{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:24:10Z","timestamp":1750220650136,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,11,20]],"date-time":"2020-11-20T00:00:00Z","timestamp":1605830400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,11,20]]},"DOI":"10.1145\/3437120.3437275","type":"proceedings-article","created":{"date-parts":[[2021,3,4]],"date-time":"2021-03-04T22:12:01Z","timestamp":1614895921000},"page":"57-60","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["On the Effectiveness of Low-Cost Face Recognition with Deep Learning"],"prefix":"10.1145","author":[{"given":"Theodoros","family":"Georgakopoulos","sequence":"first","affiliation":[{"name":"University of Patras, Greece"}]},{"given":"Maria","family":"Koutroumani","sequence":"additional","affiliation":[{"name":"University of Patras, Greece"}]},{"given":"Theodoros","family":"Moulias","sequence":"additional","affiliation":[{"name":"University of Patras, Greece"}]},{"given":"Christos","family":"Fidas","sequence":"additional","affiliation":[{"name":"University of Patras, Greece"}]}],"member":"320","published-online":{"date-parts":[[2021,3,4]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"129","article-title":"A Novel Face Recognition Approach Based on Genetic Algorithm Optimization","author":"Mourad MOUSSA","year":"2018","unstructured":"M. H. &. A. D. Mourad MOUSSA , \" A Novel Face Recognition Approach Based on Genetic Algorithm Optimization ,\" Studies in Informatics and Control , pp. 129 - 131 , March 2018 . M. H. &. A. D. Mourad MOUSSA, \"A Novel Face Recognition Approach Based on Genetic Algorithm Optimization,\" Studies in Informatics and Control, pp. 129-131, March 2018.","journal-title":"Studies in Informatics and Control"},{"key":"e_1_3_2_1_2_1","first-page":"160","article-title":"A Review of Person Recognition Based on Face Model","author":"Shakir F.","year":"2018","unstructured":"Shakir F. Kak , Firas Mahmood Mustafa &. Pedro Valente \" A Review of Person Recognition Based on Face Model ,\" Eurasian Journal of Science & Engineering , pp. 160 - 162 , 21 June 2018 . Shakir F. Kak, Firas Mahmood Mustafa &. Pedro Valente \"A Review of Person Recognition Based on Face Model,\" Eurasian Journal of Science & Engineering , pp. 160-162, 21 June 2018.","journal-title":"Eurasian Journal of Science & Engineering"},{"key":"e_1_3_2_1_3_1","first-page":"630","article-title":"Face Recognition Techniques: A Survey","author":"Ranganatha S","year":"2015","unstructured":"Ranganatha S & Dr . Y P Gowramma , \" Face Recognition Techniques: A Survey \" International Journal for Research in Applied Science & Engineering , pp. 630 - 631 , April 2015 . Ranganatha S & Dr.Y P Gowramma, \"Face Recognition Techniques: A Survey\" International Journal for Research in Applied Science & Engineering, pp. 630-631, April 2015.","journal-title":"International Journal for Research in Applied Science & Engineering"},{"key":"e_1_3_2_1_4_1","volume-title":"International Conference on Electrical, Communication and Computer Engineering (ICECCE)","author":"Maheen Zulfiqar","year":"2019","unstructured":"Maheen Zulfiqar , Fatima Syed, Muhammad Jaleed Khan & Khurram Khurshid \"Deep Face Recognition for Biometric Authentication,\" in st International Conference on Electrical, Communication and Computer Engineering (ICECCE) , Swat, Pakistan , 2019 . Maheen Zulfiqar, Fatima Syed, Muhammad Jaleed Khan & Khurram Khurshid \"Deep Face Recognition for Biometric Authentication,\" in st International Conference on Electrical, Communication and Computer Engineering (ICECCE) , Swat, Pakistan , 2019."},{"key":"e_1_3_2_1_5_1","first-page":"130","article-title":"An Analysis of the Viola-Jones Face Detection Algorithm","author":"Yi-Qing Wang","year":"2014","unstructured":"Yi-Qing Wang , \" An Analysis of the Viola-Jones Face Detection Algorithm ,\" Image Processing On Line , pp. 130 - 135 , 26 June 2014 . Yi-Qing Wang, \"An Analysis of the Viola-Jones Face Detection Algorithm,\" Image Processing On Line , pp. 130-135, 26 June 2014.","journal-title":"Image Processing On Line"},{"key":"e_1_3_2_1_6_1","unstructured":"E.Hjelmas & Jorn Wroldsen \"Recognizing Faces from the Eyes Only \" in Proceedings of the 11th Scandinavian Conference on Image Analysis 1999.  E.Hjelmas & Jorn Wroldsen \"Recognizing Faces from the Eyes Only \" in Proceedings of the 11th Scandinavian Conference on Image Analysis 1999."},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the National Academy of Sciences of the United State of America","author":"Matthew F.","year":"2012","unstructured":"Matthew F. Peterson & Miguel P. Eckstein , \u201cLooking just below the eyes is optimal across face recognition tasks \u201d, in Proceedings of the National Academy of Sciences of the United State of America , 2012 . Matthew F. Peterson & Miguel P. Eckstein, \u201cLooking just below the eyes is optimal across face recognition tasks\u201d, in Proceedings of the National Academy of Sciences of the United State of America, 2012."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2009.10.008"},{"key":"e_1_3_2_1_9_1","first-page":"235","article-title":"Liveness detection for embedded face recognition system","author":"Jee S. U.","year":"2006","unstructured":"H. K. Jee , S. U. Jung & J. H. Yoo , \" Liveness detection for embedded face recognition system ,\" International Journal of Biological and Medical Sciences , pp. 235 - 238 , 2006 . H. K. Jee, S. U. Jung & J. H. Yoo, \" Liveness detection for embedded face recognition system,\" International Journal of Biological and Medical Sciences, pp. 235-238, 2006.","journal-title":"International Journal of Biological and Medical Sciences"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Wei Bao Hong Li Nan Li & Wei Jiang \"A liveness detection method for face recognition based on \" in Image Analysis and Signal Processing 2009.  Wei Bao Hong Li Nan Li & Wei Jiang \"A liveness detection method for face recognition based on \" in Image Analysis and Signal Processing 2009.","DOI":"10.1109\/IASP.2009.5054589"},{"key":"e_1_3_2_1_11_1","first-page":"236","article-title":"Liveness Detection for Face Recognition","author":"Gang Pan","year":"2008","unstructured":"Gang Pan , Zhaohui Wu and Lin Sun , \" Liveness Detection for Face Recognition ,\" Recent Advances in Face Recognition , p. 236 , December 2008 . Gang Pan, Zhaohui Wu and Lin Sun, \" Liveness Detection for Face Recognition,\" Recent Advances in Face Recognition, p. 236, December 2008.","journal-title":"Recent Advances in Face Recognition"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.902037"},{"key":"e_1_3_2_1_13_1","unstructured":"FindBiometrics Facial recognition [Online] Available at: http:\/\/findbiometrics.com\/solutions\/facial-recognition\/  FindBiometrics Facial recognition [Online] Available at: http:\/\/findbiometrics.com\/solutions\/facial-recognition\/"},{"key":"e_1_3_2_1_14_1","unstructured":"Bradski G. 2000. The OpenCV Library. Dr. Dobb's Journal of Software Tools.  Bradski G. 2000. The OpenCV Library. Dr. Dobb's Journal of Software Tools."},{"key":"e_1_3_2_1_15_1","unstructured":"Labeled Faces in the Wild [online] Available at: http:\/\/vis-www.cs.umass.edu\/lfw\/  Labeled Faces in the Wild [online] Available at: http:\/\/vis-www.cs.umass.edu\/lfw\/"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.598235"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/938978.939174"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.531802"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2002.999679"},{"key":"e_1_3_2_1_20_1","volume-title":"Face Recognition Software: Best-in-Class Enterprise Facial Recognition Security Platform. [online] Available at: https:\/\/www.facefirst.com\/","author":"FaceFirst Face Recognition","year":"2019","unstructured":"FaceFirst Face Recognition Software. ( 2019 ). Face Recognition Software: Best-in-Class Enterprise Facial Recognition Security Platform. [online] Available at: https:\/\/www.facefirst.com\/ . FaceFirst Face Recognition Software. (2019). Face Recognition Software: Best-in-Class Enterprise Facial Recognition Security Platform. [online] Available at: https:\/\/www.facefirst.com\/."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/1577069.1755843"},{"key":"e_1_3_2_1_22_1","volume-title":"Deep Learning, and OpenCV. [online] PyImageSearch. Available at: https:\/\/www.pyimagesearch.com\/ [Accessed","author":"Rosebrock A.","year":"2020","unstructured":"Rosebrock , A. PyImageSearch - You can master Computer Vision , Deep Learning, and OpenCV. [online] PyImageSearch. Available at: https:\/\/www.pyimagesearch.com\/ [Accessed 18 Mar. 2020 ]. Rosebrock, A. PyImageSearch - You can master Computer Vision, Deep Learning, and OpenCV. [online] PyImageSearch. Available at: https:\/\/www.pyimagesearch.com\/ [Accessed 18 Mar. 2020]."},{"key":"e_1_3_2_1_23_1","first-page":"10","volume-title":"CVPR 2001","author":"Viola M.","year":"2001","unstructured":"P. Viola and M. Jones , \" Rapid object detection using a boosted cascade of simple features,\" Proceedings of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition . CVPR 2001 , Kauai, HI, USA , 2001 , pp. I-I, doi: 10 .1109\/CVPR.2001.990517. 10.1109\/CVPR.2001.990517 P. Viola and M. Jones, \"Rapid object detection using a boosted cascade of simple features,\" Proceedings of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. CVPR 2001, Kauai, HI, USA, 2001, pp. I-I, doi: 10.1109\/CVPR.2001.990517."},{"key":"e_1_3_2_1_24_1","first-page":"586","volume-title":"1991 IEEE Computer Society Conference on Computer Vision and Pattern Recognition","author":"Turk A. P.","year":"1991","unstructured":"M. A. Turk and A. P. Pentland , \" Face recognition using eigenfaces,\" Proceedings . 1991 IEEE Computer Society Conference on Computer Vision and Pattern Recognition , Maui, HI, USA , 1991 , pp. 586 - 591 , doi: 10.1109\/CVPR.1991.139758. 10.1109\/CVPR.1991.139758 M. A. Turk and A. P. Pentland, \"Face recognition using eigenfaces,\" Proceedings. 1991 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, Maui, HI, USA, 1991, pp. 586-591, doi: 10.1109\/CVPR.1991.139758."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.1999.758046"},{"key":"e_1_3_2_1_26_1","volume-title":"IEEE","author":"Tsapatsoulis","year":"1998","unstructured":"Tsapatsoulis , Nicolas, Vassilios Alexopoulos , and Stefanos Kollias. \" A vector based approximation of KLT and its application to face recognition.\" 9th European Signal Processing Conference (EUSIPCO 1998) . IEEE , 1998 . Tsapatsoulis, Nicolas, Vassilios Alexopoulos, and Stefanos Kollias. \"A vector based approximation of KLT and its application to face recognition.\" 9th European Signal Processing Conference (EUSIPCO 1998). IEEE, 1998."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2005.02.001"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2002.806629"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-5225-5204-8.ch092"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702613.2732748"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2212776.2223660"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29384-0_19"},{"key":"e_1_3_2_1_33_1","volume-title":"A personalized user authentication approach based on individual differences in information processing. Interacting with Computers, 27(6)","author":"Belk M.","year":"2015","unstructured":"Belk , M. , Fidas , C. , Germanakos , P. , & Samaras , G. ( 2015 ). A personalized user authentication approach based on individual differences in information processing. Interacting with Computers, 27(6) , Oxford University Press , 706-723, doi: 10.1093\/iwc\/iwu033 10.1093\/iwc Belk, M., Fidas, C., Germanakos, P., & Samaras, G. (2015). A personalized user authentication approach based on individual differences in information processing. Interacting with Computers, 27(6), Oxford University Press, 706-723, doi: 10.1093\/iwc\/iwu033"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3320435.3320474"}],"event":{"name":"PCI 2020: 24th Pan-Hellenic Conference on Informatics","acronym":"PCI 2020","location":"Athens Greece"},"container-title":["24th Pan-Hellenic Conference on Informatics"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3437120.3437275","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3437120.3437275","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:21Z","timestamp":1750197741000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3437120.3437275"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,20]]},"references-count":34,"alternative-id":["10.1145\/3437120.3437275","10.1145\/3437120"],"URL":"https:\/\/doi.org\/10.1145\/3437120.3437275","relation":{},"subject":[],"published":{"date-parts":[[2020,11,20]]},"assertion":[{"value":"2021-03-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}