{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T18:31:43Z","timestamp":1770834703394,"version":"3.50.1"},"reference-count":56,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2014,3,1]],"date-time":"2014-03-01T00:00:00Z","timestamp":1393632000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2014,3]]},"DOI":"10.1109\/tifs.2014.2298370","type":"journal-article","created":{"date-parts":[[2014,1,31]],"date-time":"2014-01-31T17:36:55Z","timestamp":1391189815000},"page":"364-374","source":"Crossref","is-referenced-by-count":42,"title":["Faved! Biometrics: Tell Me Which Image You Like and I'll Tell You Who You Are"],"prefix":"10.1109","volume":"9","author":[{"given":"Pietro","family":"Lovato","sequence":"first","affiliation":[]},{"given":"Manuele","family":"Bicego","sequence":"additional","affiliation":[]},{"given":"Cristina","family":"Segalin","sequence":"additional","affiliation":[]},{"given":"Alessandro","family":"Perina","sequence":"additional","affiliation":[]},{"given":"Nicu","family":"Sebe","sequence":"additional","affiliation":[]},{"given":"Marco","family":"Cristani","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1037\/0096-3445.123.4.394"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011139631724"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187971"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1511\/2006.3.247"},{"key":"ref31","first-page":"386","article-title":"Photo and video quality evaluation: Focusing on the subject","author":"luo","year":"2008","journal-title":"Proc Europ Conf Comput Vis"},{"key":"ref30","first-page":"419","article-title":"The design of high-level features for photo quality assessment","author":"ke","year":"2006","journal-title":"Proc IEEE Conf Comput Vis Pattern Recog"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2001.990517"},{"key":"ref36","author":"felzenszwalb","year":"2010","journal-title":"Discriminatively Trained Deformable Part Models Release 4"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/1873951.1873965"},{"key":"ref34","first-page":"45","article-title":"Tell me what you like and I'll tell you what you are: Discriminating visual preferences on Flickr data","author":"lovato","year":"2012","journal-title":"Proc Asian Conf Comput Vis"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/11744078_23"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1873951.1873963"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2012.2186123"},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-84882-385-3","author":"tistarelli","year":"2009","journal-title":"Handbook of Remote Biometrics for Surveillance and Security"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-71041-9"},{"key":"ref20","author":"eco","year":"2004","journal-title":"History of Beauty"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1873951.1873990"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1068\/p5793"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1068\/p100651"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1167\/10.2.18"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1037\/a0017316"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MMUL.2003.1195158"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2001.990517"},{"key":"ref51","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1111\/j.2517-6161.1996.tb02080.x","article-title":"Regression shrinkage and selection via the lasso","volume":"58","author":"tibshirani","year":"1994","journal-title":"J R Statist Soc Ser B"},{"key":"ref56","first-page":"140","article-title":"A multiple component matching framework for person re-identification","author":"satta","year":"2011","journal-title":"Proc 10th ICIAP"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/2502081.2502280"},{"key":"ref54","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/9248.001.0001","author":"burdick","year":"2012","journal-title":"Digital_Humanities"},{"key":"ref53","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1016\/j.cviu.2012.10.008","article-title":"Symmetry-driven accumulation of local features for human characterization and re-identification","volume":"117","author":"bazzani","year":"2013","journal-title":"Comput Vis Image Understand"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1068\/p2896"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/DICTA.2010.62"},{"key":"ref40","author":"mardia","year":"2009","journal-title":"Directional Statistics"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-29488-9"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"797","DOI":"10.1109\/ICPR.2000.906196","article-title":"Biometric personal identification based on handwriting","volume":"2","author":"zhu","year":"2000","journal-title":"Proc 15th Int Conf Pattern Recog"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2011.04.010"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029210"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CISIM.2008.8"},{"key":"ref16","first-page":"1","article-title":"Why Johnny can't browse in peace: On the uniqueness of web browsing history patterns","author":"olejnik","year":"2012","journal-title":"Proc Hot Topics Privacy Enhancing Technol"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/AVSS.2013.6636623"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1348\/0007126042369811"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.2307\/1423259"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84882-254-2"},{"key":"ref3","author":"li","year":"2005","journal-title":"Handbook of Face Recognition"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2431211.2431221"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-4402-1"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1155\/2008\/143728"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2009.167"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2005.157"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1504\/IJBM.2008.018665"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2011.5995721"},{"key":"ref45","author":"haralick","year":"1992","journal-title":"Computer and Robot Vision"},{"key":"ref48","author":"girshick","year":"2010","journal-title":"Discriminatively trained deformable part models release 5"},{"key":"ref47","first-page":"285","article-title":"Towards recognizing ?cool?: Can end users help computer vision recognize subjective attributes of objects in images?","author":"curran","year":"2012","journal-title":"Proc 12th ACM Int Conf Intell User Inter"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/34.1000236"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.1978.4309999"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2007.383218"},{"key":"ref43","first-page":"150","article-title":"Synergism in low level vision","author":"georgescu","year":"2002","journal-title":"Proc Int Conf Pattern Recog"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/6727454\/06704752.pdf?arnumber=6704752","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T18:36:59Z","timestamp":1746124619000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6704752\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,3]]},"references-count":56,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2014.2298370","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,3]]}}}