{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T06:04:48Z","timestamp":1769580288538,"version":"3.49.0"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2018,6,30]],"date-time":"2018-06-30T00:00:00Z","timestamp":1530316800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1007\/s00521-018-3609-8","type":"journal-article","created":{"date-parts":[[2018,6,30]],"date-time":"2018-06-30T14:08:05Z","timestamp":1530367685000},"page":"4789-4798","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":35,"title":["Research on partial fingerprint recognition algorithm based on deep learning"],"prefix":"10.1007","volume":"31","author":[{"given":"Fanfeng","family":"Zeng","sequence":"first","affiliation":[]},{"given":"Shengda","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Ke","family":"Xiao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,30]]},"reference":[{"issue":"2","key":"3609_CR1","first-page":"194","volume":"46","author":"X Lin","year":"2006","unstructured":"Lin X, Huang X, Xiaosheng SU et al (2006) Progress of biometric technology standardization. J Tsinghua Univ 46(2):194\u2013198","journal-title":"J Tsinghua Univ"},{"issue":"1","key":"3609_CR2","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/j.sigpro.2012.06.021","volume":"93","author":"MAW Shalaby","year":"2013","unstructured":"Shalaby MAW, Ahmad MO (2013) A multilevel structural technique for fingerprint representation and matching. Sig Process 93(1):56\u201369","journal-title":"Sig Process"},{"key":"3609_CR3","first-page":"213","volume":"2","author":"DM Sun","year":"2001","unstructured":"Sun DM, Qiu ZD (2001) Survey of the emerging biometric technology. Acta Electron Sin 2:213\u2013218","journal-title":"Acta Electron Sin"},{"key":"3609_CR4","unstructured":"Monika KM (2015) A novel fingerprint minutiae matching using LBP. In: International conference on reliability, INFOCOM technologies and optimization. IEEE, pp 1\u20134"},{"issue":"3","key":"3609_CR5","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1520\/JTE102488","volume":"38","author":"MR Mitchell","year":"2010","unstructured":"Mitchell MR, Link RE, Masmoudi AD et al (2010) Implementation of a fingerprint recognition system using LBP descriptor. J Test Eval 38(3):369\u2013382","journal-title":"J Test Eval"},{"key":"3609_CR6","first-page":"189","volume-title":"Lecture Notes in Electrical Engineering","author":"Munalih Ahmad Syarif","year":"2014","unstructured":"Syarif MA, Ong TS, Tee C (2014) Fingerprint recognition based on multi-resolution histogram of gradient descriptors. In: The 8th international conference on robotic, vision, signal processing and power applications. Springer, Singapore, pp 189\u2013196"},{"key":"3609_CR7","doi-asserted-by":"crossref","unstructured":"Gottschlich C, Marasco E, Yang AY et al (2014) Fingerprint liveness detection based on histograms of invariant gradients. In: IEEE international joint conference on biometrics. IEEE, pp 1\u20137","DOI":"10.1109\/BTAS.2014.6996224"},{"key":"3609_CR8","first-page":"263","volume":"8","author":"Y Zhong","year":"2015","unstructured":"Zhong Y, Peng X (2015) SIFT-based low-quality fingerprint LSH retrieval and recognition method. Int J Signal Process Image Process Pattern Recognit 8:263\u2013272","journal-title":"Int J Signal Process Image Process Pattern Recognit"},{"key":"3609_CR9","doi-asserted-by":"crossref","unstructured":"Park U, Pankanti S, Jain AK (2008) Fingerprint verification using SIFT features. In: SPIE defense and security symposium. international society for optics and photonics, pp 69440K\u201369440K-9","DOI":"10.1117\/12.778804"},{"key":"3609_CR10","unstructured":"Awad AI, Baba K (2012) Evaluation of a fingerprint identification algorithm with SIFT features. In: Iiai international conference on advanced applied informatics. IEEE Computer Society, pp 129\u2013132"},{"issue":"8","key":"3609_CR11","first-page":"19","volume":"48","author":"V Lathajothi","year":"2013","unstructured":"Lathajothi V, Arumugam S (2013) High-resolution fingerprint matching using level 3 incipient ridges and scars. Int J Comput Appl 48(8):19\u201322","journal-title":"Int J Comput Appl"},{"issue":"1","key":"3609_CR12","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1109\/TPAMI.2010.59","volume":"33","author":"AK Jain","year":"2011","unstructured":"Jain AK, Feng J (2011) Latent fingerprint matching. IEEE Trans Pattern Anal Mach Intell 33(1):88","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"06","key":"3609_CR13","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1142\/S0218001413560090","volume":"27","author":"Fanglin Chen","year":"2013","unstructured":"Chen Fanglin, Li Ming, Zhang Yi (2013) A fusion method for partial fingerprint recognition. Int J Pattern Recognit Artif Intelligence 27(06):121\u201365390D9","journal-title":"Int J Pattern Recognit Artif Intelligence"},{"issue":"1","key":"3609_CR14","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1049\/iet-bmt.2015.0018","volume":"5","author":"B Fernandez-Saavedra","year":"2016","unstructured":"Fernandez-Saavedra B, Sanchez-Reillo R, Ros-Gomez R et al (2016) Small fingerprint scanners used in mobile devices: the impact on biometric performance. Iet Biom 5(1):28\u201336","journal-title":"Iet Biom"},{"key":"3609_CR15","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1016\/j.eswa.2017.06.019","volume":"87","author":"W Lee","year":"2017","unstructured":"Lee W, Cho S, Choi H et al (2017) Partial fingerprint matching using minutiae and ridge shape features for small fingerprint scanners. Expert Syst Appl 87:183\u2013198","journal-title":"Expert Syst Appl"},{"key":"3609_CR16","doi-asserted-by":"crossref","unstructured":"Miron R, Letia T (2010) Fuzzy logic decision in partial fingerprint recognition. In: IEEE Computer Society","DOI":"10.1109\/AQTR.2010.5520777"},{"key":"3609_CR17","doi-asserted-by":"crossref","unstructured":"Zanganeh O, Srinivasan B, Bhattacharjee N (2014) Partial fingerprint matching through region-based similarity. In: International conference on digital image computing: techniques and applications. IEEE, pp 1\u20138","DOI":"10.1109\/DICTA.2014.7008121"},{"issue":"1","key":"3609_CR18","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/TPAMI.2010.73","volume":"33","author":"Y Wang","year":"2011","unstructured":"Wang Y, Hu J (2011) Global Ridge orientation modeling for partial fingerprint identification. IEEE Trans Pattern Anal Mach Intell 33(1):72\u201387","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"3609_CR19","unstructured":"Zhang S, Gong Y, Wang J (2017) The development of deep convolution neural network and its applications on computer vision, vol 40, Online Publishing No. 144"},{"key":"3609_CR20","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1016\/j.neucom.2017.12.057","volume":"283","author":"H Kuang","year":"2018","unstructured":"Kuang H, Liu C, Chan LLH et al (2018) Multi-class fruit detection based on image region selection and improved object proposals. Neurocomputing 283:241\u2013255","journal-title":"Neurocomputing"},{"key":"3609_CR21","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1016\/j.neucom.2017.12.020","volume":"282","author":"Q Sun","year":"2017","unstructured":"Sun Q, Wang Q, Zhang J et al (2017) Hyperlayer Bilinear Pooling with application to fine-grained categorization and image retrieval. Neurocomputing 282:174\u2013183","journal-title":"Neurocomputing"},{"issue":"5","key":"3609_CR22","doi-asserted-by":"publisher","first-page":"051101","DOI":"10.1007\/s11432-017-9189-6","volume":"61","author":"Q Geng","year":"2018","unstructured":"Geng Q, Zhou Z, Cao X (2018) Survey of recent progress in semantic image segmentation with CNNs. Sci China Inf Sci 61(5):051101","journal-title":"Sci China Inf Sci"},{"key":"3609_CR23","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.eswa.2017.11.028","volume":"95","author":"D Han","year":"2018","unstructured":"Han D, Liu Q, Fan W (2018) A new image classification method using CNN transfer learning and web data augmentation. Expert Syst Appl 95:43\u201356","journal-title":"Expert Syst Appl"},{"key":"3609_CR24","unstructured":"Zhang F, Feng J High-resolution mobile fingerprint matching via deep joint KNN-triplet embedding. In: Proceedings of the thirty-first AAAI conference on artificial intelligence (AAAI-17)"},{"issue":"11","key":"3609_CR25","first-page":"3212","volume":"37","author":"Y Zhang","year":"2017","unstructured":"Zhang Y, Zhou B, Zan X (2017) Small-size fingerprint matching based on deep learning. J Comput Appl 37(11):3212\u20133218","journal-title":"J Comput Appl"},{"issue":"7","key":"3609_CR26","first-page":"1585","volume":"39","author":"WU Zhendong","year":"2017","unstructured":"Zhendong WU, Wang Y, Zhang J et al (2017) Fouling and damaged fingerprint recognition based on deep learning. J Electron Inf Technol 39(7):1585\u20131591","journal-title":"J Electron Inf Technol"},{"key":"3609_CR27","unstructured":"Espiritu JD, Rolluqui G, Gustilo RC (2016) Neural network based partial fingerprint recognition as support for forensics. In: international conference on humanoid, nanotechnology, information technology, communication and control, environment and management. IEEE, pp 1\u20135"},{"key":"3609_CR28","series-title":"IEEE conference on computer vision and pattern recognition","first-page":"770","volume-title":"Deep residual learning for image recognition","author":"K He","year":"2016","unstructured":"He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. IEEE conference on computer vision and pattern recognition. IEEE, Las Vegas, pp 770\u2013778"},{"key":"3609_CR29","doi-asserted-by":"publisher","first-page":"630","DOI":"10.1007\/978-3-319-46493-0_38","volume-title":"Computer Vision \u2013 ECCV 2016","author":"Kaiming He","year":"2016","unstructured":"He K, Zhang X, Ren S, Sun J (2016) Identity mappings in deep residual networks. European conference on computer vision. Springer, Cham, pp 630\u2013645"},{"key":"3609_CR30","doi-asserted-by":"crossref","unstructured":"Zagoruyko S, Komodakis N (2016) Wide residual networks. British machine vision conference, pp 87.1\u201387.12","DOI":"10.5244\/C.30.87"},{"key":"3609_CR31","unstructured":"Li Q, Sun Z, He R, Tan T (2017) Deep supervised discrete hashing. arXiv:1705.10999"},{"key":"3609_CR32","doi-asserted-by":"crossref","unstructured":"Liu H, Wang R, Shan S et al (2016) Deep supervised hashing for fast image retrieval. In: Computer vision and pattern recognition. IEEE, pp 2064\u20132072","DOI":"10.1109\/CVPR.2016.227"},{"key":"3609_CR33","unstructured":"Watson CI (1992) NIST special database 4, fingerprint database. National Institute of Standards & Technology"},{"key":"3609_CR34","unstructured":"Ioffe S, Szegedy C (2015) Batch normalization: accelerating deep network training by reducing internal Covariate shift, pp 448\u2013456"},{"issue":"1","key":"3609_CR35","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1002\/int.21948","volume":"33","author":"D Peralta","year":"2018","unstructured":"Peralta D, Triguero I, Garc\u00eda S et al (2018) On the use of convolutional neural networks for robust classification of multiple fingerprint captures. Int J Intell Syst 33(1):213\u2013230","journal-title":"Int J Intell Syst"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-018-3609-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00521-018-3609-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-018-3609-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,7]],"date-time":"2024-07-07T21:30:14Z","timestamp":1720387814000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00521-018-3609-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,30]]},"references-count":35,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2019,9]]}},"alternative-id":["3609"],"URL":"https:\/\/doi.org\/10.1007\/s00521-018-3609-8","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"value":"0941-0643","type":"print"},{"value":"1433-3058","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,6,30]]},"assertion":[{"value":"29 March 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 June 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 June 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that there is no conflict of interest regarding the publication of this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This work is supported by the National Key Research and Development Program under Grant 2017YFB0802300.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Funding"}}]}}