{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T07:45:03Z","timestamp":1777016703064,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,12,17]]},"DOI":"10.1145\/3799830.3799867","type":"proceedings-article","created":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T06:45:08Z","timestamp":1777013108000},"page":"208-214","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Sketch-Based Real-Time Criminal Identification with Vector Similarity Search"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-9493-1525","authenticated-orcid":false,"given":"Aryan Gurunath","family":"Gaddadavara","sequence":"first","affiliation":[{"name":"Computer Engineering, Bharati Vidyapeeth College of Engineering, Navi Mumbai, Maharashtra, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3712-2218","authenticated-orcid":false,"given":"Vijaylaxmi","family":"Bittal","sequence":"additional","affiliation":[{"name":"Computer Engineering, Bharati Vidyapeeth College of Engineering, Navi Mumbai, Maharashtra, India"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-7053-7454","authenticated-orcid":false,"given":"Rohit Sudhir","family":"More","sequence":"additional","affiliation":[{"name":"Computer Engineering, Bharati Vidyapeeth College of Engineering, Navi Mumbai, Maharashtra, India"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-3638-7556","authenticated-orcid":false,"given":"Manav Naresh","family":"Patil","sequence":"additional","affiliation":[{"name":"Computer Engineering, Bharati Vidyapeeth College of Engineering, Navi Mumbai, Maharashtra, India"}]}],"member":"320","published-online":{"date-parts":[[2026,4,23]]},"reference":[{"key":"e_1_3_3_2_1_2","doi-asserted-by":"publisher","unstructured":"Akshay Bharadwaj KH Deepak V Ghanavanth Harish Bharadwaj R R Uma and Gowranga Krishnamurthy. 2018. Smart CCTV Surveillance System for Intrusion Detection With Live Streaming. In 2018 3rd IEEE International Conference on Recent Trends in Electronics Information Communication Technology (RTEICT). 1030\u20131035. doi:10.1109\/RTEICT42901.2018.9012234","DOI":"10.1109\/RTEICT42901.2018.9012234"},{"key":"e_1_3_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICICCS56967.2023.10142759"},{"key":"e_1_3_3_2_3_2","volume-title":"Learning OpenCV: Computer Vision with the OpenCV Library","author":"Bradski Gary","unstructured":"Gary Bradski and Adrian Kaehler. 2008. Learning OpenCV: Computer Vision with the OpenCV Library. O'Reilly Media. https:\/\/www.oreilly.com\/library\/view\/ learning-opencv\/9780596516130\/"},{"key":"e_1_3_3_2_4_2","volume-title":"Design of Automatic Colouring of Sketch Images Based on Deep Learning Algorithm. In 2024 5th International Conference on Information Science, Parallel and Distributed Systems (ISPDS). 438\u2013441","author":"Chen Lian","year":"2024","unstructured":"Lian Chen and Chengjun Zhou. 2024. Design of Automatic Colouring of Sketch Images Based on Deep Learning Algorithm. In 2024 5th International Conference on Information Science, Parallel and Distributed Systems (ISPDS). 438\u2013441. doi:10. 1109\/ISPDS62779.2024.10667624"},{"key":"e_1_3_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00482"},{"key":"e_1_3_3_2_6_2","volume-title":"Annual Report","author":"FBI.","year":"2020","unstructured":"FBI. 2020. Criminal Justice Information Services (CJIS) Annual Report 2020. FBI Report (2020). https:\/\/www.eff.org\/document\/fbi-criminal-justice-information services-2016-annual-report"},{"key":"e_1_3_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2788002"},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.632"},{"key":"e_1_3_3_2_9_2","doi-asserted-by":"publisher","unstructured":"Pranav V Jambur and Smruthi S Kadagadkai. 2024. Investigating the Efficacy of Forensic Facial Reconstructions: A Dual Approach Using Sketches and CCTV Images. In 2024 IEEE 3rd International Conference on Data Decision and Systems (ICDDS). 1\u20136. doi:10.1109\/ICDDS62937.2024.10910684","DOI":"10.1109\/ICDDS62937.2024.10910684"},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2019.2921572"},{"key":"e_1_3_3_2_11_2","volume-title":"Face Recognition Vendor Test (FRVT) 2018 Report. NIST Report","author":"NIST.","year":"2018","unstructured":"NIST. 2018. Face Recognition Vendor Test (FRVT) 2018 Report. NIST Report (2018)."},{"key":"e_1_3_3_2_12_2","volume-title":"Forensic Sketching in Criminal Investigations: Practices and Challenges. NIJ Special Report","author":"National Institute of Justice. 2017.","year":"2017","unstructured":"National Institute of Justice. 2017. Forensic Sketching in Criminal Investigations: Practices and Challenges. NIJ Special Report (2017). https:\/\/nij.ojp.gov\/library\/publications\/forensic-sketching-criminal investigations-practices-and-challenges"},{"key":"e_1_3_3_2_13_2","volume-title":"Face Generation and Recognition in Forensic Science. In 2024 11th International Conference on Advances in Computing and Communications (ICACC). 1\u20134. doi:10","author":"Ravi Gayathri","year":"2024","unstructured":"Gayathri Ravi, Heynes Joy, Jeffin Jitto, Jocelyn Joshy, and Jisha Mary Jose. 2024. Face Generation and Recognition in Forensic Science. In 2024 11th International Conference on Advances in Computing and Communications (ICACC). 1\u20134. doi:10. 1109\/ICACC63692.2024.10845604"},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.91"},{"key":"e_1_3_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/AIDE64228.2025.10987486"},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"e_1_3_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICTBIG59752.2023.10455990"},{"key":"e_1_3_3_2_18_2","volume-title":"Impact of Identification Delays in Criminal Investigations. Journal of Applied Criminology","year":"2019","unstructured":"Smith. 2019. Impact of Identification Delays in Criminal Investigations. Journal of Applied Criminology (2019)."},{"key":"e_1_3_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.23919\/INDIACom61295.2024.10498210"},{"key":"e_1_3_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.forsciint.2016.05.024"}],"event":{"name":"CODS 2025: 13th ACM IKDD International Conference on Data Science","location":"Pune India","acronym":"CODS 2025"},"container-title":["Proceedings of the 13th ACM IKDD International Conference on Data Science"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3799830.3799867","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T07:14:09Z","timestamp":1777014849000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3799830.3799867"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,17]]},"references-count":20,"alternative-id":["10.1145\/3799830.3799867","10.1145\/3799830"],"URL":"https:\/\/doi.org\/10.1145\/3799830.3799867","relation":{},"subject":[],"published":{"date-parts":[[2025,12,17]]},"assertion":[{"value":"2026-04-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}