{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T20:13:32Z","timestamp":1771532012776,"version":"3.50.1"},"publisher-location":"Cham","reference-count":41,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031844560","type":"print"},{"value":"9783031844577","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-84457-7_18","type":"book-chapter","created":{"date-parts":[[2025,3,4]],"date-time":"2025-03-04T10:06:11Z","timestamp":1741082771000},"page":"289-312","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Fingerprint Synthesis from Diffusion Models and\u00a0Generative Adversarial Networks"],"prefix":"10.1007","author":[{"given":"Weizhong","family":"Tang","sequence":"first","affiliation":[]},{"given":"Diego Andre Figueroa","family":"Llamosas","sequence":"additional","affiliation":[]},{"given":"Donglin","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Kerstin","family":"Johnsson","sequence":"additional","affiliation":[]},{"given":"Alexandros","family":"Sopasakis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,4]]},"reference":[{"key":"18_CR1","doi-asserted-by":"publisher","unstructured":"Marcel, S., Fierrez, J., Evans, N.: Handbook of biometric anti-spoofing: Presentation attack detection and vulnerability assessment. In: Marcel, S., Fierrez, J., Evans, N. (eds.) Advances in Computer Vision and Pattern Recognition, 2023, 3rd edn. Springer, ISBN: 978-981-19-5288-3. Springer (2023). https:\/\/doi.org\/10.1007\/978-981-19-5288-3","DOI":"10.1007\/978-981-19-5288-3"},{"key":"18_CR2","unstructured":"Ho, J., Jain, A., Abbeel, P.: Denoising diffusion probabilistic models. In: Larochelle, H., Ranzato, M., Hadsell, R., Balcan, M.F., Lin, H. (eds.) Advances in Neural Information Processing Systems, vol.\u00a033, pp. 6840\u20136851. Curran Associates, Inc. (2020). https:\/\/proceedings.neurips.cc\/paper_files\/paper\/2020\/file\/4c5bcfec8584af0d967f1ab10179ca4b-Paper.pdf"},{"key":"18_CR3","unstructured":"Heusel, M., Ramsauer, H., Unterthiner, T., Nessler, B., Hochreiter, S.: GANs trained by a two time-scale update rule converge to a local nash equilibrium. In: Guyon, I., et al. (eds.) Advances in Neural Information Processing Systems, volume\u00a030. Curran Associates, Inc. (2017). https:\/\/proceedings.neurips.cc\/paper_files\/paper\/2017\/file\/8a1d694707eb0fefe65871369074926d-Paper.pdf"},{"key":"18_CR4","unstructured":"Bi\u0144kowski, M., Sutherland, D.J., Arbel, M., Gretton, A.: Demystifying MMD GANs. In: International Conference on Learning Representations (2018). https:\/\/openreview.net\/forum?id=r1lUOzWCW"},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Maltoni, D., Maio, D., Jain, A.K., Prabhakar, S.: Handbook of Fingerprint Recognition. Springer Professional Computing. Springer, London (2009)9781848822542","DOI":"10.1007\/978-1-84882-254-2"},{"key":"18_CR6","unstructured":"Kynk\u00e4\u00e4nniemi, T., Karras, T., Laine, S., Lehtinen, J., Aila, T.: Improved precision and recall metric for assessing generative models. In: Wallach, H., Larochelle, H., Beygelzimer, A., d\u2019Alch\u00e9-Buc, F., Fox, E., Garnett, R. (eds.) Advances in Neural Information Processing Systems, vol.\u00a032. Curran Associates, Inc. (2019). https:\/\/proceedings.neurips.cc\/paper_files\/paper\/2019\/file\/0234c510bc6d908b28c70ff313743079-Paper.pdf"},{"key":"18_CR7","unstructured":"Naeem, M.F., Oh, S.J., Uh, Y., Choi, Y., Yoo, J.: Reliable fidelity and diversity metrics for generative models. In: Daum\u00e9 III, H., Singh, A. (eds.) Proceedings of the 37th International Conference on Machine Learning, vol. 119. Proceedings of Machine Learning Research, pp. 7176\u20137185. PMLR, 13\u201318 Jul 2020. https:\/\/proceedings.mlr.press\/v119\/naeem20a.html"},{"key":"18_CR8","unstructured":"Salimans, T., Goodfellow, I., Zaremba, W., Cheung, V., Radford, A., Chen, X., Chen, X.: Improved techniques for training GANs. In: Lee, D., Sugiyama, M., Luxburg, U., Guyon, I., Garnett, R. (eds.) Advances in Neural Information Processing Systems, vol. 29. Curran Associates, Inc. (2016). https:\/\/proceedings.neurips.cc\/paper_files\/paper\/2016\/file\/8a3363abe792db2d8761d6403605aeb7-Paper.pdf"},{"key":"18_CR9","doi-asserted-by":"publisher","unstructured":"Cappelli, R., Erol, A., Maio, D., Maltoni, D.: Synthetic fingerprint-image generation. In: Proceedings 15th International Conference on Pattern Recognition. ICPR-2000, vol.\u00a03, pp. 471\u2013474 (2000). https:\/\/doi.org\/10.1109\/ICPR.2000.903586","DOI":"10.1109\/ICPR.2000.903586"},{"key":"18_CR10","doi-asserted-by":"publisher","unstructured":"Cappelli, R., Maio, D., Maltoni, D.: Synthetic fingerprint-database generation. In: 2002 International Conference on Pattern Recognition, vol.\u00a03, pp. 744\u2013747 (2002). https:\/\/doi.org\/10.1109\/ICPR.2002.1048096","DOI":"10.1109\/ICPR.2002.1048096"},{"issue":"3","key":"18_CR11","doi-asserted-by":"publisher","first-page":"517","DOI":"10.1360\/jos180517","volume":"18","author":"H Jin","year":"2007","unstructured":"Jin, H., Tian, J., Chen, X.-J., Yang, X., Shi, P.: A synthetic fingerprint generation method and its implementation. J. Softw. 18(3), 517\u2013526 (2007)","journal-title":"J. Softw."},{"key":"18_CR12","doi-asserted-by":"publisher","unstructured":"Cui, J., Wang, Y., Huang, J., Tan, T., Sun, Z.: An iris image synthesis method based on PCA and super-resolution. In: Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004, vol. 4, pp. 471\u2013474 (2004). https:\/\/doi.org\/10.1109\/ICPR.2004.1333804","DOI":"10.1109\/ICPR.2004.1333804"},{"key":"18_CR13","unstructured":"Makthal, S., Ross, A.: Synthesis of iris images using markov random fields. In: 2005 13th European Signal Processing Conference, pp. 1\u20134 (2005)"},{"issue":"9","key":"18_CR14","doi-asserted-by":"publisher","first-page":"1489","DOI":"10.1109\/TPAMI.2007.1087","volume":"29","author":"R Cappelli","year":"2007","unstructured":"Cappelli, R., Maio, D., Lumini, A., Maltoni, D.: Fingerprint image reconstruction from standard templates. IEEE Trans. Pattern Anal. Mach. Intell. 29(9), 1489\u20131503 (2007). https:\/\/doi.org\/10.1109\/TPAMI.2007.1087","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"18_CR15","doi-asserted-by":"publisher","unstructured":"Rahmes, M., Allen, J.D., Elharti, A., Tenali, G.B.: Fingerprint reconstruction method using partial differential equation and exemplar-based inpainting methods. In: 2007 Biometrics Symposium, pp. 1\u20136 (2007). https:\/\/doi.org\/10.1109\/BCC.2007.4430539","DOI":"10.1109\/BCC.2007.4430539"},{"issue":"4","key":"18_CR16","doi-asserted-by":"publisher","first-page":"544","DOI":"10.1109\/TPAMI.2007.1018","volume":"29","author":"A Ross","year":"2007","unstructured":"Ross, A., Shah, J., Jain, A.K.: From template to image: reconstructing fingerprints from minutiae points. IEEE Trans. Pattern Anal. Mach. Intell. 29(4), 544\u2013560 (2007). https:\/\/doi.org\/10.1109\/TPAMI.2007.1018","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"18_CR17","doi-asserted-by":"crossref","unstructured":"Feng, J., Jain, A.K.: FM model based fingerprint reconstruction from minutiae template. In: Advances in Biometrics: Third International Conference, ICB 2009, Alghero, Italy, June 2-5, 2009. Proceedings 3, pp. 544\u2013553. Springer (2009). ISBN 978-3-642-01793-3","DOI":"10.1007\/978-3-642-01793-3_56"},{"issue":"2","key":"18_CR18","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1109\/TPAMI.2010.77","volume":"33","author":"J Feng","year":"2011","unstructured":"Feng, J., Jain, A.K.: Fingerprint reconstruction: From minutiae to phase. IEEE Trans. Pattern Anal. Mach. Intell. 33(2), 209\u2013223 (2011). https:\/\/doi.org\/10.1109\/TPAMI.2010.77","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"1","key":"18_CR19","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1109\/TIFS.2014.2363951","volume":"10","author":"K Cao","year":"2015","unstructured":"Cao, K., Jain, A.K.: Learning fingerprint reconstruction: From minutiae to image. IEEE Trans. Inf. Forensics Secur. 10(1), 104\u2013117 (2015). https:\/\/doi.org\/10.1109\/TIFS.2014.2363951","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"18_CR20","doi-asserted-by":"publisher","unstructured":"Johnson, P., Hua, F., Schuckers, S.: Texture modeling for synthetic fingerprint generation. In: 2013 IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp. 154\u2013159 (2013). https:\/\/doi.org\/10.1109\/CVPRW.2013.30","DOI":"10.1109\/CVPRW.2013.30"},{"key":"18_CR21","unstructured":"Goodfellow, I., et al.: Generative Adversarial Nets. In:\u00a0Ghahramani, Z., Welling, M., Cortes, C., Lawrence, N., Weinberger, K.Q. (eds.) Advances in Neural Information Processing Systems, vol.\u00a027. Curran Associates, Inc. (2014). https:\/\/proceedings.neurips.cc\/paper_files\/paper\/2014\/file\/5ca3e9b122f61f8f06494c97b1afccf3-Paper.pdf"},{"key":"18_CR22","unstructured":"Minaee, S., Abdolrashidi, A.: Finger-GAN: generating realistic fingerprint images using connectivity imposed GAN. CoRR, abs\/1812.10482 (2018). http:\/\/arxiv.org\/abs\/1812.10482"},{"key":"18_CR23","doi-asserted-by":"publisher","unstructured":"Kim, H., Cui, X., Kim, M.-G., Nguyen, T.H.B.: Fingerprint generation and presentation attack detection using deep neural networks. In: 2019 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR), pp. 375\u2013378 (2019). https:\/\/doi.org\/10.1109\/MIPR.2019.00074","DOI":"10.1109\/MIPR.2019.00074"},{"key":"18_CR24","doi-asserted-by":"publisher","unstructured":"An-Nur Islam Fahim, M., Jung, H.Y.: A lightweight GAN network for large scale fingerprint generation. IEEE Access 8, 92918\u201392928 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2994371","DOI":"10.1109\/ACCESS.2020.2994371"},{"key":"18_CR25","doi-asserted-by":"publisher","unstructured":"Zhong, C., Xu, P., Zhu, L.: A deep convolutional generative adversarial network-based fake fingerprint generation method. In: 2021 IEEE International Conference on Computer Science, Electronic Information Engineering and Intelligent Control Technology (CEI), pp. 63\u201367 (2021). https:\/\/doi.org\/10.1109\/CEI52496.2021.9574508","DOI":"10.1109\/CEI52496.2021.9574508"},{"key":"18_CR26","doi-asserted-by":"publisher","unstructured":"Striuk, O., Kondratenko, Y.: Adaptive deep convolutional GAN for fingerprint sample synthesis. In: 2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT), pages 193\u2013196, 2021. https:\/\/doi.org\/10.1109\/AICT52120.2021.9628978","DOI":"10.1109\/AICT52120.2021.9628978"},{"key":"18_CR27","doi-asserted-by":"publisher","unstructured":"Bahmani, K., Plesh, R., Johnson, P., Schuckers, S., Swyka, T.: High fidelity fingerprint generation: quality, uniqueness, and privacy. In: 2021 IEEE International Conference on Image Processing (ICIP), pp. 3018\u20133022 (2021). https:\/\/doi.org\/10.1109\/ICIP42928.2021.9506386","DOI":"10.1109\/ICIP42928.2021.9506386"},{"key":"18_CR28","doi-asserted-by":"publisher","unstructured":"Zhu, J.-Y., Park, T., Isola, P., Efros, A.A.: Unpaired image-to-image translation using cycle-consistent adversarial networks. In: 2017 IEEE International Conference on Computer Vision (ICCV), pp. 2242\u20132251 (2017). https:\/\/doi.org\/10.1109\/ICCV.2017.244","DOI":"10.1109\/ICCV.2017.244"},{"key":"18_CR29","doi-asserted-by":"publisher","unstructured":"Vieira Wyzykowski, A., Segundo, M., de\u00a0Paula\u00a0Lemes, R.: Level three synthetic fingerprint generation. In: 2020 25th International Conference on Pattern Recognition (ICPR), pp. 9250\u20139257, Los Alamitos, CA, USA, Jan 2021. IEEE Computer Society. https:\/\/doi.org\/10.1109\/ICPR48806.2021.9412304. https:\/\/doi.ieeecomputersociety.org\/10.1109\/ICPR48806.2021.9412304","DOI":"10.1109\/ICPR48806.2021.9412304"},{"key":"18_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s00034-022-02089-1","volume":"41","author":"A Sams","year":"2022","unstructured":"Sams, A., Shomee, H., Rahman, S.: High-quality synthetic fingerprint generation using GANs: HQ-finGAN. Circuits Systems Signal Process. 41, 1\u201316 (2022). https:\/\/doi.org\/10.1007\/s00034-022-02089-1","journal-title":"Circuits Systems Signal Process."},{"key":"18_CR31","doi-asserted-by":"publisher","unstructured":"Y.\u00a0Zhu, X.\u00a0Yin, and J.\u00a0Hu. FingerGAN: A constrained fingerprint generation scheme for latent fingerprint enhancement. IEEE Transactions on Pattern Analysis and Machine Intelligence, 45(07):8358\u20138371, Jul 2023. ISSN 1939-3539. https:\/\/doi.org\/10.1109\/TPAMI.2023.3236876","DOI":"10.1109\/TPAMI.2023.3236876"},{"key":"18_CR32","doi-asserted-by":"publisher","first-page":"730","DOI":"10.1109\/TIFS.2022.3227762","volume":"18","author":"SA Grosz","year":"2023","unstructured":"Grosz, S.A., Jain, A.K.: SpoofGAN: Synthetic fingerprint spoof images. IEEE Trans. Inf. Forensics Secur. 18, 730\u2013743 (2023). https:\/\/doi.org\/10.1109\/TIFS.2022.3227762","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"18_CR33","unstructured":"Llamosas, D.A.F., Tang, W.: Fingerprint Synthesis Using Deep Generative Models. ISSN 1404-6342, LUTFMA-3502-2023, Lund University, Mathematics (2023)"},{"key":"18_CR34","unstructured":"Dhariwal, P., Nichol, A.: Diffusion models beat GANs on image synthesis. In: Ranzato, M., Beygelzimer, A., Dauphin, Y., Liang, P.S., Wortman Vaughan, J. (eds.) Advances in Neural Information Processing Systems, vol. 34, pp. 8780\u20138794. Curran Associates, Inc. (2021). https:\/\/proceedings.neurips.cc\/paper_files\/paper\/2021\/file\/49ad23d1ec9fa4bd8d77d02681df5cfa-Paper.pdf"},{"key":"18_CR35","unstructured":"Nichol, A.Q., Dhariwal, P.: Improved denoising diffusion probabilistic models. In: Meila, M., Zhang, T. (eds.) Proceedings of the 38th International Conference on Machine Learning, vol. 139. Proceedings of Machine Learning Research, pp. 8162\u20138171. PMLR, 18\u201324 July 2021. https:\/\/proceedings.mlr.press\/v139\/nichol21a.html"},{"key":"18_CR36","doi-asserted-by":"publisher","unstructured":"Villani, C.: The Wasserstein distances, pp. 93\u2013111. Springer, Heidelberg (2009). ISBN 978-3-540-71050-9.https:\/\/doi.org\/10.1007\/978-3-540-71050-9_6. URLhttps:\/\/doi.org\/10.1007\/978-3-540-71050-9_6","DOI":"10.1007\/978-3-540-71050-9_6 10.1007\/978-3-540-71050-9_6"},{"key":"18_CR37","unstructured":"Gulrajani, I., Ahmed, F., Arjovsky, M., Dumoulin, V., Courville, A.C.: Improved training of wasserstein GANs. In: Guyon, I., et al. (eds.) Advances in Neural Information Processing Systems, vol.\u00a030. Curran Associates, Inc. (2017). https:\/\/proceedings.neurips.cc\/paper_files\/paper\/2017\/file\/892c3b1c6dccd52936e27cbd0ff683d6-Paper.pdf"},{"key":"18_CR38","unstructured":"Arjovsky, M., Chintala, S., Bottou, L.: Wasserstein generative adversarial networks. In: Precup, D., Teh, Y.W. (eds.) Proceedings of the 34th International Conference on Machine Learning, vol.\u00a070. Proceedings of Machine Learning Research, pp. 214\u2013223. PMLR, 06\u201311 Aug 2017. https:\/\/proceedings.mlr.press\/v70\/arjovsky17a.html"},{"key":"18_CR39","doi-asserted-by":"publisher","unstructured":"Luleci, F., Necati Catbas, F., Avci, O.: CycleGAN for undamaged-to-damaged domain translation for structural health monitoring and damage detection. Mech. Syst. Signal Process. 197, 110370 (2023). ISSN 0888-3270. https:\/\/doi.org\/10.1016\/j.ymssp.2023.110370. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0888327023002777","DOI":"10.1016\/j.ymssp.2023.110370"},{"key":"18_CR40","unstructured":"Sajjadi, M.S.M., Bachem, O., Lucic, M., Bousquet, O., Gelly, S.: Assessing generative models via precision and recall. Advances in neural information processing systems, 31 (2018)"},{"key":"18_CR41","unstructured":"Kingma, D.P., Adam, J.B.: A method for stochastic optimization. In: Bengio, Y., LeCun, Y. (eds.) 3rd International Conference on Learning Representations, ICLR 2015, San Diego, CA, USA, May 7-9, 2015, Conference Track Proceedings (2015). http:\/\/arxiv.org\/abs\/1412.6980"}],"container-title":["Lecture Notes in Networks and Systems","Advances in Information and Communication"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-84457-7_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,4]],"date-time":"2025-03-04T10:06:22Z","timestamp":1741082782000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-84457-7_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031844560","9783031844577"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-84457-7_18","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"value":"2367-3370","type":"print"},{"value":"2367-3389","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"4 March 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FICC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Future of Information and Communication Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Berlin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 April 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 April 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ficc2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/saiconference.com\/FICC","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}