_CR42","doi-asserted-by":"crossref","unstructured":"Deng, J., Guo, J., Xue, N., Zafeiriou, S.: Arcface: Additive angular margin loss for deep face recognition. IEEE Conference on computer vision and pattern recognition, pp. 4690\u20134699 (2019)","DOI":"10.1109\/CVPR.2019.00482"},{"key":"2366_CR43","doi-asserted-by":"crossref","unstructured":"Masi, I., Wu, Y., Hassner, T., Natarajan, P.: Deep face recognition: a survey. 31st SIBGRAPI conference on graphics, patterns and images (SIBGRAPI), IEEE, pp. 471\u2013478 (2018)","DOI":"10.1109\/SIBGRAPI.2018.00067"},{"key":"2366_CR44","unstructured":"Wang, Z., Wang, G., Huang, B., Xiong, Z., Hong, Q., Wu, H., Yi, P., Jiang, K., Wang, N., Pei, Y.: Masked face recognition dataset and application. arXiv:2003.09093v2 (2020)"},{"key":"2366_CR45","doi-asserted-by":"crossref","unstructured":"Huang, B., Wang, Z., Wang, G., Jiang, K., Zeng, K., Han, Z., Tian, X., Yang, Y.: When face recognition meets occlusion: a new benchmark.\u201d ICASSP (2021)","DOI":"10.1109\/ICASSP39728.2021.9413893"},{"key":"2366_CR46","doi-asserted-by":"crossref","unstructured":"Yang, S., Luo, P., Loy, CC., Tang, X.: WIDER FACE: a face detection benchmark. CVPR (2016)","DOI":"10.1109\/CVPR.2016.596"},{"key":"2366_CR47","first-page":"07","volume":"1","author":"GB Huang","year":"2007","unstructured":"Huang, G.B., Ramesh, M., Berg, T., Learned-Miller, E.: Labeled faces in the wild: a database for studying face recognition in unconstrained environments. Univ. Massachusetts Amherst Tech. Rep. 1, 07\u201349 (2007)","journal-title":"Univ. Massachusetts Amherst Tech. Rep."},{"key":"2366_CR48","doi-asserted-by":"crossref","unstructured":"Bodla, N., Singh, B., Chellappa, R., Davis, L.S.: Soft-nms - improving object detection with one line of code. Proceedings of the IEEE international conference on computer vision, Venice, Italy, October, pp 5562\u20135570 (2017)","DOI":"10.1109\/ICCV.2017.593"},{"key":"2366_CR49","unstructured":"Zhong, Z., Zheng, L., Kang, G., Li, S., Yang, Y.: Random erasing data augmentation. arXiv:1708.04896 (2017)"},{"key":"2366_CR50","unstructured":"DeVries T., Taylor, G.W.: Improved regularization of convolutional neural networks with cutout. arXiv:1708.04552. (2017)"},{"key":"2366_CR51","unstructured":"Tamara, L., Berg, Alexander C. Berg, Edwards, J., Forsyth, D.A.: Who\u2019s in the Picture? IEEE international conference on multimedia & expo workshops (ICMEW) (2016)"}],"container-title":["Signal, Image and Video Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-022-02366-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11760-022-02366-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-022-02366-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,24]],"date-time":"2023-04-24T05:27:04Z","timestamp":1682314024000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11760-022-02366-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,30]]},"references-count":51,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,6]]}},"alternative-id":["2366"],"URL":"https:\/\/doi.org\/10.1007\/s11760-022-02366-1","relation":{},"ISSN":["1863-1703","1863-1711"],"issn-type":[{"value":"1863-1703","type":"print"},{"value":"1863-1711","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,10,30]]},"assertion":[{"value":"14 July 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 July 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 September 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 October 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}