<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>Miller B. L. and Goldberg, D. E.; “Genetic algorithms, selection schemes,
and the varying effects of noise”. Evol. Comput.</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Pixel Consistency, K-Tournament Selection, and Darwinian-Based Feature Extraction</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Joseph Shelton</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Melissa Venable</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Sabra Neal</string-name>
          <email>saneal@ncat.edu</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Joshua Adams</string-name>
          <email>jcadams2@ncat.edu</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Aniesha Alford</string-name>
          <email>aalford@ncat.edu</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Gerry Dozier</string-name>
          <email>gvdozier@ncat.edu</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Computer Science Department, North Carolina Agricultural and Technical State University 1601</institution>
          <addr-line>East Market St. Greensboro, NC, 27411</addr-line>
          ,
          <country country="US">United States of America</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Phillips</institution>
          ,
          <addr-line>P.J., Flynn, P. J., Scruggs, T., Bowyer, K. W., Chang, J., Hoff, K., Marques, J., Min, J. and Worek, W; “Overview of face recognition grand challenge,” in IEEE Conference on Computer Vision and Pattern Recognition, 2005</addr-line>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2011</year>
      </pub-date>
      <volume>4</volume>
      <issue>2</issue>
      <fpage>11</fpage>
      <lpage>15</lpage>
      <abstract>
        <p>In this paper, we present a two-stage process for developing feature extractors (FEs) for facial recognition. In this process, a genetic algorithm is used to evolve a number of local binary patterns (LBP) based FEs with each FE consisting of a number of (possibly) overlapping patches from which features are extracted from an image. These FEs are then overlaid to form what is referred to as a hyper FE. The hyper FE is then used to create a probability distribution function (PDF). The PDF is a two dimensional matrix that records the number of patches within the hyper FE that a particular pixel is contained within. Thus, the PDF matrix records the consistency of pixels contained within patches of the hyper FE. Darwinian-based FEs (DFEs) are then constructed by sampling the PDF via k-tournament selection to determine which pixels of a set of images will be used in extract features from. Our results show that DFEs have a higher recognition rate as well as a lower computational complexity than other LBP-based feature extractors.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>
        Genetic &amp; Evolutionary Biometrics (GEB) is the field of
study devoted towards the development, analysis, and
application of Genetic &amp; Evolutionary Computation (GEC)
to the area of biometrics
        <xref ref-type="bibr" rid="ref4 ref5 ref6 ref6">(Ramadan and Abdel-kader 2009;
Galbaby et al. 2007; Alford et al. 2012; Shelton et al.
2012c)</xref>
        . Over the past few years there has been a growing
interest in GEB. To date, GEB has been applied to the area
of biometrics in the form of feature extraction
        <xref ref-type="bibr" rid="ref1 ref2 ref3">(Shelton et al.
2011a; Adams et al. 2010)</xref>
        , feature selection
        <xref ref-type="bibr" rid="ref2 ref3">(Kumar,
Kumar and Rai 2009; Dozier et al. 2011)</xref>
        , feature weighting
(Popplewell et al. 2011; Alford et al. 2011) as well as cyber
security
        <xref ref-type="bibr" rid="ref4 ref4 ref5 ref5 ref6 ref6">(Shelton et al. 2012a; Shelton et al. 2012b)</xref>
        .
      </p>
      <p>
        GEFEML (Genetic and Evolutionary Feature Extraction –
Machine Learning)
        <xref ref-type="bibr" rid="ref4 ref5 ref6">(Shelton et al. 2012c)</xref>
        is a GEB method
that uses GECs to evolve feature extractors (FEs) that have
high recognition accuracy while using a small subset of
pixels from a biometric image. The results of Shelton et al.
(2012c) show that FEs evolved via GEFEML outperform the
FEs developed via the traditional Local Binary Pattern
(LBP) (Ojala and Pietikainen 2002) approach.
      </p>
      <p>
        In this paper, we present a two-stage process for facial
recognition
        <xref ref-type="bibr" rid="ref8 ref9">(Tsekeridou and Pitas 1998; Zhao et al. 2003)</xref>
        known as Darwinian-based feature extraction (DFEs). The
first stage takes a set of FEs evolved by GEFEML and
superimposes each to create a hyper FE. From this hyper
FE, a probability distribution function (PDF) is created. The
PDF is represented as a two-dimensional matrix where each
position in the matrix corresponds to a pixel within a set of
images. Each value within the PDF represents the number
of patches an associated pixel is contained within it.
      </p>
      <p>In the second stage of the process, a Darwinian feature
extractor (dFE) is developed by sampling the PDF via
ktournament selection (Miller and Goldberg 1996). The
selected pixels are then grouped into c different clusters by
randomly selecting α pixels to serve as centers. Our results
show that the computational cost of DFE (in terms of the
total number of pixels being processed) via dFEs is far less
expensive than the FEs evolved via GEFEML. The dFEs also
outperform GEFEML evolved FEs in terms of recognition
accuracy.</p>
      <p>The remainder of this paper is as follows. Section 2
provides an overview of the LBP feature extraction method,
GECs, and GEFEML. Section 3 provides a description of the
two-stage process for developing dFEs. Sections 4 and 5
present our experiment setup and our results respectively.
Finally, in Section 6, we present our conclusions and future
work.</p>
    </sec>
    <sec id="sec-2">
      <title>Background</title>
    </sec>
    <sec id="sec-3">
      <title>Local Binary Pattern Method</title>
      <p>The LBP method (Ojala and Pietikainen 2002; Ahonen,
Hadid and Pietikinen 2006) extracts texture patterns from
images in an effort to build a feature vector (FV). It does
this by segmenting an image into rectangular regions,
referred to as patches, and comparing the grey-scale
intensity values of each pixel with the intensity values of a
pixel’s nearest neighbors. After pixels are compared with
their nearest neighbors, a pattern is extracted. This pattern
is represented by a binary string. A histogram is built using
the frequency of occurring patterns for a patch. The
histograms for every patch are concatenated to form a FV.</p>
      <p>In the LBP method, images are traditionally partitioned
into uniform sized, non-overlapping patches. Within each
patch, pixels are sought out that have d neighboring pixels
on all sides and that are a distance of r pixels away from a
center pixel. Each of these pixels can be referred to as a
center pixel, cp, due to it being surrounded by a
neighborhood of pixels. A texture pattern can be extracted
using Equations 1 and 2, where N is the set of pixel
intensity values for each of the neighboring pixels. In
Equation 1, the difference between a neighboring pixel and
cp is calculated and sent to Equation 2. The value returned
will either be a 1 or a 0, depending on the difference. The d
bits returned will be concatenated to form a texture pattern.</p>
      <p>d
LBP(N, c p )  (nt  c p )</p>
      <p>t0
 1, x  0,
(x)  
 0, x  0.
(1)
(2)
Each patch has a histogram that stores the frequency of
certain texture patterns extracted. The histograms for all
patches of an image are concatenated together to create a
FV for an image. This FV can be compared to another FV
of an image using a distance measure such as the
Manhattan Distance measure or the Euclidean distance
measure.</p>
    </sec>
    <sec id="sec-4">
      <title>GECs</title>
      <p>
        GEFEML uses GECs to evolve FEs
        <xref ref-type="bibr" rid="ref4 ref5 ref6">(Shelton et al. 2012c)</xref>
        .
The resulting FEs have been shown to have high
recognition rates. A GEC uses artificial evolution to evolve
a population of candidate solutions (CSs) to a particular
problem. Initially, a population of CSs is randomly
generated. Each CS in the population is then assigned a
fitness based on a user specified evaluation function. Parent
CSs are then selected based on their fitness and allowed to
create offspring using a number of recombination and
mutation techniques
        <xref ref-type="bibr" rid="ref7">(Spears and DeJong 1991)</xref>
        . After the
offspring are created, they are evaluated and typically
replace the weaker members of the previous population.
The process of selecting parents, creating offspring, and
replacing weaker CSs is repeated until a user specified
stopping condition is met.
      </p>
    </sec>
    <sec id="sec-5">
      <title>GEFEML</title>
      <p>
        GEFEML evolves LBP-based FEs using some GEC, so FEs
must be represented as a CS. GEFEML represents an FE, fei,
as a six-tuple, &lt;Xi,Yi,Wi,Hi,Mi,fi&gt;. The set Xi = {xi,0, xi,1,…,
xi,n-1} represents the x-coordinates of the center pixel of n
possible patches and Yi = {yi,0, yi,1, … , yi,n-1} represents the
y-coordinates of center pixel of n possible patches. The
widths and heights of the n patches are represented by Wi =
{wi,0, wi,1, … , wi,n-1} and Hi = {hi,0, hi,1,…, hi,n-1}. Because
the patches are uniform, Wk = {wk,0, wk,1, … , wk,n-1} is
equivalent to, wk,0 = wk,1,…, wk,n-2 = wk,n-1, and Hk = {hk,0,
hk,1, … , hk,n-1} is equivalent to, hk,0 = hk,1,…, hk,n-2 = hk,n-1,
meaning that the widths and heights of every patch are the
same. Uniform sized patches are used because uniform
sized patches outperformed non-uniform sized patches in
        <xref ref-type="bibr" rid="ref2 ref3">(Shelton et al. 2011b)</xref>
        . Mi = {mi,0, mi,1,…, mi,n-1} represents
the masking values for each patch and fi represents the
fitness of fei . The masking value determines whether a
patch is activated or deactivated. If a patch is deactivated,
by setting mi,j = 0, then the sub-histogram will not be
considered in the distance measure, and the number of
features to be used in comparisons is reduced. Otherwise,
the patch is activated, with mi,j = 1.
      </p>
      <p>The fitness fi is determined by how many incorrect matches
it makes on a training dataset D and how much of the image
is processed by fei. The dataset D is composed of multiple
snapshots of subjects and is divided into two subsets, a
probe and a gallery set. The fei is applied on both the probe
set and gallery set to create FVs for each set. A distance
measure is used to compare FVs in the probe to FVs in the
gallery and the smallest distances are considered a match. If
the FV of an individual in the probe is incorrectly matched
with the FV of another individual in the gallery, then that is
considered an error. The fitness, shown in Equation 3, is the
number of errors multiplied by 10 plus the percentage of
image space being processed.</p>
      <p>fi  10 (D)  ( fei )
(3)</p>
      <p>To prevent overfitting FEs on a training set during the
evolutionary process, cross-validation is used to determine
the FEs that generalize well to a dataset of unseen subjects.
While offspring are applied to the training dataset to be
evaluated, they were also applied to a mutually exclusive
validation dataset which does not affect the evolutionary
process. The offspring with the best performance on the
validation dataset is recorded regardless of its performance
on the training set.</p>
    </sec>
    <sec id="sec-6">
      <title>The Two-stage Process for Developing a</title>
    </sec>
    <sec id="sec-7">
      <title>Hyper FE and a PDF</title>
    </sec>
    <sec id="sec-8">
      <title>Stage I: Hyper FE/PDF</title>
      <p>The hyper FE is constructed by taking a set of FEs from
GEFEML and overlaying them. Figure 1a shows a set of
sample FEs while Figure 1b shows a sample hyper FE.
After the hyper FE is constructed, a PDF, in the form of a
matrix, is created. Each position in the matrix contains the
number of patches a pixel was contained in. When patches
in an FE overlapped on a position multiple times, the
overlap is considered in the count. So if the hyper FE had n
patches, and used κ FEs, the greatest number of times a
pixel was contained in a patch would be n * κ. Figure 1c
shows a 3D plot of a PDF, while Figure 1d shows the 3D
plot laid over a facial image.</p>
      <p>(a)
(c)
(b)
(d)</p>
    </sec>
    <sec id="sec-9">
      <title>Stage II: Developing dFEs</title>
      <p>A dFE can be defined by the number of clusters it has, α,
the selection pressure of tournament selection, µ, and the
patch resolution, ρ. The variables µ and ρ are represented
as a percentage, or a value between 0 and 1. Assume that β
represents the number of pixels a user would want for a
cluster, there are α *ρ*β positions that will be selected to be
clustered. Tournament selection selects µ*σ pixels to
compete for clustering, where σ represents the total number
of positions in the PDF that have been processed at least
once. When performing tournament selection, the position
with the greatest consistency will be the winner. If there is a
tie, then the first selected position is the winner. Winning
pixels are selected without replacement.</p>
      <p>After α *ρ* β pixels have been selected via tournament
selection, α random centers for clusters are chosen to be
placed within the PDF. The distance between each of the
selected positions for clustering will be compared to the
center positions, and the pixel will be clustered towards the
closest one. After pixels have been assigned to clusters,
those pixels undergo LBP feature extraction to extract
texture patterns for a cluster. Due to the random placement
of clusters, it is possible for different clusters to have
different numbers of pixels clustered to it.</p>
      <p>The clusters are similar to patches, therefore histograms
are associated with each, and the patterns are used to build
the histogram and ultimately create FVs for images.</p>
    </sec>
    <sec id="sec-10">
      <title>Experiments</title>
      <p>Two hyper FEs were used in this experiment: (a) a
hyper FE composed of a set of FEs that performed well on
the training set, HFEtrn and (b) a hyper FE composed of a
set of the best performing FEs on the validation set,
HFEval. The FEs were evolved using the experimental
setup in Shelton et al. (2012c), which used GEFEML.
GEFEML was run 30 times using increments of 1000,
2000, 3000 and 4000 evaluations. An EDA instance
(Larranga and Loranzo 2002) of GEFEML was used with a
population of 20 FEs and an elite of 1, meaning every
generation starting from the second contained the single
best performing FE of the previous generation. On each
run, GEFEML returned the best performing FE on the
training set and the best performing FE with respect to the
validation set.</p>
      <p>The FEs were trained and validated on two mutually
exclusive sets, and they were then applied to a test set. The
datasets were composed of subjects from the Facial
Recognition Grand Challenge database (FRGC) (Phillips
et al. 2005). The training set was composed of 100
subjects (FRGC-100trn), the validation set was composed
of 109 subjects (FRGC-109), and the test set was
composed of 100 subjects (FRGC-100tst). The average
number of patches used from the set of generalizing FEs
as well as the average number of pixels processed in a
patch were calculated in order to set a starting point for
this experiment. On average, 12 patches were activated
and 504 pixels were processed by each patch using
GEFEML.</p>
      <p>In this experiment, instances of 16, 12, 8 and 4 clusters
were tested. Different patch resolutions, or the amount of
pixels that could belong to a cluster, were also used. In this
experiment, σ = 504. This was the average number of
pixels in patches of the set of FEs from GEFEML. Instances
of DFE with patch resolutions of 1.0, 0.9, 0.8, 0.7, 0.6,
0.5, 0.4, 0.3, 0.2 and 0.1 were run. Each resolution used
selection pressures from 0.0 (where number of pixels to be
compared in tournament selection is actually 2) to 1.0 and
every tenth percentage in between. A dFE is defined to be
a cluster, patch resolution, then selection pressure, giving a
total of 880 dFEs (4 clusters * 10 patch resolutions * 11
selection pressures * 2 hyper FEs), and each DFE instance
was ran 30 times. For each run, a dFE was applied to
FRGC-100tst.</p>
    </sec>
    <sec id="sec-11">
      <title>Results</title>
      <p>The results were obtained by running each dFE listed in
Section 4 on FRGC-100tst.</p>
      <p>To compare the effectiveness of each method, we compare
the results of different selection pressures within a certain
resolution and patch. The results of the best selection
pressure for a resolution are compared to the best selection
pressures of every other resolution within the cluster group,
and this is done for results in every cluster. After the best
performing FEs are obtained from each cluster, they are
compared to each other as well as the results of GEFEML.
Results are compared using an ANOVA test and a t-test on
the recognition accuracies for a cluster-resolution-selection
pressure instance.</p>
      <p>Table I shows the results of this experiment. The first
column shows the methods used. The method DFEval
represents dFEs that sampled the HFEval, while the method
DFEtrn represents dFEs that sampled the HFEtrn. The two
methods are compared to the original GEFEML method,
shown as GEFEML. The second column, Feature Extractor,
shows the number of clusters used, the resolution and the
selected pressure for a dFE. The third and fourth columns
show the computational complexity (CC) and the average
recognition accuracy (Acc) respectively for each method.
The computational complexity is the number of pixels
processed, or extracted, by each method. Though 880 dFEs
were tested, the only ones shown are ones that produced
superior results to GEFEML.</p>
      <p>For DFEval, each dFE showed in Table I outperformed
GEFEML in terms of recognition accuracy. For DFEtrn, the
dFE &lt;12,0.5,0.2&gt; was statistically equivalent to FEs
evolved using GEFEML. Though we compare results based
on recognition accuracy, we also considered computational
complexity.</p>
      <p>The results show that the &lt;12,0.5,0.2&gt; dFE (of DFEtrn)
outperforms GEFEML in terms of computational complexity,
and that the &lt;12,0.9,0.1&gt; instance of DFEval outperformed
DFEtrn and GEFEMLin terms of recognition accuracy as well
as computational complexity. These results are promising
in terms of recognition and feature reduction of DFE.</p>
    </sec>
    <sec id="sec-12">
      <title>Conclusion and Future Work</title>
      <p>The results of the experiment suggest that the HFEval
produces dFEs that generalize well to unseen subjects. The
dFEs resulting from the HFEtrn also generalized well, but
were not as effective as when using dFEs resulting from the
HFEval. Using both hyper FEs performed better than the set
of generalized FEs from GEFEML. Future work will be
devoted towards using additional GECs for the DFE.</p>
    </sec>
    <sec id="sec-13">
      <title>Acknowledgment</title>
      <p>This research was funded by the Office of the Director of
National Intelligence (ODNI), Center for Academic
Excellence (CAE) for the multi-university Center for
Advanced Studies in Identity Sciences (CASIS), NSF
SSTEM, Lockheed Martin and the National Science
Foundation (NSF) Science &amp; Technology Center:
Bio/computational Evolution in Action CONsortium
(BEACON). The authors would like to thank the ODNI, the
NSF, and Lockheed Martin for their support of this
research.
Ojala,T., Pietikainen, M.; “Multiresolution Gray-Scale and Rotation
Invariant Texture Classification with Local Binary Patterns”, IEEE Trans.
Pattern Analysis and Machine Intelligence; 971-987; 2002
Ramadan. R. M. and Abdel-Kader, R. F. ; “Face Recognition Using
Particle Swarm Optimization-Based Selected Features,” In International
Journal of Signal Processing, Image Processing and Pattern Recognition,
Vol. 2, No. 2, June 2009.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <string-name>
            <surname>Adams</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Woodard</surname>
            ,
            <given-names>D.L.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Dozier</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Miller</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Bryant</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Glenn</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <article-title>"Genetic-Based Type II Feature Extraction for Periocular Biometric Recognition: Less is More," Pattern Recognition (ICPR)</article-title>
          , 20th International Conference on , vol., no., pp.
          <fpage>205</fpage>
          -
          <lpage>208</lpage>
          ,
          <fpage>23</fpage>
          -
          <lpage>26</lpage>
          Aug. 2010 Ahonen,
          <string-name>
            <given-names>T.</given-names>
            ,
            <surname>Hadid</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            ,
            <surname>Pietikinen</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
          ;
          <article-title>"Face Description with Local Binary Patterns: Application to Face Recognition,"</article-title>
          <source>IEEE Transactions on Pattern Analysis and Machine Intelligence</source>
          , vol.
          <volume>28</volume>
          , no.
          <issue>12</issue>
          , pp.
          <fpage>2037</fpage>
          -
          <lpage>2041</lpage>
          , Dec. 2006
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <string-name>
            <surname>Shelton</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dozier</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bryant</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Smalls</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Adams</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Popplewell</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Abegaz</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Woodard</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Ricanek</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          “
          <article-title>Comparison of Genetic-based Feature Extraction Methods for Facial Recognition,”</article-title>
          <source>Proceedings of the 2011 Midwest Artificial Intelligence and Cognitive Science Conference (MAICS-2011), April 16-17</source>
          , Cincinnati., 2011a
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <string-name>
            <surname>Shelton</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dozier</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bryant</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Smalls</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Adams</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Popplewell</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Abegaz</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Woodard</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Ricanek</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          “
          <article-title>Genetic and Evolutionary Feature Extraction via X-TOOLSS” in The 8th annual</article-title>
          <source>International Conference on Genetic and Evolutionary Methods (GEM)</source>
          ,
          <year>2011b</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <string-name>
            <surname>Shelton</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bryant</surname>
            ,
            <given-names>K</given-names>
          </string-name>
          , Abrams,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Small</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            ,
            <surname>Adams</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            ,
            <surname>Leflore</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            ,
            <surname>Alford</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            ,
            <surname>Ricanek</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K</given-names>
            , and
            <surname>Dozier</surname>
          </string-name>
          , G.; “
          <source>Genetic &amp; Evolutionary Biometric Security: Disposable Feature Extractors for Mitigating Biometric Replay Attacks” proceedings of The 10th Annual Conference on Systems Engineering Research (CSER)</source>
          ,
          <year>2012a</year>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <string-name>
            <surname>Shelton</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dozier</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Adams</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Alford</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ;
          <article-title>“Permutation-Based Biometric Authentication Protocols for Mitigating Replay Attacks” will appear in the</article-title>
          <source>Proceedings of the 2012 IEEE World Congress on Computational Intelligence (WCCI</source>
          <year>2012</year>
          ),
          <fpage>2012b</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <string-name>
            <surname>Shelton</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Alford</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Abegaz</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Small</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Leflore</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Williams</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Adams</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dozier</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bryant</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ; “Genetic &amp;
          <article-title>Evolutionary Biometrics: Feature Extraction from a Machine Learning Perspective”</article-title>
          ,
          <source>proceedings of IEEE SoutheastCon 2012c.</source>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <string-name>
            <surname>Spears</surname>
            ,
            <given-names>W. M.</given-names>
          </string-name>
          <article-title>and</article-title>
          <string-name>
            <surname>DeJong</surname>
            ,
            <given-names>K. A.</given-names>
          </string-name>
          “
          <article-title>An analysis of multipoint crossover</article-title>
          ,” in
          <source>the Proc. 1990 Workshop of the Foundations of Genetic Algorithms</source>
          , pp.
          <fpage>301</fpage>
          -
          <lpage>315</lpage>
          ,
          <year>1991</year>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <string-name>
            <surname>Tsekeridou</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Pitas</surname>
          </string-name>
          , I. ;
          <article-title>“Facial feature extraction in frontal views using biometric analogies”</article-title>
          <source>in Proc. of the IX European Signal Processing Conference</source>
          , I:
          <fpage>315</fpage>
          -
          <lpage>318</lpage>
          ,
          <year>1998</year>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <string-name>
            <surname>Zhao</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chellappa</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Phillips</surname>
            ,
            <given-names>P. J.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Rosenfeld</surname>
          </string-name>
          , A.;
          <article-title>“Face recognition: A literature survey"</article-title>
          .
          <source>ACM Comput. Surv</source>
          .
          <volume>35</volume>
          ,
          <issue>4</issue>
          (
          <year>December 2003</year>
          ),
          <fpage>399</fpage>
          -
          <lpage>458</lpage>
          .,
          <year>2003</year>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>