{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:06:42Z","timestamp":1761581202162},"reference-count":97,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"8","license":[{"start":{"date-parts":[[2014,8,1]],"date-time":"2014-08-01T00:00:00Z","timestamp":1406851200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. on Image Process."],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1109\/tip.2014.2329460","type":"journal-article","created":{"date-parts":[[2014,6,6]],"date-time":"2014-06-06T18:24:53Z","timestamp":1402079093000},"page":"3490-3505","source":"Crossref","is-referenced-by-count":60,"title":["Subspace-Based Discrete Transform Encoded Local Binary Patterns Representations for Robust Periocular Matching on NIST\u2019s Face Recognition Grand Challenge"],"prefix":"10.1109","volume":"23","author":[{"given":"Felix","family":"Juefei-Xu","sequence":"first","affiliation":[]},{"given":"Marios","family":"Savvides","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2010.2097270"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2011.2158998"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2008.03.017"},{"key":"ref32","first-page":"954","article-title":"Wavelet-based illumination normalization for face recognition","volume":"2","author":"du","year":"2005","journal-title":"Proc IEEE Int Conf Image Process ICIP"},{"key":"ref31","first-page":"3289","article-title":"Illumination-robust face recognition using retina modeling","author":"vu","year":"2009","journal-title":"Proc 16th IEEE Int Conf Image Process ICIP"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2005.857353"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2009.2028255"},{"key":"ref36","first-page":"1","article-title":"Illumination invariant face recognition by non-local smoothing","author":"\u0161truc","year":"2009","journal-title":"Proc Int Conf BIOID Multicomm"},{"key":"ref35","article-title":"Performance evaluation of photometric normalization techniques for illumination invariant face recognition","author":"\u0161truc","year":"2010"},{"key":"ref34","first-page":"1","article-title":"An image preprocessing algorithm for illumination invariant face recognition","volume":"2","author":"gross","year":"2003","journal-title":"Int Conf Audio and Video based Biometric Person Authentication"},{"key":"ref28","article-title":"Lighting normalization algorithms for face verification","author":"heusch","year":"2005","journal-title":"Proc IDIAP-Com"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2008.01.028"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2004.1419763"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2013.16"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.268"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2014.6"},{"key":"ref24","article-title":"Subtasks of unconstrained face recognition","author":"leibo","year":"2014","journal-title":"Proc Int Joint Conf Comput Vis Imag Comput Graph Theory Appl VISAPP"},{"key":"ref23","article-title":"Labeled faces in the wild: A database for studying face recognition in unconstrained environments","author":"huang","year":"2007"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/83.597272"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/83.557356"},{"key":"ref50","author":"attar","year":"2006","journal-title":"Special Functions and Orthogonal Polynomials"},{"key":"ref51","author":"baik","year":"2007","journal-title":"Discrete Orthogonal Polynomials"},{"key":"ref59","first-page":"1","article-title":"Robust periocular biometric recognition using multi-level fusion of various local feature extraction techniques","author":"juefei-xu","year":"2011","journal-title":"Proc 17th Int Conf Digit Signal Process DSP"},{"key":"ref58","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-85729-748-8","author":"pietikainen","year":"2011","journal-title":"Computer Vision Using Local Binary Patterns"},{"key":"ref57","first-page":"366","article-title":"Graph matching iris image blocks with local binary pattern","author":"sun","year":"2006","journal-title":"ICB Intl Conf on Advances in Biometrics"},{"key":"ref56","first-page":"194","article-title":"Gender classification based on boosting local binary pattern","volume":"3972","author":"sun","year":"2006","journal-title":"Proc 3rd Int Symp Neural Netw ISNN"},{"key":"ref55","first-page":"370","article-title":"Robust facial expression recognition using local binary patterns","volume":"2","author":"shan","year":"2005","journal-title":"Proc IEEE Int Conf Image Process"},{"key":"ref54","first-page":"306","article-title":"Face detection using improved LBP under Bayesian framework","author":"jin","year":"2004","journal-title":"Proc 3rd Int Conf Image Graph"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30541-5_47"},{"key":"ref52","author":"sansone","year":"2004","journal-title":"Orthogonal Functions"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2010.2042645"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1008"},{"key":"ref3","author":"jolliffe","year":"2002","journal-title":"Principal Component Analysis"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2006.884094"},{"key":"ref5","first-page":"153","article-title":"Redundant class-dependence feature analysis based on correlation filters using FRGC2.0 data","author":"xie","year":"2005","journal-title":"Proc IEEE Comput Soc Conf Comput Vis Pattern Recognit Workshops"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2009.5339068"},{"key":"ref49","first-page":"1636","article-title":"Legendre polynomials in signal reconstruction and compression","author":"li","year":"2010","journal-title":"Proc 5th IEEE Conf Ind Electron Appl ICIEA"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2007.4401947"},{"key":"ref9","first-page":"1","article-title":"Robust local binary pattern feature sets for periocular biometric identification","author":"juefei-xu","year":"2010","journal-title":"Proc 4th IEEE Int Conf Biometr Theory Appl Syst"},{"key":"ref46","author":"oppenheim","year":"1989","journal-title":"Discrete-Time Signal Processing"},{"key":"ref45","author":"rao","year":"1990","journal-title":"Discrete Cosine Transform Algorithm Advantages Applications"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2007.901243"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1364\/JOSA.73.001832"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2005.92"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/34.927464"},{"key":"ref44","author":"elliott","year":"1982","journal-title":"Fast Transforms Algorithms Analyses and Applications"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/0031-3203(95)00067-4"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/NNSP.1999.788121"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/34.598228"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/AFGR.2002.4527207"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2004.1315251"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1023\/B:VISI.0000029664.99615.94"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.177"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1002\/0471221317"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2002.999679"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2005.188"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2007.09.014"},{"key":"ref60","author":"mitchell","year":"1997","journal-title":"Machine Learning"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1002\/047003534X"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/AFGR.2008.4813399"},{"key":"ref63","article-title":"Rounded Hartley transform: A quasi-involution","author":"de sobral cintra","year":"2002","journal-title":"Proc Int Telecommun Symp ITS"},{"key":"ref64","author":"gonzalez","year":"2007","journal-title":"Digital Imaging Processing"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.1991.139758"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2005.55"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511541087"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1364\/AO.26.003633"},{"key":"ref2","article-title":"Vulnerabilities in biometric systems: Attacks and recent advances in liveness detection","author":"galbally","year":"2007","journal-title":"Proc 1st Spanish Workshop on Biometrics"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1364\/AO.32.001933"},{"key":"ref1","article-title":"Robust periocular biometric recognition using multilevel fusion of various local feature extraction techniques","author":"juefei-xu","year":"2011","journal-title":"Proc IEEE 17th Int Conf Digit Signal Process DSP"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1155\/ASP.2005.588"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2012.01.002"},{"key":"ref93","doi-asserted-by":"crossref","first-page":"2290","DOI":"10.1016\/j.sigpro.2011.04.012","article-title":"Image analysis by Gaussian-Hermite moments","volume":"91","author":"bo","year":"2011","journal-title":"Signal Process"},{"key":"ref92","doi-asserted-by":"crossref","first-page":"3171","DOI":"10.1109\/TIP.2010.2052276","article-title":"Fast computation of tchebichef moments for binary and grayscale images","volume":"19","author":"shu","year":"2010","journal-title":"IEEE Trans Image Process"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/83.941859"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1002\/9780470684757"},{"key":"ref96","article-title":"Image reconstruction by Laguerre moments","author":"qjidaa","year":"2006","journal-title":"Proc Int Symp Commun Control Signal Process"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1088\/0305-4470\/35\/15\/312"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICSPCS.2011.6140879"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2010.5634509"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2010.5634537"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2010.5634536"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2010.5544621"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2096810"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2010.5634529"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2011.6126542"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2010.58"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2009.77"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/WACV.2012.6163051"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2013.389"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB.2011.6117600"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.5244\/C.27.8"},{"key":"ref80","first-page":"778","article-title":"Brief: Binary robust independent elementary features","author":"calonder","year":"2010","journal-title":"Proc Eur Conf Comput Vis ECCV'06"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2005.232"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2013.449"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2013.299"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2013.246"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/34.3913"}],"container-title":["IEEE Transactions on Image Processing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/83\/6840896\/06827219.pdf?arnumber=6827219","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:55:37Z","timestamp":1642006537000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6827219\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8]]},"references-count":97,"journal-issue":{"issue":"8"},"URL":"https:\/\/doi.org\/10.1109\/tip.2014.2329460","relation":{},"ISSN":["1057-7149","1941-0042"],"issn-type":[{"value":"1057-7149","type":"print"},{"value":"1941-0042","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,8]]}}}