{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T07:07:49Z","timestamp":1743059269738,"version":"3.40.3"},"publisher-location":"Cham","reference-count":47,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031581731"},{"type":"electronic","value":"9783031581748"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-58174-8_34","type":"book-chapter","created":{"date-parts":[[2024,7,2]],"date-time":"2024-07-02T09:02:39Z","timestamp":1719910959000},"page":"394-409","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Fingerprint Anti-spoofing Analysis: From Minutiae to\u00a0Transformers"],"prefix":"10.1007","author":[{"given":"Tushar","family":"Goyal","sequence":"first","affiliation":[]},{"given":"Harshit","family":"Shakya","sequence":"additional","affiliation":[]},{"given":"Aditya","family":"Khandelwal","sequence":"additional","affiliation":[]},{"given":"Himanshu","family":"Patidar","sequence":"additional","affiliation":[]},{"given":"Tushar","family":"Sandhan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,3]]},"reference":[{"key":"34_CR1","unstructured":"Biometrika HiScan-Pro Scanner. https:\/\/www.neurotechnology.com\/fingerprint-scanner-biometrika-hiscan-pro.html"},{"key":"34_CR2","unstructured":"Cross-Match L Scan Guardian Scanner. http:\/\/www.itworks.co.th\/L_Scan_Guardian\/L_SCAN_Guardian.pdf"},{"key":"34_CR3","unstructured":"Digital Persona U.are.U 5160 Scanner. https:\/\/www.neurotechnology.com\/fingerprint-scanner-digitalpersona-u-are-u-5100-5160.html"},{"key":"34_CR4","unstructured":"GreenBit Dacty-Scan 26 Scanner. https:\/\/www.neurotechnology.com\/fingerprint-scanner-green-bit-dactyscan-26.html"},{"key":"34_CR5","doi-asserted-by":"crossref","unstructured":"Abhyankar, A.S., Schuckers, S.C.: A wavelet-based approach to detecting liveness in fingerprint scanners. In: Biometric Technology for Human Identification, vol.\u00a05404. International Society for Optics and Photonics, SPIE (2004)","DOI":"10.1117\/12.542939"},{"key":"34_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/978-3-642-02230-2_7","volume-title":"Image Analysis","author":"T Ahonen","year":"2009","unstructured":"Ahonen, T., Matas, J., He, C., Pietik\u00e4inen, M.: Rotation invariant image description with local binary pattern histogram Fourier features. In: Salberg, A.-B., Hardeberg, J.Y., Jenssen, R. (eds.) SCIA 2009. LNCS, vol. 5575, pp. 61\u201370. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-02230-2_7"},{"key":"34_CR7","unstructured":"Ali, J., Khan, R., Ahmad, N., Maqsood, I.: Random forests and decision trees. Int. J. Comput. Sci. Issues (IJCSI) 9, 272 (2012)"},{"key":"34_CR8","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1109\/TIFS.2006.879289","volume":"1","author":"A Antonelli","year":"2006","unstructured":"Antonelli, A., Cappelli, R., Maio, D., Maltoni, D.: Fake finger detection by skin distortion analysis. IEEE Trans. Inf. Forensics Secur. 1, 360\u2013373 (2006)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"34_CR9","doi-asserted-by":"crossref","unstructured":"Anusha, B., Banerjee, S., Chaudhuri, S.: DeFraudNet: End2End fingerprint spoof detection using patch level attention. In: IEEE Winter Conference on Applications of Computer Vision (WACV) (2020)","DOI":"10.1109\/WACV45572.2020.9093397"},{"key":"34_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/11608288_36","volume-title":"Advances in Biometrics","author":"D Baldisserra","year":"2005","unstructured":"Baldisserra, D., Franco, A., Maio, D., Maltoni, D.: Fake fingerprint detection by odor analysis. In: Zhang, D., Jain, A.K. (eds.) ICB 2006. LNCS, vol. 3832, pp. 265\u2013272. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11608288_36"},{"key":"34_CR11","doi-asserted-by":"publisher","first-page":"645","DOI":"10.1186\/s40064-015-1427-3","volume":"4","author":"P Carcagn\u00ed","year":"2015","unstructured":"Carcagn\u00ed, P., Del Coco, M., Leo, M., Distante, C.: Facial expression recognition and histograms of oriented gradients: a comprehensive study. SpringerPlus 4, 645 (2015)","journal-title":"SpringerPlus"},{"key":"34_CR12","doi-asserted-by":"crossref","unstructured":"Chen, T., Guestrin, C.: XGBoost: a scalable tree boosting system. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. Association for Computing Machinery (2016)","DOI":"10.1145\/2939672.2939785"},{"key":"34_CR13","doi-asserted-by":"publisher","first-page":"2190","DOI":"10.1109\/TIFS.2018.2812193","volume":"13","author":"T Chugh","year":"2018","unstructured":"Chugh, T., Cao, K., Jain, A.: Fingerprint spoof buster: use of minutiae-centered patches. IEEE Trans. Inf. Forensics Secur. 13, 2190\u20132202 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"34_CR14","doi-asserted-by":"crossref","unstructured":"Deng, J., Dong, W., Socher, R., Li, L.J., Li, K., Fei-Fei, L.: ImageNet: a large-scale hierarchical image database. In: 2009 IEEE Conference on Computer Vision and Pattern Recognition (2009)","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"34_CR15","doi-asserted-by":"crossref","unstructured":"Dharavath, K., Talukdar, F.A., Laskar, R.H.: Study on biometric authentication systems, challenges and future trends: a review. In: 2013 IEEE International Conference on Computational Intelligence and Computing Research (2013)","DOI":"10.1109\/ICCIC.2013.6724278"},{"key":"34_CR16","unstructured":"Dosovitskiy, A., et al.: An image is worth 16$$\\times $$16 words: transformers for image recognition at scale. In: International Conference on Learning Representations (2021)"},{"key":"34_CR17","doi-asserted-by":"crossref","unstructured":"Drahansky, M., Notzel, R., Funk, W.: Liveness detection based on fine movements of the fingertip surface. In: IEEE Information Assurance Workshop (2006)","DOI":"10.1109\/IAW.2006.1652075"},{"key":"34_CR18","doi-asserted-by":"crossref","unstructured":"Galbally, J., Alonso-Fernandez, F., Fierrez, J., Ortega-Garcia, J.: Fingerprint liveness detection based on quality measures. In: First IEEE International Conference on Biometrics, Identity and Security (BIdS) (2009)","DOI":"10.1109\/BIDS.2009.5507534"},{"key":"34_CR19","doi-asserted-by":"crossref","unstructured":"Ghiani, L., Hadid, A., Marcialis, G.L., Roli, F.: Fingerprint liveness detection using binarized statistical image features. In: 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS) (2013)","DOI":"10.1109\/BTAS.2013.6712708"},{"key":"34_CR20","doi-asserted-by":"crossref","unstructured":"Ghiani, L., Yambay, D., Mura, V., Tocco, S., Marcialis, G.L., Roli, F., Schuckcrs, S.: LivDet 2013 fingerprint liveness detection competition. In: 2013 International Conference on Biometrics (ICB) (2013)","DOI":"10.1109\/ICB.2013.6613027"},{"key":"34_CR21","doi-asserted-by":"crossref","unstructured":"Gomez-Barrero, M., Kolberg, J., Busch, C.: Multi-modal fingerprint presentation attack detection: analysing the surface and the inside. In: International Conference on Biometrics (ICB) (2019)","DOI":"10.1109\/ICB45273.2019.8987260"},{"key":"34_CR22","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR) (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"34_CR23","doi-asserted-by":"crossref","unstructured":"Hearst, M., Dumais, S., Osuna, E., Platt, J., Scholkopf, B.: Support vector machines. IEEE Intell. Syst. Their Appl. (1998)","DOI":"10.1109\/5254.708428"},{"key":"34_CR24","doi-asserted-by":"crossref","unstructured":"Hoang, V.T., Jo, K.H.: Practical analysis on architecture of EfficientNet. In: 14th International Conference on Human System Interaction (HSI) (2021)","DOI":"10.1109\/HSI52170.2021.9538782"},{"key":"34_CR25","doi-asserted-by":"crossref","unstructured":"Hosseini, S.: Fingerprint vulnerability: a survey. In: 2018 4th International Conference on Web Research (ICWR) (2018)","DOI":"10.1109\/ICWR.2018.8387240"},{"key":"34_CR26","doi-asserted-by":"crossref","unstructured":"Howard, A., et al.: Searching for MobileNetv3. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision (ICCV) (2019)","DOI":"10.1109\/ICCV.2019.00140"},{"key":"34_CR27","doi-asserted-by":"crossref","unstructured":"Huang, G., Liu, Z., van\u00a0der Maaten, L., Weinberger, K.: Densely connected convolutional networks (2017)","DOI":"10.1109\/CVPR.2017.243"},{"key":"34_CR28","unstructured":"Johnson, P., Schuckers, S.: Fingerprint pore characteristics for liveness detection. In: 2014 International Conference of the Biometrics Special Interest Group (BIOSIG) (2014)"},{"key":"34_CR29","doi-asserted-by":"crossref","unstructured":"Liu, Z., et al.: Swin transformer: hierarchical vision transformer using shifted windows. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision (ICCV) (2021)","DOI":"10.1109\/ICCV48922.2021.00986"},{"key":"34_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1007\/978-3-642-04146-4_4","volume-title":"Image Analysis and Processing \u2013 ICIAP 2009","author":"GL Marcialis","year":"2009","unstructured":"Marcialis, G.L., et al.: First international fingerprint liveness detection competition\u2014LivDet 2009. In: Foggia, P., Sansone, C., Vento, M. (eds.) ICIAP 2009. LNCS, vol. 5716, pp. 12\u201323. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-04146-4_4"},{"key":"34_CR31","doi-asserted-by":"crossref","unstructured":"Marcialis, G.L., Roli, F., Tidu, A.: Analysis of fingerprint pores for vitality detection. In: 2010 20th International Conference on Pattern Recognition (2010)","DOI":"10.1109\/ICPR.2010.321"},{"key":"34_CR32","doi-asserted-by":"publisher","first-page":"864","DOI":"10.1109\/TIFS.2015.2398817","volume":"10","author":"D Menotti","year":"2015","unstructured":"Menotti, D., et al.: Deep representations for iris, face, and fingerprint spoofing detection. IEEE Trans. Inf. Forensics Secur. 10, 864\u2013879 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"34_CR33","doi-asserted-by":"crossref","unstructured":"Mura, V., Ghiani, L., Marcialis, G.L., Roli, F., Yambay, D.A., Schuckers, S.A.: LivDet fingerprint liveness detection competition. In: IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS) (2015)","DOI":"10.1109\/BTAS.2015.7358776"},{"key":"34_CR34","doi-asserted-by":"publisher","first-page":"1206","DOI":"10.1109\/TIFS.2016.2520880","volume":"11","author":"RF Nogueira","year":"2016","unstructured":"Nogueira, R.F., de Alencar Lotufo, R., Campos Machado, R.: Fingerprint liveness detection using convolutional neural networks. IEEE Trans. Inf. Forensics Secur. 11, 1206\u20131213 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"34_CR35","unstructured":"Organization, I.S.: ISO\/IEC 30107-1: information technology - biometric presentation attack detection - part 1: framework (2016)"},{"key":"34_CR36","unstructured":"Osten, D.W., Carim, H.M., Blan, B.L., Arneson, M.R.: Biometric, personal authentication system (1995)"},{"key":"34_CR37","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1080\/00220670209598786","volume":"96","author":"J Peng","year":"2002","unstructured":"Peng, J., Lee, K., Ingersoll, G.: An introduction to logistic regression analysis and reporting. J. Educ. Res. 96, 3\u201314 (2002)","journal-title":"J. Educ. Res."},{"key":"34_CR38","doi-asserted-by":"crossref","unstructured":"Pinto, A., Pedrini, H., Krumdick, M., Becker, B., Czajka, A., Bowyer, K., Rocha, A.: Counteracting presentation attacks in face, fingerprint, and iris recognition (2018)","DOI":"10.1201\/b22524-11"},{"key":"34_CR39","doi-asserted-by":"publisher","first-page":"45","DOI":"10.14203\/j.inkom.420","volume":"9","author":"E Prakasa","year":"2016","unstructured":"Prakasa, E.: Texture feature extraction by using local binary pattern. INKOM J. 9, 45\u201348 (2016)","journal-title":"INKOM J."},{"key":"34_CR40","series-title":"IFIP \u2014 The International Federation for Information Processing","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/978-0-387-35528-3_17","volume-title":"Smart Card Research and Advanced Applications","author":"T van der Putte","year":"2000","unstructured":"van der Putte, T., Keuning, J.: Biometrical fingerprint recognition: don\u2019t get your fingers burned. In: Domingo-Ferrer, J., Chan, D., Watson, A. (eds.) Smart Card Research and Advanced Applications. ITIFIP, vol. 52, pp. 289\u2013303. Springer, Boston, MA (2000). https:\/\/doi.org\/10.1007\/978-0-387-35528-3_17"},{"key":"34_CR41","unstructured":"Ravi, J., Raja, K.B., Venugopal, K.R.: Fingerprint recognition using minutia score matching. CoRR (2010)"},{"key":"34_CR42","doi-asserted-by":"crossref","unstructured":"Ribani, R., Marengoni, M.: A survey of transfer learning for convolutional neural networks. In: 32nd SIBGRAPI Conference on Graphics, Patterns and Images Tutorials (SIBGRAPI-T) (2019)","DOI":"10.1109\/SIBGRAPI-T.2019.00010"},{"key":"34_CR43","doi-asserted-by":"crossref","unstructured":"Tammina, S.: Transfer learning using VGG-16 with deep convolutional neural network for classifying images (2019)","DOI":"10.29322\/IJSRP.9.10.2019.p9420"},{"key":"34_CR44","doi-asserted-by":"crossref","unstructured":"Tan, B., Schuckers, S.C.: New approach for liveness detection in fingerprint scanners based on valley noise analysis. J. Electron. Imaging (2008)","DOI":"10.1117\/1.2885133"},{"key":"34_CR45","unstructured":"Vaswani, A., et al.: Attention is all you need. In: Advances in Neural Information Processing Systems (2017)"},{"key":"34_CR46","doi-asserted-by":"crossref","unstructured":"Wang, R., Jeon, J.W.: Design of real-time sift feature extraction. In: IECON - 43rd Annual Conference of the IEEE Industrial Electronics Society (2017)","DOI":"10.1109\/IECON.2017.8216600"},{"key":"34_CR47","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/s13042-010-0001-0","volume":"1","author":"Y Zhang","year":"2010","unstructured":"Zhang, Y., Jin, R., Zhou, Z.H.: Understanding bag-of-words model: a statistical framework. Int. J. Mach. Learn. Cybern. 1, 43\u201352 (2010)","journal-title":"Int. J. Mach. Learn. Cybern."}],"container-title":["Communications in Computer and Information Science","Computer Vision and Image Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-58174-8_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,2]],"date-time":"2024-07-02T09:03:38Z","timestamp":1719911018000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-58174-8_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031581731","9783031581748"],"references-count":47,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-58174-8_34","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"3 July 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CVIP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computer Vision and Image Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Jammu","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 November 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 November 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cvip2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iitjammu.ac.in\/cvip2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Online CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"461","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"140","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"30% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}