{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T15:27:33Z","timestamp":1773847653112,"version":"3.50.1"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1109\/isi.2012.6284307","type":"proceedings-article","created":{"date-parts":[[2012,8,30]],"date-time":"2012-08-30T20:57:57Z","timestamp":1346360277000},"page":"196-201","source":"Crossref","is-referenced-by-count":52,"title":["Multi-spectral face recognition: Identification of people in difficult environments"],"prefix":"10.1109","author":[{"given":"Thirimachos","family":"Bourlai","sequence":"first","affiliation":[]},{"given":"Bojan","family":"Cukic","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1007\/11499145_13","article-title":"Image analysis with local binary patterns","author":"pietikinen","year":"2005","journal-title":"Scandinavian Conference on Image Analysis"},{"key":"17","first-page":"45","article-title":"Eigenfaces vs. fisherfaces: Recognition using class specific linear projection","volume":"19","author":"belhumeur","year":"1996","journal-title":"Transactions on Pattern Analysis and Machine Intelligence"},{"key":"18","author":"teixeira","year":"2003","journal-title":"The Bayesian Intrapersonal\/extrapersonal Classifier"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1162\/jocn.1991.3.1.71"},{"key":"16","author":"devijver","year":"1982","journal-title":"Pattern Recognition a Statistical Approach"},{"key":"13","first-page":"304","article-title":"The CSU face identification evaluation system: Its purpose, features and structure","author":"bolme","year":"2003","journal-title":"Proc International Conference on Vision Systems"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/34.41390"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/AFGR.2004.1301540"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1023\/B:VLSI.0000028532.53893.82"},{"key":"3","article-title":"Handbook of Remote Biometrics for Surveillance and Security","author":"ao","year":"2009","journal-title":"Advances in Computer Vision and Pattern Recognition Series"},{"key":"20","doi-asserted-by":"crossref","first-page":"1635","DOI":"10.1109\/TIP.2010.2042645","article-title":"Enhanced local texture feature sets for face recognition under difficult lighting conditions","volume":"19","author":"tan","year":"2010","journal-title":"Trans Img Proc"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2004.342"},{"key":"1","first-page":"471","author":"bourlai","year":"2011","journal-title":"Ascertaining Human Identity in Night Environments"},{"key":"10","first-page":"1513","article-title":"Jain. Heterogeneous face recognition: Matching nir to visible light images","author":"klare","year":"2010","journal-title":"Proc Conference on Computer Vision and Pattern Recognition"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-7664-8"},{"key":"6","article-title":"Evaluating the Efficiency of a Nighttime, Middle-range Infrared Sensor for Applications in Human Detection and Recognition","author":"bourlai","year":"0","journal-title":"SPIE Infrared Imaging Systems Design Analysis Modeling and Testing XXIII Baltimore U S A April 2012"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ROMAN.1997.647015"},{"key":"4","article-title":"SWIR Multi- Wavelength Acquisition System for Simultaneous Capture of Face Images","volume":"8353","author":"bourlai","year":"2012","journal-title":"SPIE"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB.2011.6117586"},{"key":"8","article-title":"A Study on using Middle-Wave Infrared Images for Face Recognition","author":"bourlai","year":"0","journal-title":"SPIE Biometric Technology for Human Identification IX Baltimore U S A April 2012"}],"event":{"name":"2012 IEEE International Conference on Intelligence and Security Informatics (ISI 2012)","location":"Washington, DC, USA","start":{"date-parts":[[2012,6,11]]},"end":{"date-parts":[[2012,6,14]]}},"container-title":["2012 IEEE International Conference on Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6269208\/6281845\/06284307.pdf?arnumber=6284307","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T23:28:29Z","timestamp":1498001309000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6284307\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/isi.2012.6284307","relation":{},"subject":[],"published":{"date-parts":[[2012,6]]}}}