{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,6]],"date-time":"2026-05-06T16:34:46Z","timestamp":1778085286813,"version":"3.51.4"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100005605","name":"Universiti Malaysia Pahang","doi-asserted-by":"publisher","award":["RDU 1703256"],"award-info":[{"award-number":["RDU 1703256"]}],"id":[{"id":"10.13039\/501100005605","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"published-print":{"date-parts":[[2020,5]]},"DOI":"10.1007\/s42979-020-00163-6","type":"journal-article","created":{"date-parts":[[2020,5,6]],"date-time":"2020-05-06T13:03:56Z","timestamp":1588770236000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["An Efficient Method for Detecting Covered Face Scenarios in ATM Surveillance Camera"],"prefix":"10.1007","volume":"1","author":[{"given":"Tasriva","family":"Sikandar","sequence":"first","affiliation":[]},{"given":"W. Nur Azhani W.","family":"Samsudin","sequence":"additional","affiliation":[]},{"given":"Mohammad Fazle","family":"Rabbi","sequence":"additional","affiliation":[]},{"given":"Kamarul Hawari","family":"Ghazali","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,5,6]]},"reference":[{"key":"163_CR1","unstructured":"Graczyk M. Masked men steal lobby ATMs from 5 Houston Marriott hotels. Daily Herald, Houston. 2017. http:\/\/www.dailyherald.com\/article\/20171214\/news\/312149823. Accessed 17 Dec 2017."},{"key":"163_CR2","unstructured":"Bromwich JE. A smash-and-grab heist in Pennsylvania: masked men steal an A.T.M.. The New York Times, Pennsylvania. 2016. https:\/\/www.nytimes.com\/2016\/12\/01\/us\/a-smash-and-grab-heist-in-pennsylvania-masked-men-steal-an-atm.html. Accessed 20 Dec 2016."},{"key":"163_CR3","doi-asserted-by":"crossref","unstructured":"Choi I, Kim D. Facial fraud discrimination using detection and classification. In: International symposium on visual computing. 2010. p. 199\u2013208.","DOI":"10.1007\/978-3-642-17277-9_21"},{"key":"163_CR4","first-page":"186","volume-title":"International conference on computer education, simulation and modeling","author":"M Yi","year":"2011","unstructured":"Yi M. Abnormal event detection method for ATM video and its application. In: Lin S, Huang X, editors. International conference on computer education, simulation and modeling. Berlin: Springer; 2011. p. 186\u201392."},{"issue":"5","key":"163_CR5","doi-asserted-by":"publisher","first-page":"1899","DOI":"10.1016\/j.patcog.2011.11.014","volume":"45","author":"S Jae Kyu","year":"2012","unstructured":"Jae Kyu S, Eum S, Gi H, Li G, Kim G, Kim J. Recognizability assessment of facial images for automated teller machine applications. Pattern Recognit. 2012;45(5):1899\u2013914.","journal-title":"Pattern Recognit"},{"key":"163_CR6","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/519158","author":"R Min","year":"2014","unstructured":"Min R, Hadid A, Jean-Luc D. Efficient detection of occlusion prior to robust face recognition. Sci World J. 2014. https:\/\/doi.org\/10.1155\/2014\/519158.","journal-title":"Sci World J"},{"key":"163_CR7","doi-asserted-by":"crossref","unstructured":"Ray S, Das S, Anindya S. An intelligent vision system for monitoring security and surveillance of ATM. In: 2015 Annual IEEE India conference (INDICON). IEEE; 2015. p. 1\u20135.","DOI":"10.1109\/INDICON.2015.7443827"},{"key":"163_CR8","doi-asserted-by":"crossref","unstructured":"Kim G, Suhr JK, Jung HG, Jaihie K. Face occlusion detection by using B-spline active contour and skin color information. In: Control automation robotics and vision (ICARCV), 2010 11th international conference on IEEE. 2010. p. 627\u2013632.","DOI":"10.1109\/ICARCV.2010.5707762"},{"key":"163_CR9","unstructured":"Hongxing S, Jiayi W, Peng S, Zou X. Facial area forecast and occluded face detection based on the YCbCr elliptical model. In: Mechatronic sciences, electric engineering and computer (MEC), proceedings 2013 international conference on IEEE. 2013. p. 1199\u20131202."},{"key":"163_CR10","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.patrec.2017.09.011","volume":"107","author":"T Zhang","year":"2018","unstructured":"Zhang T, Li J, Jia W, Sun J, Yang H. Fast and robust occluded face detection in ATM surveillance. Pattern Recognit Lett. 2018;107:33\u201340.","journal-title":"Pattern Recognit Lett"},{"issue":"3","key":"163_CR11","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/s00530-018-0599-4","volume":"25","author":"T Sikandar","year":"2019","unstructured":"Sikandar T, Ghazali KH, Rabbi MF. ATM crime detection using image processing integrated video surveillance: a systematic review. Multimedia Syst. 2019;25(3):229\u201351.","journal-title":"Multimedia Syst"},{"key":"163_CR12","volume-title":"CCTV Surveillance: video practices and technology","author":"H Kruegle","year":"2011","unstructured":"Kruegle H. CCTV Surveillance: video practices and technology. Amsterdam: Elsevier; 2011."},{"key":"163_CR13","unstructured":"Centrix: Banking\/Financial Institution. Centrixsecurity.com. http:\/\/www.centrixsecurity.com\/markets\/bankingfinancial-institution\/. Accessed 4 Jan 2017."},{"key":"163_CR14","unstructured":"MegaPX ATM camera. 2016. https:\/\/www.anixter.com\/content\/dam\/Suppliers\/March%20Networks\/Literature\/MN_ATM-Camera_DS_EN_3-2016_LR.pdf. Accessed 10 Sept 2016."},{"key":"163_CR15","volume-title":"Contemporary quilts: design, surface and stitch","author":"S Meech","year":"2003","unstructured":"Meech S. Contemporary quilts: design, surface and stitch. London: Batsford; 2003."},{"key":"163_CR16","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/978-3-642-17838-2_27","volume-title":"Advanced surgical facial rejuvenation","author":"PM Prendergast","year":"2012","unstructured":"Prendergast PM. Suture facelift techniques. In: Erian A, Shiffman M, editors. Advanced surgical facial rejuvenation. Berlin: Springer; 2012. p. 279\u2013313."},{"issue":"5","key":"163_CR17","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1016\/j.evolhumbehav.2016.03.004","volume":"37","author":"BM Bird","year":"2016","unstructured":"Bird BM, Jofr\u00e9 VSC, Geniole SN, Welker KM, Zilioli S, Maestripieri D, Arnocky S, Carre JM. Does the facial width-to-height ratio map onto variability in men\u2019s testosterone concentrations? Evol Hum Behav. 2016;37(5):392\u20138.","journal-title":"Evol Hum Behav"},{"issue":"1651","key":"163_CR18","doi-asserted-by":"publisher","first-page":"2651","DOI":"10.1098\/rspb.2008.0873","volume":"275","author":"CM Mccormick","year":"2008","unstructured":"Mccormick CM, Carre JM. In your face: facial metrics predict aggressive behaviour in the laboratory and in varsity and professional hockey players. Proc R Soc Lond B Biol Sci. 2008;275(1651):2651\u20136.","journal-title":"Proc R Soc Lond B Biol Sci"},{"key":"163_CR19","unstructured":"Kovac J, Peter P, Franc S. Human skin color clustering for face detection. In: EUROCON 2003. Computer as a Tool. The IEEE Region 8, vol 2. 2003. p. 144\u2013148."},{"issue":"3","key":"163_CR20","doi-asserted-by":"publisher","first-page":"1106","DOI":"10.1016\/j.patcog.2006.06.010","volume":"40","author":"P Kakumanu","year":"2007","unstructured":"Kakumanu P, Makrogiannis S, Bourbakis N. A survey of skin-color modeling and detection methods. Pattern Recogit. 2007;40(3):1106\u201322.","journal-title":"Pattern Recogit"},{"issue":"4","key":"163_CR21","doi-asserted-by":"publisher","first-page":"5817","DOI":"10.1007\/s11042-015-2520-x","volume":"76","author":"Y Tang","year":"2017","unstructured":"Tang Y, Zhang C, Gu R, Li P, Yang B. Vehicle detection and recognition for intelligent traffic surveillance system. Multimedia Tools Appl. 2017;76(4):5817\u201332.","journal-title":"Multimedia Tools Appl"},{"key":"163_CR22","unstructured":"Black D, Wilson JC. Internet video surveillance camera system and method. U.S.Patent No 7,659,922. 2010."},{"key":"163_CR23","unstructured":"Honovich J. Security manager\u2019s guide to video surveillance. 3. IPVideoMarket. info.[online, ebook]. 2009."},{"key":"163_CR24","unstructured":"Velarde RM, Hung SR. Auto-triggered fast frame rate digital video recording. U.S. Patent No 8,830,339. 2014."},{"key":"163_CR25","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1016\/j.infrared.2019.01.021","volume":"97","author":"J Chen","year":"2019","unstructured":"Chen J, Bai X. Thermal face segmentation based on circular shortest path. Infrared Phys Technol. 2019;97:391\u2013400.","journal-title":"Infrared Phys Technol"},{"key":"163_CR26","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1016\/j.neucom.2019.02.014","volume":"338","author":"M Knapik","year":"2019","unstructured":"Knapik M, Cyganek B. Driver\u2019s fatigue recognition based on yawn detection in thermal images. Neurocomputing. 2019;338:274\u201392.","journal-title":"Neurocomputing"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-020-00163-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-020-00163-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-020-00163-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,6]],"date-time":"2021-05-06T01:03:56Z","timestamp":1620263036000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-020-00163-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5]]},"references-count":26,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,5]]}},"alternative-id":["163"],"URL":"https:\/\/doi.org\/10.1007\/s42979-020-00163-6","relation":{},"ISSN":["2662-995X","2661-8907"],"issn-type":[{"value":"2662-995X","type":"print"},{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,5]]},"assertion":[{"value":"9 February 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 April 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 May 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with Ethical Standards"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"151"}}