{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T06:44:56Z","timestamp":1742798696834,"version":"3.28.0"},"reference-count":37,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1109\/icpr.2004.1333826","type":"proceedings-article","created":{"date-parts":[[2004,11,8]],"date-time":"2004-11-08T16:27:50Z","timestamp":1099931270000},"page":"523-532 Vol.4","source":"Crossref","is-referenced-by-count":55,"title":["Face authentication test on the BANCA database"],"prefix":"10.1109","author":[{"given":"K.","family":"Messer","sequence":"first","affiliation":[]},{"given":"J.","family":"Kittler","sequence":"additional","affiliation":[]},{"given":"M.","family":"Sadeghi","sequence":"additional","affiliation":[]},{"given":"M.","family":"Hamouz","sequence":"additional","affiliation":[]},{"given":"A.","family":"Kostin","sequence":"additional","affiliation":[]},{"given":"F.","family":"Cardinaux","sequence":"additional","affiliation":[]},{"given":"S.","family":"Marcel","sequence":"additional","affiliation":[]},{"given":"S.","family":"Bengio","sequence":"additional","affiliation":[]},{"given":"C.","family":"Sanderson","sequence":"additional","affiliation":[]},{"given":"N.","family":"Poh","sequence":"additional","affiliation":[]},{"given":"Y.","family":"Rodriguez","sequence":"additional","affiliation":[]},{"given":"J.","family":"Czyz","sequence":"additional","affiliation":[]},{"given":"L.","family":"Vandendorpe","sequence":"additional","affiliation":[]},{"given":"C.","family":"McCool","sequence":"additional","affiliation":[]},{"given":"S.","family":"Lowther","sequence":"additional","affiliation":[]},{"given":"S.","family":"Sridharan","sequence":"additional","affiliation":[]},{"given":"V.","family":"Chandran","sequence":"additional","affiliation":[]},{"given":"R.P.","family":"Palacios","sequence":"additional","affiliation":[]},{"given":"E.","family":"Vidal","sequence":"additional","affiliation":[]},{"family":"Li Bai","sequence":"additional","affiliation":[]},{"family":"LinLin Shen","sequence":"additional","affiliation":[]},{"family":"Yan Wang","sequence":"additional","affiliation":[]},{"family":"Chiang Yueh-Hsuan","sequence":"additional","affiliation":[]},{"family":"Liu Hsien-Chang","sequence":"additional","affiliation":[]},{"family":"Hung Yi-Ping","sequence":"additional","affiliation":[]},{"given":"A.","family":"Heinrichs","sequence":"additional","affiliation":[]},{"given":"M.","family":"Muller","sequence":"additional","affiliation":[]},{"given":"A.","family":"Tewes","sequence":"additional","affiliation":[]},{"given":"C.","family":"von der Malsburg","sequence":"additional","affiliation":[]},{"given":"R.","family":"Wurtz","sequence":"additional","affiliation":[]},{"family":"Zhenger Wang","sequence":"additional","affiliation":[]},{"family":"Feng Xue","sequence":"additional","affiliation":[]},{"family":"Yong Ma","sequence":"additional","affiliation":[]},{"family":"Qiong Yang","sequence":"additional","affiliation":[]},{"family":"Chi Fang","sequence":"additional","affiliation":[]},{"family":"Xiaoqing Ding","sequence":"additional","affiliation":[]},{"given":"S.","family":"Lucey","sequence":"additional","affiliation":[]},{"given":"R.","family":"Goss","sequence":"additional","affiliation":[]},{"given":"H.","family":"Schneiderman","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"XM2VTSDB: The Extended M2VTS Database","author":"messer","year":"1999","journal-title":"Second International Conference on Audio and Video-based Biometric Person Authentication"},{"journal-title":"The M2VTS Database","year":"0","key":"35"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/AFGR.2004.1301532"},{"journal-title":"Olivetti database","year":"0","key":"36"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2000.903052"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1109\/34.598235"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-25966-4_35"},{"journal-title":"The Harvard Database","year":"0","key":"34"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2004.462"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/T-C.1970.222918"},{"key":"14","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-44887-X_2","article-title":"An image preprocessing algorithm for illumination invariant face recognition","author":"gross","year":"2003","journal-title":"4th International Conference on Audio and Video Based Biometric Person Authentication"},{"journal-title":"Yale database","year":"0","key":"37"},{"key":"11","doi-asserted-by":"crossref","first-page":"964","DOI":"10.1007\/3-540-44887-X_112","article-title":"Face verification competition on the xm2vts database","author":"messer","year":"2003","journal-title":"4th International Conference on Audio and Video Based Biometric Person Authentication"},{"key":"12","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-25948-0_2","article-title":"Face verification competition on the banca database","author":"messer","year":"2004","journal-title":"First International Conference on Biometric Authentication"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/2.820040"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2004.1334561"},{"key":"22","first-page":"1090","volume":"22","author":"phillips","year":"2000","journal-title":"The FERET Evaluation Methodology for Face-Recognition Algorithms"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1016\/S0262-8856(97)00070-X"},{"key":"24","first-page":"123","article-title":"Non-linear variance reduction techniques in biometric authentication","author":"poh","year":"2003","journal-title":"Proc Workshop on Multi-Modal User Authentication (MMUA) Santa Barabara"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/34.655647"},{"key":"26","article-title":"Decision making in the Ida space: Generalised gradient direction metric","author":"sadeghi","year":"2004","journal-title":"Int Conf Automat Face and Gesture Recognition"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(03)00070-9"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2004.1315141"},{"key":"29","article-title":"Learning an approximate bayesian network for object detection","author":"schneiderman","year":"2004","journal-title":"International Conference on Computer Vision"},{"journal-title":"The Face Recognition Homepage","year":"0","key":"3"},{"journal-title":"The CSU Face Identification Evaluation System","year":"0","key":"2"},{"journal-title":"Decision Fusion for Identity Verification Using Facial Images","year":"2003","author":"czyz","key":"10"},{"journal-title":"The BANCA Database","year":"0","key":"1"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/34.655648"},{"key":"7","first-page":"625","article-title":"The BANCA database and evaluation protocol","volume":"2688","author":"bailly-bailliere","year":"2003","journal-title":"Audio- and Video-based Biometric Person Authentication Proceedings of the 4th International Conference AVBPA 2003 Volume 2688 of Lecture Notes in Computer Science"},{"journal-title":"The XM2VTSDB Homepage","year":"0","key":"6"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2001.990517"},{"journal-title":"The ICPR FAT2004 Homepage","year":"0","key":"5"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/AFGR.2000.840637"},{"journal-title":"Face recognition vendor test","year":"0","key":"4"},{"key":"9","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-25948-0_93","article-title":"Decision fusion for face authentication","author":"czyz","year":"2004","journal-title":"First International Conference on Biometric Authentication"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/AFGR.2004.1301636"}],"event":{"name":"Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004.","start":{"date-parts":[[2004,8,26]]},"location":"Cambridge, UK","end":{"date-parts":[[2004,8,26]]}},"container-title":["Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9258\/29388\/01333826.pdf?arnumber=1333826","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T11:37:23Z","timestamp":1497613043000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1333826\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/icpr.2004.1333826","relation":{},"subject":[],"published":{"date-parts":[[2004]]}}}