{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T17:35:22Z","timestamp":1754156122670,"version":"3.41.2"},"reference-count":20,"publisher":"Emerald","issue":"2","license":[{"start":{"date-parts":[[2014,5,6]],"date-time":"2014-05-06T00:00:00Z","timestamp":1399334400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.emeraldinsight.com\/page\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J of Systems and Info Tech"],"published-print":{"date-parts":[[2014,5,6]]},"DOI":"10.1108\/jsit-11-2013-0060","type":"journal-article","created":{"date-parts":[[2014,4,28]],"date-time":"2014-04-28T05:40:56Z","timestamp":1398663656000},"page":"126-137","source":"Crossref","is-referenced-by-count":3,"title":["Advanced face recognition and verification in mobile platforms"],"prefix":"10.1108","volume":"16","author":[{"given":"Yong-Hwan","family":"Lee","sequence":"first","affiliation":[]},{"given":"Hyochang","family":"Ahn","sequence":"additional","affiliation":[]},{"given":"Han-Jin","family":"Cho","sequence":"additional","affiliation":[]},{"given":"June-Hwan","family":"Lee","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"b11","doi-asserted-by":"publisher","DOI":"10.1109\/34.254061"},{"key":"b16","doi-asserted-by":"publisher","DOI":"10.1023\/A:1009715923555"},{"key":"b20","doi-asserted-by":"crossref","unstructured":"Casiraghi, E. , Lanzarotti, R. and Lipori, G. (2003), \u201cA face detection system based on color and support vector machines\u201d, 14th Italian Workshop on Neural Networks (WIRN2003), Lecture Notes in Computer Science, Vol. 2859, pp. 113-120.","DOI":"10.1007\/978-3-540-45216-4_12"},{"key":"b3","doi-asserted-by":"publisher","DOI":"10.1016\/j.rti.2003.08.003"},{"key":"b2","doi-asserted-by":"crossref","unstructured":"Dzazali, S. and Zolait, A.H. (2012), \u201cAssessment of information security maturity: an exploration study of Malaysian public service organizations\u201d, Journal of Systems and Information Technology, Vol. 14 No. 1.","DOI":"10.1108\/13287261211221128"},{"key":"b30","doi-asserted-by":"publisher","DOI":"10.1108\/13287260910932403"},{"key":"b4","doi-asserted-by":"publisher","DOI":"10.1006\/cviu.2001.0921"},{"key":"b15","doi-asserted-by":"publisher","DOI":"10.1109\/34.1000242"},{"key":"b6","unstructured":"Kukharev, G. and Masicz, P. (2003), \u201cA fast and accurate faces localization using gradient method\u201d, WSCG SHORT Communication Papers Proceedings (WSCG'2004), Plzen, Czech Republic, 2-6 February."},{"key":"b31","doi-asserted-by":"crossref","unstructured":"Maditinos, D. , Chatzoudes, D. and Sarigiannidis, L. (2013), \u201cAn examination of the critical factors affecting consumer acceptance of online banking: a focus on the dimensions of risk\u201d, Journal of Systems and Information Technology, Vol. 15 No. 1.","DOI":"10.1108\/13287261311322602"},{"key":"b29","unstructured":"Mazanec, J. , Melisek, M. , Oravec, M. and Pavlovicova, J. (2008), \u201cSupport vector machines, PCA and LDA in face recognition\u201d, Journal of Electrical Engineering, Vol. 59 No. 4, pp. 203-209."},{"key":"b7","doi-asserted-by":"crossref","unstructured":"Moghaddam, B. , Wahid, W. and Pentland, A. (1998), \u201cBeyond eigenfaces: probabilistic matching for face recognition\u201d, IEEE International Conference on Automatic Face and Gesture Recognition (FG'98), April, pp. 30-35.","DOI":"10.1109\/AFGR.1998.670921"},{"key":"b12","doi-asserted-by":"publisher","DOI":"10.1109\/MCG.1982.1674492"},{"key":"b25","unstructured":"Qahwaji, R. and Green, R. (2002), \u201cImproving the recognition performance for PCA\u201d, IEE CATEE, Amman, Jordan."},{"key":"b28","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2009.11.005"},{"key":"b9","doi-asserted-by":"publisher","DOI":"10.1162\/jocn.1991.3.1.71"},{"key":"b5","doi-asserted-by":"publisher","DOI":"10.1109\/34.982883"},{"key":"b10","doi-asserted-by":"publisher","DOI":"10.1007\/BF00127169"},{"key":"b14","doi-asserted-by":"crossref","unstructured":"Zhang, L. and Bo, Z. (2002), \u201cRelationship between support vector set and kernel functions in SVM\u201d, Journal of Computer Science & Technology, Vol. 17 No. 5.","DOI":"10.1007\/BF02948823"},{"key":"frd1","unstructured":"Tomaz, F. , Candeias, T. and Shahbazkia, H. (2003), \u201cImproved automatic skin detection in color images\u201d, Proceedings of Digital Image Computing: Techniques and Applications, December, pp. 419-427."}],"container-title":["Journal of Systems and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/JSIT-11-2013-0060","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full\/10.1108\/JSIT-11-2013-0060","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T22:24:06Z","timestamp":1753395846000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/jsit\/article\/16\/2\/126-137\/252427"}},"subtitle":[],"editor":[{"given":"Prof.","family":"Hyejung Jang, Dr Wanbok Lee, Dr K.","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2014,5,6]]},"references-count":20,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2014,5,6]]}},"alternative-id":["10.1108\/JSIT-11-2013-0060"],"URL":"https:\/\/doi.org\/10.1108\/jsit-11-2013-0060","relation":{},"ISSN":["1328-7265"],"issn-type":[{"type":"print","value":"1328-7265"}],"subject":[],"published":{"date-parts":[[2014,5,6]]}}}