{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T06:24:48Z","timestamp":1648794288920},"reference-count":32,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Fundamentals"],"published-print":{"date-parts":[[2011]]},"DOI":"10.1587\/transfun.e94.a.533","type":"journal-article","created":{"date-parts":[[2011,2,1]],"date-time":"2011-02-01T06:07:20Z","timestamp":1296540440000},"page":"533-541","source":"Crossref","is-referenced-by-count":1,"title":["Block-Based Bag of Words for Robust Face Recognition under Variant Conditions of Facial Expression, Illumination, and Partial Occlusion"],"prefix":"10.1587","volume":"E94-A","author":[{"given":"Zisheng","family":"LI","sequence":"first","affiliation":[{"name":"Department of Electronic Engineering, The University of Electro-Communications"}]},{"given":"Jun-ichi","family":"IMAI","sequence":"additional","affiliation":[{"name":"Department of Electronic Engineering, The University of Electro-Communications"}]},{"given":"Masahide","family":"KANEKO","sequence":"additional","affiliation":[{"name":"Department of Electronic Engineering, The University of Electro-Communications"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/34.41390"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/34.598228"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2002.804287"},{"key":"4","doi-asserted-by":"crossref","unstructured":"[4] T. Ahonen, A. Hadid, and M. Pietikainen, “Face recognition with local binary patterns,” Proc. 8th European Conference on Computer Vision, pp.469-481, Prague, Czech Republic, May 2004.","DOI":"10.1007\/978-3-540-24670-1_36"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/34.598235"},{"key":"6","unstructured":"[6] M. Bicego, A. Lagorio, E. Grosso, and M. Tistarclli, “On the use of SIFT features for face authentication,” Proc. 2006 Conference on Computer Vision and Pattern Recognition Workshop, pp.35-41, New York, USA, June 2006."},{"key":"7","doi-asserted-by":"crossref","unstructured":"[7] B. Heisele, P. Ho, J. Wu, and T. Poggio, “Face recognition: Component-based versus global approaches,” Comput. Vis. Image Understand., vol.91, no.1, pp.6-12, July 2003.","DOI":"10.1016\/S1077-3142(03)00073-0"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2007.904421"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2002.1008382"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2008.05.024"},{"key":"11","doi-asserted-by":"crossref","unstructured":"[11] X. Tan, S. Chen, Z. Zhou, and F. Zhang, “Recognizing partially occluded, expression variant faces from single training image per person with SOM and soft k-NN ensemble,” IEEE Trans. Neural Netw., vol.16, no.4, pp.875-886, July 2005.","DOI":"10.1109\/TNN.2005.849817"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2006.877435"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2002.1008383"},{"key":"14","unstructured":"[14] F. Li and P. Perona, “A Bayesian hierarchical model for learning natural scene categories,” Proc. 2005 Conference on Computer Vision and Pattern Recognition, vol.2, pp.524-531, San Diego, USA, June 2005."},{"key":"15","doi-asserted-by":"crossref","unstructured":"[15] D.G. Lowe, “Distinctive image features from scale-invariant keypoints,” Comput. Vis., vol.60, no.2, pp.91-110, Nov. 2004.","DOI":"10.1023\/B:VISI.0000029664.99615.94"},{"key":"16","unstructured":"[16] A.M. Martinez and R. Benavente, “The AR face database,” CVC Technical Report 24, 1998."},{"key":"17","unstructured":"[17] K. Messer, J. Matas, J. Kittler, J. Luettin, and G. Maitre, “XM2VTSDB: The extended m2vts database,” Proc. 1999 International Conference on Audio- and Video-Based Person Authentication, pp.72-77, Washington, D.C., USA, 1999."},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2008.79"},{"key":"19","doi-asserted-by":"crossref","unstructured":"[19] W. Zheng and X. Tang, “Fast algorithm for updating the discriminant vectors of dual-space LDA,” IEEE Trans. Information Forensics and Security, vol.4, no.3, pp.418-427, Sept. 2009.","DOI":"10.1109\/TIFS.2009.2025844"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.70708"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2008.05.028"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2008.05.023"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2008.174"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2004.840033"},{"key":"25","doi-asserted-by":"crossref","unstructured":"[25] J. Lin, J. Ming, and D. Crookes, “Robust face recognition using posterior union model based neural networks,” IET Computer Vision, vol.3, no.3, pp.130-142, Sept. 2009.","DOI":"10.1049\/iet-cvi.2008.0043"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2006.888925"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/34.667881"},{"key":"28","unstructured":"[28] G. Csurka, C.R. Dance, L. Fan, J. Willamowski, and C. Bray, “Visual categorization with bags of keypoints,” Proc. 2004 Workshop on Statistical Learning in Computer Vision, ECCV, pp.1-22, Czech Republic, May 2004."},{"key":"29","unstructured":"[29] L. Torres, “Is there any hope for face recognition?,” Proc. 5th International Workshop on Image Analysis for Multimedia Interactive Services, WIAMIS 2004, pp.21-23, Lisboa, Portugal, April 2004."},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1068\/p5027"},{"key":"31","doi-asserted-by":"crossref","unstructured":"[31] P. Sinha and T. Poggio, “I think I know that face …,” Nature, vol.384, pp.404-404, 1996.","DOI":"10.1038\/384404a0"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2005.188"}],"container-title":["IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.jstage.jst.go.jp\/article\/transfun\/E94.A\/2\/E94.A_2_533\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,26]],"date-time":"2021-04-26T05:46:40Z","timestamp":1619416000000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.jstage.jst.go.jp\/article\/transfun\/E94.A\/2\/E94.A_2_533\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"references-count":32,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2011]]}},"URL":"https:\/\/doi.org\/10.1587\/transfun.e94.a.533","relation":{},"ISSN":["0916-8508","1745-1337"],"issn-type":[{"value":"0916-8508","type":"print"},{"value":"1745-1337","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011]]}}}