<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1665-6423</journal-id>
<journal-title><![CDATA[Journal of applied research and technology]]></journal-title>
<abbrev-journal-title><![CDATA[J. appl. res. technol]]></abbrev-journal-title>
<issn>1665-6423</issn>
<publisher>
<publisher-name><![CDATA[Universidad Nacional Autónoma de México, Instituto de Ciencias Aplicadas y Tecnología]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1665-64232012000400012</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[Enhanced and Fast Face Recognition by Hashing Algorithm]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Sharif]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<xref ref-type="aff" rid="A01"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Ayub]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<xref ref-type="aff" rid="A01"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Sattar]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<xref ref-type="aff" rid="A01"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Raza]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<xref ref-type="aff" rid="A01"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Mohsin]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<xref ref-type="aff" rid="A01"/>
</contrib>
</contrib-group>
<aff id="A01">
<institution><![CDATA[,COMSATS Institute of Information Technology Department of Computer Science ]]></institution>
<addr-line><![CDATA[Wah Cantt ]]></addr-line>
<country>Pakistan</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>08</month>
<year>2012</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>08</month>
<year>2012</year>
</pub-date>
<volume>10</volume>
<numero>4</numero>
<fpage>607</fpage>
<lpage>617</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1665-64232012000400012&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1665-64232012000400012&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1665-64232012000400012&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[This paper presents a face hashing technique for fast face recognition. The proposed technique employs the two existing algorithms, i.e., 2-D discrete cosine transformation and K-means clustering. The image has to go through different pre-processing phases and the two above-mentioned algorithms must be used in order to obtain the hash value of the face image. The searching process is increased by introducing a modified form of binary search. A new database architecture called Facebases has also been introduced to further speedup the searching process.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[DCT]]></kwd>
<kwd lng="en"><![CDATA[K-means]]></kwd>
<kwd lng="en"><![CDATA[Facebases]]></kwd>
<kwd lng="en"><![CDATA[database]]></kwd>
<kwd lng="en"><![CDATA[hashing]]></kwd>
<kwd lng="en"><![CDATA[recognition]]></kwd>
</kwd-group>
</article-meta>
</front><body><![CDATA[ <p align="center"><font face="verdana" size="4"><b>Enhanced and Fast Face Recognition by Hashing Algorithm</b></font></p>              <p align="center"><font face="verdana" size="2">&nbsp;</font></p>              <p align="center"><font face="verdana" size="2"><b>M. Sharif*, K. Ayub, D. Sattar, M. Raza, S. Mohsin</b></font></p>              <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>              <p align="justify"><font face="verdana" size="2"><i>Department of Computer Science, COMSATS Institute of Information Technology Wah Cantt Pakistan.</i> *<a href="mailto:muhammadsharifmalik@yahoo.com">muhammadsharifmalik@yahoo.com</a>.</font></p>              <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>              <p align="justify"><font face="verdana" size="2"><b>ABSTRACT</b></font></p>              <p align="justify"><font face="verdana" size="2">This paper presents a face hashing technique for fast face recognition. The proposed technique employs the two existing algorithms, i.e., 2&#45;D discrete cosine transformation and K&#45;means clustering. The image has to go through different pre&#45;processing phases and the two above&#45;mentioned algorithms must be used in order to obtain the hash value of the face image. The searching process is increased by introducing a modified form of binary search. A new database architecture called <i>Facebases</i> has also been introduced to further speedup the searching process.</font></p>              <p align="justify"><font face="verdana" size="2"><b>Keywords:</b> DCT, K&#45;means, Facebases, database, hashing, recognition.</font></p>              <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>              ]]></body>
<body><![CDATA[<p align="justify"><font face="verdana" size="2"><a href="/pdf/jart/v10n4/v10n4a12.pdf" target="_blank">DESCARGAR ART&Iacute;CULO EN FORMATO PDF</a></font></p>              <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>              <p align="justify"><font face="verdana" size="2"><i><b>References</b></i></font></p>              <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;1&#93; R. Chellappa, C.L. Wilson, and S. Sirohey, "Human and machine recognition of faces: A survey," Proc. IEEE, vol. 83, pp. 705&#45;740, 1995.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4831374&pid=S1665-6423201200040001200001&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>              <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;2&#93; H. Wechsler, P. Phillips, V. Bruce, F. Soulie, and T. Huang, Face Recognition: From Theoryto Applications, Springer&#45;Verlag, 1996.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4831376&pid=S1665-6423201200040001200002&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>              <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;3&#93; W. Zhao, R. Chellappa, A. Rosenfeld, and P. J. Phillips, "Face recognition: A literature survey", CVL Technical Report, University of Maryland, 2000.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4831378&pid=S1665-6423201200040001200003&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>              <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;4&#93; S. Gong, S.J. McKenna, and A. Psarrou, Dynamic Vision: from Images to Face Recognition, Imperial College Press and World Scientific Publishing, 2000.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4831380&pid=S1665-6423201200040001200004&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>              <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;5&#93; Noor Zaman, Abnan Alam Khan, Mansoor uz Zafar Dawood, Abdul Aziz, " Face Recognition Techniques (FRT) based on Face ratio under controlled conditions", IEEE Proceeding of International Symposium on Biometrics &amp; Security Techniques 2008. PP 3&#45;8.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4831382&pid=S1665-6423201200040001200005&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>              <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;6&#93; V.V. Starovoitov, D.I Samal, D.V. Briliuk, "Three Approaches For Face Recognition", The 6&#45;th International Conference on Pattern Recognition and Image Analysis October 21&#45;26, 2002, Velikiy Novgorod, Russia, pp. 707&#45;711.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4831384&pid=S1665-6423201200040001200006&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>              <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;7&#93; Feng Yang and Adam Krzyzak,"Face Recognition under Significant Pose Variation", Canadian Conference (IEEE), Electrical and Computer Engineering, 2007. CCECE 2007 page(s): 1313&#45;1316.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4831386&pid=S1665-6423201200040001200007&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>              <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;8&#93; K.&#45;H. Cheung, A. Kong, D. Zhang, M. Kamel and J. You. Revealing the secret of Face Hashing in Intl. Conf. on Biometrics, volume 3832 of LNCS, pages 106&#45;112, 2006.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4831388&pid=S1665-6423201200040001200008&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>              <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;9&#93; Carlos Gomez&#45;Rodriguez, David Weir, John Carroll, "Parsing mildly non&#45;projective dependency structures", Cognitive science research papers, US university of Sussex.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4831390&pid=S1665-6423201200040001200009&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>              <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;10&#93; Trevor Darrell, Neal Checka, Alice Oh and Louis Phillipe Morency, "Exploring Vision Based Interfaces: How to use Your head in Dual Pointing Tasks", Al Memo 2002&#45;001 January 2002.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4831392&pid=S1665-6423201200040001200010&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>              <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;11&#93; Junwen Wu; Trivedi, M.M, "A Binary Tree for Probability Learning in Eye Detection", Computer Vision and Pattern Recognition, 2005 IEEE Computer Society Conference on 25&#45;25 June 2005 Page(s): 170 &#45; 170.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4831394&pid=S1665-6423201200040001200011&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>              <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;12&#93; Moisture Discriminating optics, "Real world advantages of Moisture Discriminating optics in live scan digital finger print imaging", issued October 23, 2002 identix incorporated.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4831396&pid=S1665-6423201200040001200012&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>              <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;13&#93; Qinfeng Shi, Hanxi Li, Chunhua Shen, Rapid Face Recognition Using Hashing, In IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 10), San Francisco, USA, June 13-18, 2010.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4831398&pid=S1665-6423201200040001200013&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>              <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;14&#93; Jain, A.K. Fundamentals of Digital Image Processing, Englewood Cliffs, NJ: Prentice&#45;Hall, 1989.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4831400&pid=S1665-6423201200040001200014&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>              <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;15&#93; Pennebaker, W.B., and J.L. Mitchell. JPEG Still Image Data Compression Standard, New York, NY: Van Nostrand Reinhold, 1993. Chapter 4.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4831402&pid=S1665-6423201200040001200015&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>              <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;16&#93; Hartigan, J. A. (1975). Clustering Algorithms. Wiley. MR0405726. ISBN 0&#45;471&#45;35645&#45;X.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4831404&pid=S1665-6423201200040001200016&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>              <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;17&#93; "AT &amp; T "The Database of Faces" (formerly "The ORL Database of Faces")".    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4831406&pid=S1665-6423201200040001200017&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>              <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;18&#93; P.S. Hiremath and Prabhakar C.J.," Face Recognition Technique Using Symbolic Linear Discriminant Analysis Method", P. Kalra and S. Peleg (Eds.): ICVGIP 2006, LNCS 4338, pp. 641 &#45; 649, 2006.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4831408&pid=S1665-6423201200040001200018&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>              <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;19&#93; The&nbsp;Yale&nbsp;Face Database, <a href="http://cvc.yale.edu/projects/yalefaces/yalefaces.html" target="_blank">http://cvc.yale.edu/projects/yalefaces/yalefaces.html</a>, Last visited on 28th July, 2009.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4831410&pid=S1665-6423201200040001200019&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>              <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;20&#93; David C. L. Ngo, Andrew B. J. Teoh and Alwyn Goh , "Eigenspace&#45;Based Face Hashing.", Biometric Authentication, First International Conference, ICBA 2004, Hong Kong, China, July 15&#45;17, 2004, Proceedings 2004.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4831412&pid=S1665-6423201200040001200020&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>              <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;21&#93; Ngo, D.C.L.; Teoh, A.B.J.;&nbsp;Goh, A., "Biometric Hash: High&#45;Confidence Face&nbsp;Recognition" IEEE Transactions on Circuits and&nbsp;Systems for Video Technology, June 2006, Volume:&nbsp;16 Issue: 6, page(s): 771 &#45; 775.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4831414&pid=S1665-6423201200040001200021&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>       ]]></body><back>
<ref-list>
<ref id="B1">
<label>1</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chellappa]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Wilson]]></surname>
<given-names><![CDATA[C.L.]]></given-names>
</name>
<name>
<surname><![CDATA[Sirohey]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Human and machine recognition of faces: A survey]]></article-title>
<source><![CDATA[Proc. IEEE]]></source>
<year>1995</year>
<volume>83</volume>
<page-range>705-740</page-range></nlm-citation>
</ref>
<ref id="B2">
<label>2</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wechsler]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Phillips]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Bruce]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Soulie]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Huang]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<source><![CDATA[Face Recognition: From Theoryto Applications]]></source>
<year>1996</year>
<publisher-name><![CDATA[Springer-Verlag]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B3">
<label>3</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zhao]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Chellappa]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Rosenfeld]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Phillips]]></surname>
<given-names><![CDATA[P. J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Face recognition: A literature survey]]></source>
<year>2000</year>
<publisher-name><![CDATA[University of Maryland]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B4">
<label>4</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gong]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[McKenna]]></surname>
<given-names><![CDATA[S.J.]]></given-names>
</name>
<name>
<surname><![CDATA[Psarrou]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Dynamic Vision: from Images to Face Recognition]]></source>
<year>2000</year>
<publisher-name><![CDATA[Imperial College PressWorld Scientific Publishing]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B5">
<label>5</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zaman]]></surname>
<given-names><![CDATA[Noor]]></given-names>
</name>
<name>
<surname><![CDATA[Khan]]></surname>
<given-names><![CDATA[Abnan Alam]]></given-names>
</name>
<name>
<surname><![CDATA[uz Zafar Dawood]]></surname>
<given-names><![CDATA[Mansoor]]></given-names>
</name>
<name>
<surname><![CDATA[Aziz]]></surname>
<given-names><![CDATA[Abdul]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Face Recognition Techniques (FRT) based on Face ratio under controlled conditions]]></article-title>
<source><![CDATA[IEEE Proceeding of International Symposium on Biometrics & Security Techniques]]></source>
<year>2008</year>
<page-range>3-8</page-range></nlm-citation>
</ref>
<ref id="B6">
<label>6</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Starovoitov]]></surname>
<given-names><![CDATA[V.V.]]></given-names>
</name>
<name>
<surname><![CDATA[Samal]]></surname>
<given-names><![CDATA[D.I]]></given-names>
</name>
<name>
<surname><![CDATA[Briliuk]]></surname>
<given-names><![CDATA[D.V.]]></given-names>
</name>
</person-group>
<source><![CDATA[Three Approaches For Face Recognition]]></source>
<year></year>
<conf-name><![CDATA[ The 6-th International Conference on Pattern Recognition and Image Analysis October 21-26]]></conf-name>
<conf-date>2002</conf-date>
<conf-loc>Velikiy Novgorod </conf-loc>
<page-range>707-711</page-range></nlm-citation>
</ref>
<ref id="B7">
<label>7</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[Feng]]></given-names>
</name>
<name>
<surname><![CDATA[Krzyzak]]></surname>
<given-names><![CDATA[Adam]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Face Recognition under Significant Pose Variation]]></article-title>
<source><![CDATA[Canadian Conference (IEEE), Electrical and Computer Engineering]]></source>
<year>2007</year>
<page-range>1313-1316</page-range><publisher-name><![CDATA[CCECE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B8">
<label>8</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cheung]]></surname>
<given-names><![CDATA[K.-H.]]></given-names>
</name>
<name>
<surname><![CDATA[Kong]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Kamel]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[You]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Revealing the secret of Face Hashing in Intl. Conf. on Biometrics]]></source>
<year>2006</year>
<volume>3832</volume>
<page-range>106-112</page-range></nlm-citation>
</ref>
<ref id="B9">
<label>9</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gomez-Rodriguez]]></surname>
<given-names><![CDATA[Carlos]]></given-names>
</name>
<name>
<surname><![CDATA[Weir]]></surname>
<given-names><![CDATA[David]]></given-names>
</name>
<name>
<surname><![CDATA[Carroll]]></surname>
<given-names><![CDATA[John]]></given-names>
</name>
</person-group>
<source><![CDATA[Parsing mildly non-projective dependency structures]]></source>
<year></year>
<publisher-name><![CDATA[US university of Sussex]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B10">
<label>10</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Darrell]]></surname>
<given-names><![CDATA[Trevor]]></given-names>
</name>
<name>
<surname><![CDATA[Checka]]></surname>
<given-names><![CDATA[Neal]]></given-names>
</name>
<name>
<surname><![CDATA[Oh]]></surname>
<given-names><![CDATA[Alice]]></given-names>
</name>
<name>
<surname><![CDATA[Morency]]></surname>
<given-names><![CDATA[Louis Phillipe]]></given-names>
</name>
</person-group>
<source><![CDATA[Exploring Vision Based Interfaces: How to use Your head in Dual Pointing Tasks]]></source>
<year>Janu</year>
<month>ar</month>
<day>y </day>
</nlm-citation>
</ref>
<ref id="B11">
<label>11</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Junwen]]></surname>
<given-names><![CDATA[Wu]]></given-names>
</name>
<name>
<surname><![CDATA[Trivedi]]></surname>
<given-names><![CDATA[M.M]]></given-names>
</name>
</person-group>
<source><![CDATA["A Binary Tree for Probability Learning in Eye Detection", Computer Vision and Pattern Recognition, 2005 IEEE Computer Society Conference on 25-25 June 2005]]></source>
<year></year>
<page-range>170 - 170</page-range></nlm-citation>
</ref>
<ref id="B12">
<label>12</label><nlm-citation citation-type="">
<collab>Moisture Discriminating optics</collab>
<source><![CDATA[Real world advantages of Moisture Discriminating optics in live scan digital finger print imaging]]></source>
<year>Octo</year>
<month>be</month>
<day>r </day>
</nlm-citation>
</ref>
<ref id="B13">
<label>13</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Shi]]></surname>
<given-names><![CDATA[Qinfeng]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[Hanxi]]></given-names>
</name>
<name>
<surname><![CDATA[Shen]]></surname>
<given-names><![CDATA[Chunhua]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Rapid Face Recognition Using Hashing]]></article-title>
<source><![CDATA[IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 10)]]></source>
<year>June</year>
<month> 1</month>
<day>3-</day>
<publisher-loc><![CDATA[San Francisco ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B14">
<label>14</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jain]]></surname>
<given-names><![CDATA[A.K.]]></given-names>
</name>
</person-group>
<source><![CDATA[Fundamentals of Digital Image Processing]]></source>
<year>1989</year>
<publisher-loc><![CDATA[Englewood Cliffs^eNJ NJ]]></publisher-loc>
<publisher-name><![CDATA[Prentice-Hall]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B15">
<label>15</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pennebaker]]></surname>
<given-names><![CDATA[W.B.]]></given-names>
</name>
<name>
<surname><![CDATA[Mitchell]]></surname>
<given-names><![CDATA[J.L.]]></given-names>
</name>
</person-group>
<source><![CDATA[JPEG Still Image Data Compression Standard]]></source>
<year>1993</year>
<publisher-loc><![CDATA[New York^eNY NY]]></publisher-loc>
<publisher-name><![CDATA[Van Nostrand Reinhold]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B16">
<label>16</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hartigan]]></surname>
<given-names><![CDATA[J. A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Clustering Algorithms]]></source>
<year>1975</year>
<publisher-name><![CDATA[Wiley]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B17">
<label>17</label><nlm-citation citation-type="">
<collab>AT & T</collab>
<source><![CDATA["The Database of Faces" (formerly "The ORL Database of Faces")"]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B18">
<label>18</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hiremath]]></surname>
<given-names><![CDATA[P.S.]]></given-names>
</name>
<name>
<surname><![CDATA[Prabhakar]]></surname>
<given-names><![CDATA[C.J.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Face Recognition Technique Using Symbolic Linear Discriminant Analysis Method]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Kalra]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Peleg]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[ICVGIP 2006, LNCS 4338]]></source>
<year>2006</year>
<page-range>641 - 649</page-range></nlm-citation>
</ref>
<ref id="B19">
<label>19</label><nlm-citation citation-type="">
<source><![CDATA[The Yale Face Database]]></source>
<year>28th</year>
<month> J</month>
<day>ul</day>
</nlm-citation>
</ref>
<ref id="B20">
<label>20</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ngo]]></surname>
<given-names><![CDATA[David C. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Teoh]]></surname>
<given-names><![CDATA[Andrew B. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Goh]]></surname>
<given-names><![CDATA[Alwyn]]></given-names>
</name>
</person-group>
<source><![CDATA[Eigenspace-Based Face Hashing]]></source>
<year></year>
<conf-name><![CDATA[ Biometric Authentication, First International Conference, ICBA 2004]]></conf-name>
<conf-date>July 15-17, 2004</conf-date>
<conf-loc>Hong Kong </conf-loc>
</nlm-citation>
</ref>
<ref id="B21">
<label>21</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ngo]]></surname>
<given-names><![CDATA[D.C.L.]]></given-names>
</name>
<name>
<surname><![CDATA[Teoh]]></surname>
<given-names><![CDATA[A.B.J.]]></given-names>
</name>
<name>
<surname><![CDATA[Goh]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Biometric Hash: High-Confidence Face Recognition]]></article-title>
<source><![CDATA[IEEE Transactions on Circuits and Systems for Video Technology]]></source>
<year>June</year>
<month> 2</month>
<day>00</day>
<volume>16</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>771 - 775</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
