{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T15:20:52Z","timestamp":1773156052914,"version":"3.50.1"},"reference-count":92,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"8","license":[{"start":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T00:00:00Z","timestamp":1564617600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T00:00:00Z","timestamp":1564617600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T00:00:00Z","timestamp":1564617600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"grant Chile-CORFO Engineering 2030 under Seed Fund Program between University of Notre Dame and Catholic University of Chile","award":["14ENI2-26862"],"award-info":[{"award-number":["14ENI2-26862"]}]},{"name":"grant Chile-CORFO Engineering 2030 under Seed Fund Program between University of Notre Dame and Catholic University of Chile","award":["ND-PUC 201506"],"award-info":[{"award-number":["ND-PUC 201506"]}]},{"DOI":"10.13039\/501100002850","name":"Fondo Nacional de Desarrollo Cient\u00edfico y Tecnol\u00f3gico","doi-asserted-by":"publisher","award":["1161314"],"award-info":[{"award-number":["1161314"]}],"id":[{"id":"10.13039\/501100002850","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100008109","name":"University of Notre Dame","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100008109","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1109\/tifs.2018.2890812","type":"journal-article","created":{"date-parts":[[2019,1,3]],"date-time":"2019-01-03T19:42:56Z","timestamp":1546544576000},"page":"2000-2012","source":"Crossref","is-referenced-by-count":145,"title":["On Low-Resolution Face Recognition in the Wild: Comparisons and New Techniques"],"prefix":"10.1109","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4665-6155","authenticated-orcid":false,"given":"Pei","family":"Li","sequence":"first","affiliation":[]},{"given":"Loreto","family":"Prieto","sequence":"additional","affiliation":[]},{"given":"Domingo","family":"Mery","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5446-114X","authenticated-orcid":false,"given":"Patrick J.","family":"Flynn","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.518"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2018.2822810"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46478-7_9"},{"key":"ref70","first-page":"791","article-title":"Gated Siamese convolutional neural network architecture for human re-identification","author":"varior","year":"2016","journal-title":"Proc Eur Conf Comput Vis"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46478-7_31"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2011.5995566"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.50"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2013.463"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-015-1834-y"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2013.461"},{"key":"ref78","author":"wu","year":"2016","journal-title":"Personnet Person re-identification with deep convolutional neural networks"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10584-0_1"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.19"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.618"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7299121"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2012.6247939"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2017.8272704"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2016.7791204"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2009.2031705"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.19"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00862"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB.2011.6117545"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2014.2364262"},{"key":"ref28","first-page":"134","article-title":"Joint learning for attribute-consistent person re-identification","author":"khamis","year":"2014","journal-title":"Proc Eur Conf Comput Vis"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33868-7_24"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10578-9_23"},{"key":"ref65","first-page":"2667","article-title":"Deep neural networks with inexact matching for person re-identification","author":"subramaniam","year":"2016","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref66","first-page":"1988","article-title":"Deep learning face representation by joint identification-verification","author":"sun","year":"2014","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref29","first-page":"1755","article-title":"Dlib-ml: A machine learning toolkit","volume":"10","author":"king","year":"2009","journal-title":"J Mach Learn Res"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.525"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/2812802"},{"key":"ref69","author":"ustinova","year":"2015","journal-title":"Multiregion bilinear convolutional neural networks for person reidentification"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2012.10.008"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7299016"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/AVSS.2016.7738017"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.187"},{"key":"ref21","article-title":"Labeled faces in the wild: A database for studying face recognition in unconstrained environments","author":"huang","year":"2007"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46454-1_53"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2014.2347201"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-61657-5_8"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2016.24"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10584-0_4"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.5244\/C.29.41"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2012.2227771"},{"key":"ref91","first-page":"2879","article-title":"Face detection, pose estimation, and landmark localization in the wild","author":"zhu","year":"2012","journal-title":"Proc IEEE Conf Comput Vis Pattern Recognit"},{"key":"ref90","first-page":"1","article-title":"Low-resolution face recognition via simultaneous discriminant analysis","author":"zhou","year":"2011","journal-title":"Proc IEEE Int Joint Conf Biometrics (IJCB)"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2013.6712756"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2012.2192285"},{"key":"ref57","author":"ranjan","year":"2017","journal-title":"L2-constrained Softmax Loss for Discriminative Face Verification"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2012.04.001"},{"key":"ref55","author":"radford","year":"2015","journal-title":"Unsupervised Representation learning with deep convolutional generative adversarial networks CoRR"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-6296-4_13"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/S0262-8856(97)00070-X"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2012.11.011"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2017.252"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2017.05.012"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2016.2564643"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.2765202"},{"key":"ref13","author":"gonzalez","year":"2009","journal-title":"Digital Image Processing"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-009-0417-2"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2009.08.002"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10590-1_35"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/FG.2017.130"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2010.2050625"},{"key":"ref17","first-page":"770","article-title":"Close the loop: Joint blind image restoration and recognition with sparse representation prior","author":"zhang","year":"2011","journal-title":"Proc IEEE Int Conf Comput Vis"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00101"},{"key":"ref18","first-page":"3279","article-title":"MatchNet: Unifying feature and metric learning for patch-based matching","author":"han","year":"2015","journal-title":"Proc IEEE Conf Comput Vis Pattern Recognit"},{"key":"ref83","author":"yi","year":"2014","journal-title":"Deep metric learning for practical person re-identification"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2008.4587810"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2017.2746658"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2013.314"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00019"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2010.5634479"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.142"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1111\/1467-9280.00144"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7299064"},{"key":"ref8","author":"chen","year":"2017","journal-title":"Face super-resolution through wasserstein gans"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-42911-3_55"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00264"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2010.203"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.139"},{"key":"ref88","first-page":"122","article-title":"A novel visual word co-occurrence model for person re-identification","author":"zhang","year":"2014","journal-title":"Proc Eur Conf Comput Vis Workshops"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.202"},{"key":"ref46","article-title":"The AR face database","author":"mart\u00ednez","year":"1998"},{"key":"ref45","first-page":"191","article-title":"Saliency weighted features for person re-identification","author":"martinel","year":"2014","journal-title":"Proc Eur Conf Comput Vis Workshops"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.363"},{"key":"ref47","author":"mcpherson","year":"2016","journal-title":"Defeating image obfuscation with deep learning"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.713"},{"key":"ref41","author":"liu","year":"2016","journal-title":"End-to-end comparative attention networks for person re-identification"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2018.2810121"},{"key":"ref43","first-page":"507","article-title":"Large-margin softmax loss for convolutional neural networks","author":"liu","year":"2016","journal-title":"Proc Int Conf Mach Learn"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/8710012\/08600370.pdf?arnumber=8600370","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T21:16:23Z","timestamp":1657746983000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8600370\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8]]},"references-count":92,"journal-issue":{"issue":"8"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2018.2890812","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,8]]}}}