{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:01:34Z","timestamp":1773615694705,"version":"3.50.1"},"reference-count":18,"publisher":"Allerton Press","issue":"1","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2021,1]]},"DOI":"10.3103\/s0146411621010090","type":"journal-article","created":{"date-parts":[[2021,3,22]],"date-time":"2021-03-22T07:03:03Z","timestamp":1616396583000},"page":"102-112","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":45,"title":["MTCNN and FACENET Based Access Control System for Face Detection and Recognition"],"prefix":"10.3103","volume":"55","author":[{"family":"Chunming Wu","sequence":"first","affiliation":[]},{"family":"Ying Zhang","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2021,3,22]]},"reference":[{"key":"7336_CR1","doi-asserted-by":"publisher","first-page":"732","DOI":"10.18287\/2412-6179-2017-41-5-732-742","volume":"41","author":"M.Y. Nikitin","year":"2017","unstructured":"Nikitin, M.Y., Konouchine, V.S., and Konouchine, A.S., Neural network model for video-based face recognition with frames quality assessment, Comput. Opt., 2017, vol. 41, no. 5, pp. 732\u2013742.","journal-title":"Comput. Opt."},{"key":"7336_CR2","doi-asserted-by":"crossref","unstructured":"Chen, Q., Yang, L., and Zhang, D., Face deduplication in video surveillance, Int. J. Pattern Recognit. Artif. Intell., 2018, vol. 32, no. 3.","DOI":"10.1142\/S0218001418560013"},{"key":"7336_CR3","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1023\/B:VISI.0000013087.49260.fb","volume":"57","author":"P. Viola","year":"2004","unstructured":"Viola, P. and Jones, M.J., Robust real-time face detection, Int. J. Comput. Vision, 2004, vol. 57, no. 2, pp. 137\u2013154.","journal-title":"Int. J. Comput. Vision"},{"key":"7336_CR4","doi-asserted-by":"crossref","unstructured":"MuthuKalyani, K. and VeeraMuthu, A., Smart application for AMS using face recognition, Comput. Sci. Eng.: Int. J., 2013, vol. 3, no. 5.","DOI":"10.5121\/cseij.2013.3502"},{"key":"7336_CR5","doi-asserted-by":"crossref","unstructured":"Sahani, M., Nanda, C., and Sahu, A.K., Web-based online embedded door access control and home security system based on face recognition, 2015 International Conference on Circuits, Power and Computing Technologies, 2015, pp. 1\u20136.","DOI":"10.1109\/ICCPCT.2015.7159473"},{"key":"7336_CR6","first-page":"29","volume":"44","author":"C. Peacock","year":"2004","unstructured":"Peacock, C., Goode, A., and Brett, A., Automatic forensic face recognition from digital images, Science Justice: \n               J. Forensic Sci. Soc., 2004, vol. 44, no. 1, pp. 29\u201334.","journal-title":"J. Forensic Sci. Soc."},{"key":"7336_CR7","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1109\/TIFS.2010.2103940","volume":"6","author":"H. Choi","year":"2011","unstructured":"Choi, H., Choi, K., and Kim, J., Fingerprint matching incorporating ridge features with minutiae, IEEE Trans. Inf. Forensics Secur., 2011, vol. 6, no. 2, pp. 338\u2013345.","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"7336_CR8","doi-asserted-by":"crossref","unstructured":"Erdem, C.E., Ulukaya, S., and Karaali, A., Combining Haar feature and skin color based classifiers for face detection, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2011, pp.\u00a01497\u20131500.","DOI":"10.1109\/ICASSP.2011.5946777"},{"key":"7336_CR9","unstructured":"Kumar, K.S., Semwal, V.B., and Tripathi, R.C., Real time face recognition using adaboost improved fast PCA algorithm, 2011. arXiv:1108.1353."},{"key":"7336_CR10","doi-asserted-by":"crossref","unstructured":"Tzimiropoulos, G. and Pantic, M., Gauss-Newton deformable part models for face alignment in-the-wild, Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2014, pp. 1851\u20131858.","DOI":"10.1109\/CVPR.2014.239"},{"key":"7336_CR11","doi-asserted-by":"crossref","unstructured":"Taigman, Y., Yang, M., and Ranzato, M.A., Deepface: Closing the gap to human-level performance in face verification, Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2014, pp. 1701\u20131708.","DOI":"10.1109\/CVPR.2014.220"},{"key":"7336_CR12","doi-asserted-by":"crossref","unstructured":"Sun, Y., Wang, X., and Tang, X., Deep learning face representation from predicting 10,000 classes, Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2014, pp. 1891\u20131898.","DOI":"10.1109\/CVPR.2014.244"},{"key":"7336_CR13","doi-asserted-by":"crossref","unstructured":"Parkhi, O.M., Vedaldi, A., and Zisserman, A., Deep face recognition, British Machine Vision Conference, 2015.","DOI":"10.5244\/C.29.41"},{"key":"7336_CR14","doi-asserted-by":"publisher","first-page":"1499","DOI":"10.1109\/LSP.2016.2603342","volume":"23","author":"K. Zhang","year":"2016","unstructured":"Zhang, K., Zhang, Z., and Li, Z., Joint face detection and alignment using multitask cascaded convolutional networks, IEEE Signal Process. Lett., 2016, vol. 23, no. 10, pp. 1499\u20131503.","journal-title":"IEEE Signal Process. Lett."},{"key":"7336_CR15","doi-asserted-by":"crossref","unstructured":"Schroff, F., Kalenichenko, D., and Philbin, J., Facenet: A unified embedding for face recognition and clustering, Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2015, pp. 815\u2013823.","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"7336_CR16","doi-asserted-by":"crossref","unstructured":"Deng, J., Guo, J., and Xue, N., Arcface: Additive angular margin loss for deep face recognition, Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019, pp. 4690\u20134699.","DOI":"10.1109\/CVPR.2019.00482"},{"key":"7336_CR17","doi-asserted-by":"crossref","unstructured":"Neubeck, A. and Van, G.L., Efficient non-maximum suppression, 18th International Conference on Pattern Recognition, 2006, vol. 3, pp. 850\u2013855.","DOI":"10.1109\/ICPR.2006.479"},{"key":"7336_CR18","unstructured":"Kingma, D.P. and Ba, J., Adam: A method for stochastic optimization, 2014. arXiv:1412.6980."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411621010090.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411621010090","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411621010090.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:03:24Z","timestamp":1773612204000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411621010090"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1]]},"references-count":18,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["7336"],"URL":"https:\/\/doi.org\/10.3103\/s0146411621010090","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1]]},"assertion":[{"value":"29 March 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 June 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 July 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 March 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare no conflict of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}