{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T09:29:53Z","timestamp":1762507793484,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,8,26]],"date-time":"2019-08-26T00:00:00Z","timestamp":1566777600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Instituto de Telecomunica\u00e7\u00f5es","award":["UID-EEA-50008-2013"],"award-info":[{"award-number":["UID-EEA-50008-2013"]}]},{"name":"Funda\u00e7\u00e3o Ci\u00eancia Tecnologia","award":["UID-EEA-50008-2013"],"award-info":[{"award-number":["UID-EEA-50008-2013"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,8,26]]},"DOI":"10.1145\/3339252.3340107","type":"proceedings-article","created":{"date-parts":[[2019,8,9]],"date-time":"2019-08-09T12:21:03Z","timestamp":1565353263000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Deep Learning-based Facial Detection and Recognition in Still Images for Digital Forensics"],"prefix":"10.1145","author":[{"given":"Patricio","family":"Domingues","sequence":"first","affiliation":[{"name":"ESTG - Polytechnic Institute of Leiria, Instituto de Telecomunica\u00e7\u00f5es, Centro de Investiga\u00e7\u00e3o em Inform\u00e1tica e Comunica\u00e7\u00f5es, Leiria, Portugal"}]},{"given":"Alexandre Fraz\u00e3o","family":"Ros\u00e1rio","sequence":"additional","affiliation":[{"name":"ESTG - Polytechnic Institute of Leiria, Instituto de Telecomunica\u00e7\u00f5es, Leiria, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2019,8,26]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"17th European Conference on Cyber Warfare and Security. Academic Conferences and Publishing International Limited, 11--19","author":"Al-Kawaz Hiba","year":"2018","unstructured":"Hiba Al-Kawaz , N Clark , Steven M Furnell , Fudong Li , and A Alburan . 2018 . Advanced facial recognition for digital forensics . In 17th European Conference on Cyber Warfare and Security. Academic Conferences and Publishing International Limited, 11--19 . Hiba Al-Kawaz, N Clark, Steven M Furnell, Fudong Li, and A Alburan. 2018. Advanced facial recognition for digital forensics. In 17th European Conference on Cyber Warfare and Security. Academic Conferences and Publishing International Limited, 11--19."},{"volume-title":"12th International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE)","author":"Anda Felix","key":"e_1_3_2_1_2_1","unstructured":"Felix Anda , David Lillis , Nhien-An Le-Khac , and Mark Scanlon . 2018. Evaluating Automated Facial Age Estimation Techniques for Digital Forensics . In 12th International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE) , IEEE Security & Privacy Workshops. IEEE. Felix Anda, David Lillis, Nhien-An Le-Khac, and Mark Scanlon. 2018. Evaluating Automated Facial Age Estimation Techniques for Digital Forensics. In 12th International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE), IEEE Security & Privacy Workshops. IEEE."},{"key":"e_1_3_2_1_3_1","first-page":"1","article-title":"Finding a Needle in Haystack: Facebook's Photo Storage","volume":"10","author":"Beaver Doug","year":"2010","unstructured":"Doug Beaver , Sanjeev Kumar , Harry C Li , Jason Sobel , Peter Vajgel , 2010 . Finding a Needle in Haystack: Facebook's Photo Storage .. In OSDI , Vol. 10. 1 -- 8 . Doug Beaver, Sanjeev Kumar, Harry C Li, Jason Sobel, Peter Vajgel, et al. 2010. Finding a Needle in Haystack: Facebook's Photo Storage.. In OSDI, Vol. 10. 1--8.","journal-title":"OSDI"},{"key":"e_1_3_2_1_4_1","volume-title":"The Symposium on Computing at Minority Institutions.","author":"Beaver Doug","year":"2016","unstructured":"Doug Beaver , Sanjeev Kumar , Harry C Li , Jason Sobel , Peter Vajgel , 2016 . FaceRadar: Extending Open Source Software to Accelerate Image Processing in Digital Forensic Investigations through Face Detection . In The Symposium on Computing at Minority Institutions. Doug Beaver, Sanjeev Kumar, Harry C Li, Jason Sobel, Peter Vajgel, et al. 2016. FaceRadar: Extending Open Source Software to Accelerate Image Processing in Digital Forensic Investigations through Face Detection. In The Symposium on Computing at Minority Institutions."},{"key":"e_1_3_2_1_5_1","unstructured":"dlib. 2018. Improve dlib (dlib_face_recognition_resnet_model_v1) with Asian faces. Website (access on 2019-03-20). https:\/\/github.com\/davisking\/dlib\/issues\/1407.  dlib. 2018. Improve dlib (dlib_face_recognition_resnet_model_v1) with Asian faces. Website (access on 2019-03-20). https:\/\/github.com\/davisking\/dlib\/issues\/1407."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2011.11.002"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2010.05.009"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46493-0_38"},{"key":"e_1_3_2_1_10_1","volume-title":"Workshop on faces in 'Real-Life' Images: detection, alignment, and recognition.","author":"Huang Gary B","year":"2008","unstructured":"Gary B Huang , Marwan Mattar , Tamara Berg , and Eric Learned-Miller . 2008 . Labeled faces in the wild: A database for studying face recognition in unconstrained environments . In Workshop on faces in 'Real-Life' Images: detection, alignment, and recognition. Gary B Huang, Marwan Mattar, Tamara Berg, and Eric Learned-Miller. 2008. Labeled faces in the wild: A database for studying face recognition in unconstrained environments. In Workshop on faces in 'Real-Life' Images: detection, alignment, and recognition."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MMUL.2012.4"},{"key":"e_1_3_2_1_12_1","unstructured":"Davis King. 2017. High Quality Face Recognition with Deep Metric Learning. Website (accessed on 2019-03-10). http:\/\/blog.dlib.net\/2017\/02\/high-quality-face-recognition-withdeep.html.  Davis King. 2017. High Quality Face Recognition with Deep Metric Learning. Website (accessed on 2019-03-10). http:\/\/blog.dlib.net\/2017\/02\/high-quality-face-recognition-withdeep.html."},{"key":"e_1_3_2_1_13_1","first-page":"1755","article-title":"Dlib-ml: A machine learning toolkit","author":"King Davis E","year":"2009","unstructured":"Davis E King . 2009 . Dlib-ml: A machine learning toolkit . Journal of Machine Learning Research 10 , Jul (2009), 1755 -- 1758 . Davis E King. 2009. Dlib-ml: A machine learning toolkit. Journal of Machine Learning Research 10, Jul (2009), 1755--1758.","journal-title":"Journal of Machine Learning Research 10"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7299170"},{"key":"e_1_3_2_1_15_1","unstructured":"Jennifer Lynch. 2018. Face Off:Law Enforcement Use of Face Recognition Technology. Website (accessed on 2019-03-11). https:\/\/www.eff.org\/wp\/face-off.  Jennifer Lynch. 2018. Face Off:Law Enforcement Use of Face Recognition Technology. Website (accessed on 2019-03-11). https:\/\/www.eff.org\/wp\/face-off."},{"volume-title":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST). 388--395","author":"Mashhadani S.","key":"e_1_3_2_1_16_1","unstructured":"S. Mashhadani , H. Al-kawaz, N. Clarke , S. Furnell , and F. Li . 2017. A novel multimedia-forensic analysis tool (M-FAT) . In 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST). 388--395 . S. Mashhadani, H. Al-kawaz, N. Clarke, S. Furnell, and F. Li. 2017. A novel multimedia-forensic analysis tool (M-FAT). In 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST). 388--395."},{"key":"e_1_3_2_1_17_1","unstructured":"Alex Moshakis. 2018. Super recognisers: the people who never forget a face. Website (access on 2019-03-10). https:\/\/www.theguardian.com\/uk-news\/2018\/nov\/11\/super-recognisers-police-the-people-who-never-forget-a-face.  Alex Moshakis. 2018. Super recognisers: the people who never forget a face. Website (access on 2019-03-10). https:\/\/www.theguardian.com\/uk-news\/2018\/nov\/11\/super-recognisers-police-the-people-who-never-forget-a-face."},{"key":"e_1_3_2_1_18_1","unstructured":"BBC News. 2018. Police facial recognition 'needs considerable investment'. Website (access on 2019-03-12). https:\/\/www.bbc.com\/news\/uk-wales-46359789.  BBC News. 2018. Police facial recognition 'needs considerable investment'. Website (access on 2019-03-12). https:\/\/www.bbc.com\/news\/uk-wales-46359789."},{"key":"e_1_3_2_1_19_1","unstructured":"BBC News. 2018. Were Taylor Swift fans tracked at her gig? Website (access on 2019-03-12). https:\/\/www.bbc.com\/news\/technology-46567125.  BBC News. 2018. Were Taylor Swift fans tracked at her gig? Website (access on 2019-03-12). https:\/\/www.bbc.com\/news\/technology-46567125."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2014.09.002"},{"key":"e_1_3_2_1_21_1","volume-title":"Super-recognizers: People with extraordinary face recognition ability. Psychonomic bulletin & review 16, 2","author":"Russell Richard","year":"2009","unstructured":"Richard Russell , Brad Duchaine , and Ken Nakayama . 2009 . Super-recognizers: People with extraordinary face recognition ability. Psychonomic bulletin & review 16, 2 (2009), 252--257. Richard Russell, Brad Duchaine, and Ken Nakayama. 2009. Super-recognizers: People with extraordinary face recognition ability. Psychonomic bulletin & review 16, 2 (2009), 252--257."},{"key":"e_1_3_2_1_22_1","volume-title":"Face Recognition: A Novel Multi-Level Taxonomy based Survey. arXiv preprint arXiv:1901.00713","author":"Sepas-Moghaddam Alireza","year":"2019","unstructured":"Alireza Sepas-Moghaddam , Fernando Pereira , and Paulo Lobato Correia . 2019 . Face Recognition: A Novel Multi-Level Taxonomy based Survey. arXiv preprint arXiv:1901.00713 (2019). Alireza Sepas-Moghaddam, Fernando Pereira, and Paulo Lobato Correia. 2019. Face Recognition: A Novel Multi-Level Taxonomy based Survey. arXiv preprint arXiv:1901.00713 (2019)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1007-0214(11)70032-3"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:VISI.0000013087.49260.fb"},{"key":"e_1_3_2_1_25_1","first-page":"59","article-title":"The point-and-shoot camera faces its existential moment","volume":"10","author":"Wakabayashi Daisuke","year":"2013","unstructured":"Daisuke Wakabayashi . 2013 . The point-and-shoot camera faces its existential moment . Technology 10 (2013), 59 . Daisuke Wakabayashi. 2013. The point-and-shoot camera faces its existential moment. Technology 10 (2013), 59.","journal-title":"Technology"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/WACV.2016.7477452"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0969-4765(17)30153-4"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2015.03.015"},{"key":"e_1_3_2_1_29_1","first-page":"21","article-title":"Forensic face recognition as a means to determine strength of evidence: a survey. Forensic Sci","volume":"30","author":"Zeinstra CG","year":"2018","unstructured":"CG Zeinstra , D Meuwly , A Cc Ruifrok , R Nj Veldhuis , and LJ Spreeuwers . 2018 . Forensic face recognition as a means to determine strength of evidence: a survey. Forensic Sci . Rev 30 , 1 (2018), 21 -- 32 . CG Zeinstra, D Meuwly, A Cc Ruifrok, R Nj Veldhuis, and LJ Spreeuwers. 2018. Forensic face recognition as a means to determine strength of evidence: a survey. Forensic Sci. Rev 30, 1 (2018), 21--32.","journal-title":"Rev"}],"event":{"name":"ARES '19: 14th International Conference on Availability, Reliability and Security","acronym":"ARES '19","location":"Canterbury CA United Kingdom"},"container-title":["Proceedings of the 14th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3339252.3340107","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3339252.3340107","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:17Z","timestamp":1750203857000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3339252.3340107"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,26]]},"references-count":29,"alternative-id":["10.1145\/3339252.3340107","10.1145\/3339252"],"URL":"https:\/\/doi.org\/10.1145\/3339252.3340107","relation":{},"subject":[],"published":{"date-parts":[[2019,8,26]]},"assertion":[{"value":"2019-08-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}