{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T04:50:24Z","timestamp":1771044624683,"version":"3.50.1"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2020,8,28]],"date-time":"2020-08-28T00:00:00Z","timestamp":1598572800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,28]],"date-time":"2020-08-28T00:00:00Z","timestamp":1598572800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"published-print":{"date-parts":[[2020,9]]},"DOI":"10.1007\/s42979-020-00280-2","type":"journal-article","created":{"date-parts":[[2020,8,28]],"date-time":"2020-08-28T17:02:46Z","timestamp":1598634166000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Association of Face and Facial Components Based on CNN and Transfer Subspace Learning for Forensics Applications"],"prefix":"10.1007","volume":"1","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7731-2561","authenticated-orcid":false,"given":"Rupali Sandip","family":"Kute","sequence":"first","affiliation":[]},{"given":"Vibha","family":"Vyas","sequence":"additional","affiliation":[]},{"given":"Alwin","family":"Anuse","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,28]]},"reference":[{"key":"280_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-77326-1","volume-title":"Introduction to biometrics: a textbook","author":"AK Jain","year":"2011","unstructured":"Jain AK, Ross A, Nandakumar K. Introduction to biometrics: a textbook. Berlin: Springer; 2011."},{"key":"280_CR2","doi-asserted-by":"crossref","unstructured":"Jain AK, Klare B, Park U. Face recognition: some challenges in forensics. In: IEEE international conference on automatic face and gesture recognition, Santa Barbara, CA; 2011. pp. 726\u2013733.","DOI":"10.1109\/FG.2011.5771338"},{"key":"280_CR3","doi-asserted-by":"publisher","first-page":"20140254","DOI":"10.1098\/rstb.2014.0254","volume":"370","author":"AK Jain","year":"2015","unstructured":"Jain AK, Ross A. Bridging the gap: from biometrics to forensics. Philos Trans R Soc B. 2015;370:20140254. https:\/\/doi.org\/10.1098\/rstb.2014.0254.","journal-title":"Philos Trans R Soc B"},{"key":"280_CR4","unstructured":"Hess E. Facial recognition: a valuable tool for Law Enforcement. Forensic Mag 2010;7(5)."},{"key":"280_CR5","doi-asserted-by":"publisher","DOI":"10.1002\/9781118705773.ch7","author":"B Arbab-Zavar","year":"2015","unstructured":"Arbab-Zavar B, et al. On the forensic use of biometrics. Handb Digit Forensics Multimed Data Devices. 2015. https:\/\/doi.org\/10.1002\/9781118705773.ch7.","journal-title":"Handb Digit Forensics Multimed Data Devices"},{"key":"280_CR6","doi-asserted-by":"publisher","unstructured":"Jain AK, Park U. Facial marks: soft biometric for face recognition. In: IEEE international conference on image process, Cairo, Egypt, pp. 37\u201340. 2009. https:\/\/doi.org\/10.1109\/ICIP.2009.5413921.","DOI":"10.1109\/ICIP.2009.5413921"},{"key":"280_CR7","unstructured":"Cadoni M et al. Exploiting 3d faces in biometric forensic recognition. In: European signal processing conference, Aalborg, Denmark; 2010. pp. 1670\u20131674."},{"issue":"3","key":"280_CR8","doi-asserted-by":"publisher","first-page":"639","DOI":"10.1109\/TPAMI.2010.180","volume":"33","author":"B Klare","year":"2011","unstructured":"Klare B, Li Z, Jain AK. Matching forensic sketches to mug shot photos. IEEE Trans Pattern Anal Mach Intell. 2011;33(3):639\u201346.","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"11","key":"280_CR9","doi-asserted-by":"publisher","first-page":"1586","DOI":"10.1109\/LSP.2017.2749266","volume":"24","author":"C Galea","year":"2017","unstructured":"Galea C, Farrugia RA. Forensic face photo-sketch recognition using a deep learning-based architecture. IEEE Signal Process Lett. 2017;24(11):1586\u201390.","journal-title":"IEEE Signal Process Lett"},{"issue":"8","key":"280_CR10","doi-asserted-by":"publisher","first-page":"1960","DOI":"10.1109\/TIFS.2018.2806939","volume":"13","author":"A Valsecchi","year":"2018","unstructured":"Valsecchi A, Damas S, Cord\u00f3n O. A robust and efficient method for skull-face overlay in computerized craniofacial superimposition. IEEE Trans Inf Forensics Secur. 2018;13(8):1960\u201374.","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"280_CR11","doi-asserted-by":"publisher","unstructured":"Gumede A, Viriri S, Gwetu M. Hybrid component-based face recognition. In: Conference on information communication technology and society, Umhlanga; 2017. pp. 1\u20136. https:\/\/doi.org\/10.1109\/ICTAS.2017.7920665","DOI":"10.1109\/ICTAS.2017.7920665"},{"key":"280_CR12","unstructured":"New identity authentication method: nose biometrics Drupal, 2020. https:\/\/www.homelandsecuritynewswire.com\/new-identity-authentication-method-nose-biometrics"},{"key":"280_CR13","doi-asserted-by":"publisher","first-page":"462","DOI":"10.1016\/j.ijleo.2017.02.017","volume":"136","author":"WY Lee","year":"2017","unstructured":"Lee WY, Ko KE, Sim KB. Robust lip detection based on histogram of oriented gradient features and convolutional neural network under effects of light and background. Optik Int J Light Electron Opt. 2017;136:462\u20139.","journal-title":"Optik Int J Light Electron Opt"},{"key":"280_CR14","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1016\/j.engappai.2017.06.003","volume":"64","author":"K Wrobel","year":"2017","unstructured":"Wrobel K, Doroz R, Porwik P, et al. Using a probabilistic neural network for lip-based biometric verification. Eng Appl Artif Intell. 2017;64:112\u201327.","journal-title":"Eng Appl Artif Intell"},{"issue":"1","key":"280_CR15","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1109\/LGRS.2015.2499239","volume":"13","author":"D Marmanis","year":"2016","unstructured":"Marmanis D, Datcu M, Esch T, et al. Deep learning earth observation classification using ImageNet pretrained networks. IEEE Geosci Remote Sens Lett. 2016;13(1):105\u20139.","journal-title":"IEEE Geosci Remote Sens Lett"},{"issue":"3","key":"280_CR16","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1049\/iet-bmt.2017.0240","volume":"7","author":"\u017d Emer\u0161i\u010d","year":"2018","unstructured":"Emer\u0161i\u010d \u017d, Gabriel LL, \u0160truc V, et al. Convolutional encoder\u2013decoder networks for pixel-wise ear detection and segmentation. IET Biometrics. 2018;7(3):175\u201384.","journal-title":"IET Biometrics"},{"issue":"3","key":"280_CR17","doi-asserted-by":"publisher","first-page":"962","DOI":"10.1109\/JSTARS.2018.2795753","volume":"11","author":"D Lunga","year":"2018","unstructured":"Lunga D, Yang HL, Reith A, et al. Domain-adapted convolutional networks for satellite image classification: a large-scale interactive learning workflow. IEEE J Sel Top Appl Earth Obs Remote Sens. 2018;11(3):962\u201377.","journal-title":"IEEE J Sel Top Appl Earth Obs Remote Sens"},{"issue":"6","key":"280_CR18","doi-asserted-by":"publisher","first-page":"1421","DOI":"10.1109\/TIFS.2017.2788002","volume":"13","author":"C Galea","year":"2018","unstructured":"Galea C, Farrugia RA. Matching software-generated sketches to face photographs with a very deep CNN, morphed faces, and transfer learning. IEEE Trans Inf Forensics Secur. 2018;13(6):1421\u201331.","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"9","key":"280_CR19","doi-asserted-by":"publisher","first-page":"2203","DOI":"10.1109\/TIFS.2018.2812196","volume":"13","author":"S Akcay","year":"2018","unstructured":"Akcay S, Kundegorski ME, Willcocks CG, et al. Using deep convolutional neural network architectures for object classification and detection within X-ray baggage security imagery. IEEE Trans Inf Forensics Secur. 2018;13(9):2203\u201315.","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"280_CR20","doi-asserted-by":"publisher","unstructured":"Walia E. Face recognition using improved fast PCA algorithm. In: Congress on image and signal processing, Sanya, Hainan; 2008. pp. 554\u2013558. https:\/\/doi.org\/10.1109\/CISP.2008.144.","DOI":"10.1109\/CISP.2008.144"},{"key":"280_CR21","unstructured":"Yu YL. Face recognition with Eigenfaces. In: Proceedings of IEEE international conference on industrial technology, Guangzhou, China; 1994. pp. 434\u2013438."},{"key":"280_CR22","doi-asserted-by":"publisher","unstructured":"Huang P, Chen C. Enhanced marginal Fisher analysis for face recognition. In: International conference on artificial intelligence and computational intelligence, Shanghai; 2009. pp. 403\u2013407. https:\/\/doi.org\/10.1109\/AICI.2009.395.","DOI":"10.1109\/AICI.2009.395"},{"key":"280_CR23","doi-asserted-by":"publisher","unstructured":"Ashalatha ME. Face recognition using local features by LPP approach. In: International conference on circuits, communication, control and computing; 2014. pp. 382\u2013386. https:\/\/doi.org\/10.1109\/CIMCA.2014.7057828.","DOI":"10.1109\/CIMCA.2014.7057828"},{"key":"280_CR24","doi-asserted-by":"publisher","unstructured":"Sharkas M, Abou Elenien M. Eigenfaces vs. Fisherfaces vs. ICA for face recognition; a comparative study. In: International conference on signal processing, Beijing; 2008. pp. 914\u2013919. https:\/\/doi.org\/10.1109\/ICOSP.2008.4697276.","DOI":"10.1109\/ICOSP.2008.4697276"},{"issue":"7","key":"280_CR25","doi-asserted-by":"publisher","first-page":"929","DOI":"10.1109\/TKDE.2009.126","volume":"22","author":"S Si","year":"2010","unstructured":"Si S, Tao D, Geng B. Bregman divergence-based regularization for transfer subspace learning. IEEE Trans Knowl Data Eng. 2010;22(7):929\u201342.","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"4","key":"280_CR26","doi-asserted-by":"publisher","first-page":"1046","DOI":"10.1109\/TMM.2012.2187436","volume":"14","author":"S Xia","year":"2012","unstructured":"Xia S, Shao M, Luo J. Understanding kin relationship in a photo. IEEE Trans Multimed. 2012;14(4):1046\u201356.","journal-title":"IEEE Trans Multimed"},{"key":"280_CR27","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/s11042-010-0567-2","volume":"56","author":"S Si","year":"2010","unstructured":"Si S, Tao D, Wang M, et al. Social image annotation via cross-domain subspace learning. Springer Publ Multimed Tools Appl. 2010;56:91\u2013108.","journal-title":"Springer Publ Multimed Tools Appl"},{"key":"280_CR28","doi-asserted-by":"crossref","unstructured":"Su Y, Fu Y, Tian Q et al. Cross-database age estimation based on transfer learning. In: IEEE international conference on acoustics, speech and signal processing; 2010. pp. 1270\u20131273","DOI":"10.1109\/ICASSP.2010.5495414"},{"issue":"12","key":"280_CR29","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/TIP.2014.2362658","volume":"23","author":"HS Bhatt","year":"2014","unstructured":"Bhatt HS, Singh R, Vatsa M, et al. Improving cross resolution Face matching using ensemble-based co-transfer learning. IEEE Trans Image Process. 2014;23(12):56\u201369.","journal-title":"IEEE Trans Image Process"},{"key":"280_CR30","doi-asserted-by":"publisher","unstructured":"Kute RS, Vyas V. Biometric association using transfer subspace learning. In: IEEE region 10 conference (TENCON), Singapore; 2016. pp. 1384\u20131387. https:\/\/doi.org\/10.1109\/TENCON.2016.7848241.","DOI":"10.1109\/TENCON.2016.7848241"},{"issue":"3","key":"280_CR31","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/s40747-016-0024-6","volume":"2","author":"A Anuse","year":"2016","unstructured":"Anuse A, Vyas V. A novel training algorithm for convolutional neural network. Complex Intell Syst. 2016;2(3):21\u2013234.","journal-title":"Complex Intell Syst"},{"key":"280_CR32","doi-asserted-by":"publisher","unstructured":"Velioglu B, Vural FTY. Transfer learning for brain decoding using deep architectures. In: IEEE 16th international conference on cognitive informatics & cognitive computing, Oxford; 2017. pp. 65\u201370. https:\/\/doi.org\/10.1109\/ICCI-CC.2017.8109731.","DOI":"10.1109\/ICCI-CC.2017.8109731"},{"issue":"4","key":"280_CR33","first-page":"043044","volume":"27","author":"C Zhang","year":"2018","unstructured":"Zhang C, Zheng H, Lai J. Dual-codebook learning and hierarchical transfer for cross-view action recognition. J Electron Imaging. 2018;27(4):043044.","journal-title":"J Electron Imaging"},{"issue":"3","key":"280_CR34","doi-asserted-by":"publisher","first-page":"033019","DOI":"10.1117\/1.JEI.23.3.033019","volume":"23","author":"F He","year":"2014","unstructured":"He F, Liu Y, Liu Y, et al. Score level fusion scheme based on adaptive local Gabor features for face-iris-fingerprint multimodal biometric. J Electron Imaging. 2014;23(3):033019.","journal-title":"J Electron Imaging"},{"key":"280_CR35","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1016\/j.ins.2018.10.014","volume":"476","author":"RS Kute","year":"2019","unstructured":"Kute RS, Vyas V, Anuse A. Component-based face recognition under transfer learning for forensic applications. Inf Sci. 2019;476:176\u201391.","journal-title":"Inf Sci"},{"key":"280_CR36","doi-asserted-by":"crossref","unstructured":"Parkhi OM, Vedaldi A, Zisserman A. Deep face recognition. In: Proceedings of the british machine vision, vol. 1,  2015. p. 6.","DOI":"10.5244\/C.29.41"},{"key":"280_CR37","unstructured":"https:\/\/www.robots.ox.ac.uk\/~vgg\/software\/vgg_face\/. Accessed 31 July."}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-020-00280-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-020-00280-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-020-00280-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,28]],"date-time":"2021-08-28T00:02:01Z","timestamp":1630108921000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-020-00280-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,28]]},"references-count":37,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2020,9]]}},"alternative-id":["280"],"URL":"https:\/\/doi.org\/10.1007\/s42979-020-00280-2","relation":{},"ISSN":["2662-995X","2661-8907"],"issn-type":[{"value":"2662-995X","type":"print"},{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,8,28]]},"assertion":[{"value":"9 March 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 July 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 August 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"287"}}