{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:01:05Z","timestamp":1772038865023,"version":"3.50.1"},"reference-count":39,"publisher":"Elsevier BV","issue":"6","license":[{"start":{"date-parts":[[2002,6,1]],"date-time":"2002-06-01T00:00:00Z","timestamp":1022889600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Signal Processing"],"published-print":{"date-parts":[[2002,6]]},"DOI":"10.1016\/s0165-1684(02)00157-3","type":"journal-article","created":{"date-parts":[[2002,10,10]],"date-time":"2002-10-10T22:35:01Z","timestamp":1034289301000},"page":"833-851","source":"Crossref","is-referenced-by-count":22,"title":["Face verification using elastic graph matching based on morphological signal decomposition"],"prefix":"10.1016","volume":"82","author":[{"given":"Anastasios","family":"Tefas","sequence":"first","affiliation":[]},{"given":"Constantine","family":"Kotropoulos","sequence":"additional","affiliation":[]},{"given":"Ioannis","family":"Pitas","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"7","key":"10.1016\/S0165-1684(02)00157-3_BIB1","doi-asserted-by":"crossref","first-page":"721","DOI":"10.1109\/34.598229","article-title":"Face recognition: the problem of compensating for changes in illumination direction","volume":"19","author":"Adini","year":"1997","journal-title":"IEEE Trans. Pattern Anal. Machine Intell."},{"issue":"7","key":"10.1016\/S0165-1684(02)00157-3_BIB2","doi-asserted-by":"crossref","first-page":"711","DOI":"10.1109\/34.598228","article-title":"Eigenfaces vs. fisherfaces: recognition using class specific linear projection","volume":"19","author":"Belhumer","year":"1997","journal-title":"IEEE Trans. Pattern Anal. Machine Intell."},{"key":"10.1016\/S0165-1684(02)00157-3_BIB3","doi-asserted-by":"crossref","first-page":"1341","DOI":"10.1016\/0031-3203(94)00312-A","article-title":"Fuzzy mathematical morphologies: a comparative study","volume":"28","author":"Bloch","year":"1995","journal-title":"Pattern Recognition"},{"issue":"10","key":"10.1016\/S0165-1684(02)00157-3_BIB4","doi-asserted-by":"crossref","first-page":"1042","DOI":"10.1109\/34.254061","article-title":"Face recognition: features versus templates","volume":"15","author":"Brunelli","year":"1993","journal-title":"IEEE Trans. Pattern Anal. Machine Intell."},{"issue":"5","key":"10.1016\/S0165-1684(02)00157-3_BIB5","doi-asserted-by":"crossref","first-page":"705","DOI":"10.1109\/5.381842","article-title":"Human and machine recognition of faces: a survey","volume":"83","author":"Chellappa","year":"1995","journal-title":"Proc. IEEE"},{"key":"10.1016\/S0165-1684(02)00157-3_BIB6","first-page":"322","article-title":"Face recognition using unsupervised feature extraction","volume":"1","author":"Cottrell","year":"1990","journal-title":"International Neural Network Conference, Paris"},{"issue":"4","key":"10.1016\/S0165-1684(02)00157-3_BIB7","doi-asserted-by":"crossref","first-page":"504","DOI":"10.1109\/83.753738","article-title":"Face authentication with gabor information on deformable graphs","volume":"8","author":"Duc","year":"1999","journal-title":"IEEE Trans. Image Process."},{"key":"10.1016\/S0165-1684(02)00157-3_BIB8","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1111\/j.1469-1809.1936.tb02137.x","article-title":"The use of multiple measures in taxonomic problems","volume":"7","author":"Fisher","year":"1936","journal-title":"Ann. Eugenics"},{"key":"10.1016\/S0165-1684(02)00157-3_BIB9","series-title":"Introduction to Statistical Pattern Recognition","author":"Fukunaga","year":"1990"},{"key":"10.1016\/S0165-1684(02)00157-3_BIB10","unstructured":"M. Gu, S.C. Eisenstat, A stable and fast algorithm for updating the singular value decomposition, Technical Report TR-966, Yale University, 1994."},{"issue":"4","key":"10.1016\/S0165-1684(02)00157-3_BIB11","doi-asserted-by":"crossref","first-page":"532","DOI":"10.1109\/TPAMI.1987.4767941","article-title":"Image analysis using mathematical morphology","volume":"9","author":"Haralick","year":"1987","journal-title":"IEEE Trans. Pattern Anal. Machine Intell."},{"key":"10.1016\/S0165-1684(02)00157-3_BIB12","series-title":"Normality and Pathology in Cognitive Function","first-page":"173","article-title":"The human face","author":"Hay","year":"1982"},{"issue":"1","key":"10.1016\/S0165-1684(02)00157-3_BIB13","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1109\/34.41390","article-title":"Application of the Karhunen-Loeve procedure for the characterization of faces","volume":"12","author":"Kirby","year":"1990","journal-title":"IEEE Trans. Pattern Analy. Machine Intell."},{"key":"10.1016\/S0165-1684(02)00157-3_BIB14","doi-asserted-by":"crossref","unstructured":"L. Koskinen, J. Astola, Y. Neuvo, Soft morphological filters, in: Proceedings of the SPIE Symposium on Image Algebra and Morphological Image Processing, Vol. 1568, 1991, pp. 262\u2013270.","DOI":"10.1117\/12.46121"},{"key":"10.1016\/S0165-1684(02)00157-3_BIB15","doi-asserted-by":"crossref","unstructured":"C. Kotropoulos, I. Pitas, Rule-based face detection in frontal views, in: Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP-97), Vol. IV, Munich, Germany, April 1997, pp. 2537\u20132540.","DOI":"10.1109\/ICASSP.1997.595305"},{"issue":"12","key":"10.1016\/S0165-1684(02)00157-3_BIB16","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1016\/S0031-3203(99)00185-5","article-title":"Morphological elastic graph matching applied to frontal face authentication under well-controlled and real conditions","volume":"33","author":"Kotropoulos","year":"2000","journal-title":"Pattern Recognition"},{"issue":"1","key":"10.1016\/S0165-1684(02)00157-3_BIB17","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/6046.825791","article-title":"Frontal face authentication using discriminating grids with morphological feature vectors","volume":"2","author":"Kotropoulos","year":"2000","journal-title":"IEEE Trans. Multimedia"},{"issue":"7","key":"10.1016\/S0165-1684(02)00157-3_BIB18","doi-asserted-by":"crossref","first-page":"764","DOI":"10.1109\/34.598233","article-title":"An algorithm for the learning of weights in discrimination functions using a priori constraints","volume":"19","author":"Kr\u00fcger","year":"1997","journal-title":"IEEE Trans. Pattern Anal. Machine Intell."},{"issue":"3","key":"10.1016\/S0165-1684(02)00157-3_BIB19","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1109\/12.210173","article-title":"Distortion invariant object recognition in the dynamic link architecture","volume":"42","author":"Lades","year":"1993","journal-title":"IEEE Trans. Comput."},{"key":"10.1016\/S0165-1684(02)00157-3_BIB20","doi-asserted-by":"crossref","unstructured":"B.S. Manjunath, R. Chellappa, C.v.d. Malsburg, A feature based approach to face recognition, Proceedings of the IEEE International Conference on Computer Vision and Pattern Recognition (CVPR-92), 1992, pp. 373\u2013378.","DOI":"10.1109\/CVPR.1992.223162"},{"key":"10.1016\/S0165-1684(02)00157-3_BIB21","series-title":"The Annealing Algorithm","author":"Otten","year":"1989"},{"key":"10.1016\/S0165-1684(02)00157-3_BIB22","series-title":"Probability, Random Variables and Stochastic Processes","author":"Papoulis","year":"1991"},{"issue":"8","key":"10.1016\/S0165-1684(02)00157-3_BIB23","doi-asserted-by":"crossref","first-page":"1150","DOI":"10.1109\/83.704308","article-title":"Matching pursuit filters applied to face identification","volume":"7","author":"Phillips","year":"1998","journal-title":"IEEE Trans. Image Process."},{"key":"10.1016\/S0165-1684(02)00157-3_BIB24","doi-asserted-by":"crossref","unstructured":"S. Pigeon, L. Vandendorpe, The M2VTS multimodal face database, in: J. Big\u00fcn, G. Chollet, G. Borgefors (Eds.), Lecture Notes in Computer Science: Audio- and Video- based Biometric Person Authentication, Vol. 1206, Springer, Berlin, 1997, pp. 403\u2013409.","DOI":"10.1007\/BFb0016021"},{"key":"10.1016\/S0165-1684(02)00157-3_BIB25","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1016\/S0165-1684(98)00087-5","article-title":"Image-based multimodal face authentication","volume":"69","author":"Pigeon","year":"1998","journal-title":"Signal Processing"},{"key":"10.1016\/S0165-1684(02)00157-3_BIB26","series-title":"Nonlinear Digital Filters: Principles and Applications","author":"Pitas","year":"1990"},{"issue":"1","key":"10.1016\/S0165-1684(02)00157-3_BIB27","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/34.41382","article-title":"Morphological shape decomposition","volume":"12","author":"Pitas","year":"1990","journal-title":"IEEE Trans. Pattern Analy. Machine Intell."},{"issue":"9","key":"10.1016\/S0165-1684(02)00157-3_BIB28","doi-asserted-by":"crossref","first-page":"951","DOI":"10.1109\/34.537351","article-title":"Comparison between the morphological skeleton and morphological shape decomposition","volume":"18","author":"Reinhardt","year":"1996","journal-title":"IEEE Trans. Pattern Anal. Machine Intell."},{"issue":"1","key":"10.1016\/S0165-1684(02)00157-3_BIB29","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1109\/83.481673","article-title":"Efficient morphological shape representation","volume":"5","author":"Reinhardt","year":"1996","journal-title":"IEEE Trans. Image Process."},{"key":"10.1016\/S0165-1684(02)00157-3_BIB30","series-title":"Pattern Recognition: Statistical, Structural and Neural Approaches","author":"Schalkoff","year":"1992"},{"key":"10.1016\/S0165-1684(02)00157-3_BIB31","series-title":"Image Analysis and Mathematical Morphology","author":"Serra","year":"1982"},{"key":"10.1016\/S0165-1684(02)00157-3_BIB32","series-title":"Image Analysis and Mathematical Morphology, Part II: Theoretical Advances","author":"Serra","year":"1988"},{"issue":"1","key":"10.1016\/S0165-1684(02)00157-3_BIB33","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1162\/jocn.1991.3.1.71","article-title":"Eigenfaces for recognition","volume":"3","author":"Turk","year":"1991","journal-title":"J. Cognitive Neurosci."},{"key":"10.1016\/S0165-1684(02)00157-3_BIB34","series-title":"Biometrics: Personal Identification in Networked Society","first-page":"65","article-title":"Face recognition","author":"Weng","year":"1999"},{"key":"10.1016\/S0165-1684(02)00157-3_BIB35","doi-asserted-by":"crossref","unstructured":"L. Wiskott, Phantom faces for face analysis, Lecture Notes in Computer Science: Computer Analysis of Images and Patterns, Vol. 1296, Springer, Berlin, 1997, pp. 480\u2013487.","DOI":"10.1007\/3-540-63460-6_153"},{"issue":"7","key":"10.1016\/S0165-1684(02)00157-3_BIB36","doi-asserted-by":"crossref","first-page":"775","DOI":"10.1109\/34.598235","article-title":"Face recognition by elastic bunch graph matching","volume":"19","author":"Wiskott","year":"1997","journal-title":"IEEE Trans. Pattern Anal. Machine Intell."},{"issue":"7","key":"10.1016\/S0165-1684(02)00157-3_BIB37","doi-asserted-by":"crossref","first-page":"769","DOI":"10.1109\/34.598234","article-title":"Object recognition robust under translations, deformations, and changes in background","volume":"19","author":"W\u00fcrtz","year":"1997","journal-title":"IEEE Trans. Pattern Anal. Machine Intell."},{"issue":"1","key":"10.1016\/S0165-1684(02)00157-3_BIB38","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1016\/0031-3203(94)90017-5","article-title":"Human face detection in a complex background","volume":"27","author":"Yang","year":"1994","journal-title":"Pattern Recognition"},{"issue":"9","key":"10.1016\/S0165-1684(02)00157-3_BIB39","doi-asserted-by":"crossref","first-page":"1423","DOI":"10.1109\/5.628712","article-title":"Face recognition: eigenface, elastic matching and neural nets","volume":"85","author":"Zhang","year":"1997","journal-title":"Proc. IEEE"}],"container-title":["Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0165168402001573?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0165168402001573?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,13]],"date-time":"2019-04-13T04:51:46Z","timestamp":1555131106000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0165168402001573"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002,6]]},"references-count":39,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2002,6]]}},"alternative-id":["S0165168402001573"],"URL":"https:\/\/doi.org\/10.1016\/s0165-1684(02)00157-3","relation":{},"ISSN":["0165-1684"],"issn-type":[{"value":"0165-1684","type":"print"}],"subject":[],"published":{"date-parts":[[2002,6]]}}}