{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T03:46:53Z","timestamp":1772250413577,"version":"3.50.1"},"reference-count":67,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2021,8,24]],"date-time":"2021-08-24T00:00:00Z","timestamp":1629763200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,8,24]],"date-time":"2021-08-24T00:00:00Z","timestamp":1629763200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimedia Systems"],"published-print":{"date-parts":[[2022,8]]},"DOI":"10.1007\/s00530-021-00810-9","type":"journal-article","created":{"date-parts":[[2021,8,24]],"date-time":"2021-08-24T08:02:48Z","timestamp":1629792168000},"page":"1325-1337","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":58,"title":["Multimodal biometric authentication based on deep fusion of electrocardiogram (ECG) and finger vein"],"prefix":"10.1007","volume":"28","author":[{"given":"Basma Abd","family":"El-Rahiem","sequence":"first","affiliation":[]},{"given":"Fathi E. Abd","family":"El-Samie","sequence":"additional","affiliation":[]},{"given":"Mohamed","family":"Amin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,24]]},"reference":[{"key":"810_CR1","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/j.patrec.2018.02.015","volume":"126","author":"M Sajjad","year":"2019","unstructured":"Sajjad, M., Khan, S., Hussain, T., Muhammad, K., Sangaiah, A.K., Castiglione, A., Baik, S.W.: CNN-based anti-spoofing two-tier multi-factor authentication system. Pattern Recogn. Lett. 126, 123\u2013131 (2019)","journal-title":"Pattern Recogn. Lett."},{"issue":"3","key":"810_CR2","doi-asserted-by":"publisher","first-page":"444","DOI":"10.3390\/sym12030444","volume":"12","author":"A Herbadji","year":"2020","unstructured":"Herbadji, A., Akhtar, Z., Siddique, K., Guermat, N., Ziet, L., Cheniti, M., Muhammad, K.: Combining multiple biometric traits using asymmetric aggregation operators for improved person recognition. Symmetry 12(3), 444 (2020)","journal-title":"Symmetry"},{"key":"810_CR3","doi-asserted-by":"publisher","first-page":"17619","DOI":"10.1007\/s11042-019-08603-z","volume":"79","author":"S Fadl","year":"2020","unstructured":"Fadl, S., Megahed, A., Han, Q., Qiong, L.: Frame duplication and shuffling forgery detection technique in surveillance videos based on temporal average and gray level co-occurrence matrix. Multimedia Tools Appl. 79, 17619\u201317643 (2020)","journal-title":"Multimedia Tools Appl."},{"issue":"1","key":"810_CR4","doi-asserted-by":"publisher","first-page":"2425","DOI":"10.1007\/s10586-017-1287-4","volume":"22","author":"AA Abd El-Latif","year":"2019","unstructured":"Abd El-Latif, A.A., Hossain, M.S., Wang, N.: Score level multibiometrics fusion approach for healthcare. Clust. Comput. 22(1), 2425\u20132436 (2019)","journal-title":"Clust. Comput."},{"key":"810_CR5","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1016\/j.future.2018.02.040","volume":"85","author":"Z Ali","year":"2018","unstructured":"Ali, Z., Hossain, M.S., Muhammad, G., Ullah, I., Abachi, H., Alamri, A.: Edge-centric multimodal authentication system using encrypted biometric templates. Futur. Gener. Comput. Syst. 85, 76\u201387 (2018)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"810_CR6","doi-asserted-by":"publisher","first-page":"5531","DOI":"10.1109\/ACCESS.2017.2693438","volume":"5","author":"W Abdul","year":"2017","unstructured":"Abdul, W., Ali, Z., Ghouzali, S., Alfawaz, B., Muhammad, G., Hossain, M.S.: Biometric security through visual encryption for fog edge computing. IEEE Access 5, 5531\u20135538 (2017)","journal-title":"IEEE Access"},{"key":"810_CR7","unstructured":"Xiaoding, W., Garg, S., Lin, H., Jalilpiran, M., Hu, J., & Hossain, M. S. (2021). Enabling secure authentication in industrial IoT with transfer learning empowered Blockchain. IEEE Trans. Ind. Inf."},{"issue":"2","key":"810_CR8","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/s11036-017-0928-4","volume":"23","author":"MS Hossain","year":"2018","unstructured":"Hossain, M.S., Muhammad, G., Qurishi, M.A.: Verifying the images authenticity in cognitive internet of things (CIoT)-oriented cyber physical system. Mob. Netw. Appl. 23(2), 239\u2013250 (2018)","journal-title":"Mob. Netw. Appl."},{"key":"810_CR9","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1016\/j.future.2018.06.020","volume":"89","author":"R Gad","year":"2018","unstructured":"Gad, R., Talha, M., El-Latif, A.A.A., Zorkany, M., Ayman, E.S., Nawal, E.F., Muhammad, G.: Iris recognition using multi-algorithmic approaches for cognitive internet of things (CIoT) framework. Futur. Gener. Comput. Syst. 89, 178\u2013191 (2018)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"3","key":"810_CR10","doi-asserted-by":"publisher","first-page":"2339","DOI":"10.1007\/s11042-013-1551-4","volume":"72","author":"N Wang","year":"2014","unstructured":"Wang, N., Li, Q., El-Latif, A.A.A., Peng, J., Niu, X.: An enhanced thermal face recognition method based on multiscale complex fusion for Gabor coefficients. Multimedia Tools Appl. 72(3), 2339\u20132358 (2014)","journal-title":"Multimedia Tools Appl."},{"issue":"3","key":"810_CR11","doi-asserted-by":"publisher","first-page":"1411","DOI":"10.1007\/s11042-012-1278-7","volume":"71","author":"N Wang","year":"2014","unstructured":"Wang, N., Li, Q., El-Latif, A.A.A., Zhang, T., Niu, X.: Toward accurate localization and high recognition performance for noisy iris images. Multimedia Tools Appl. 71(3), 1411\u20131430 (2014)","journal-title":"Multimedia Tools Appl."},{"key":"810_CR12","doi-asserted-by":"crossref","unstructured":"Hammad, M., & Wang, K.: Fingerprint classification based on a Q-Gaussian multiclass support vector machine. In: Proceedings of the 2017 International Conference on Biometrics Engineering and Application, pp. 39\u201344 (2017)","DOI":"10.1145\/3077829.3077836"},{"key":"810_CR13","doi-asserted-by":"crossref","unstructured":"Omara, I., Emam, M., Hammad, M., Zuo, W.: Ear verification based on a novel local feature extraction. In: Proceedings of the 2017 International Conference on Biometrics Engineering and Application, pp. 28\u201332 (2017)","DOI":"10.1145\/3077829.3077834"},{"key":"810_CR14","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1016\/j.inffus.2018.12.003","volume":"52","author":"M Singh","year":"2019","unstructured":"Singh, M., Singh, R., Ross, A.: A comprehensive overview of biometric fusion. Inf. Fusion 52, 187\u2013205 (2019)","journal-title":"Inf. Fusion"},{"issue":"8","key":"810_CR15","doi-asserted-by":"publisher","first-page":"1886","DOI":"10.1587\/transinf.E96.D.1886","volume":"96","author":"J Peng","year":"2013","unstructured":"Peng, J., Li, Q., El-Latif, A.A.A., Wang, N., Niu, X.: Finger vein recognition with gabor wavelets and local binary patterns. IEICE Trans. Inf. Syst. 96(8), 1886\u20131889 (2013)","journal-title":"IEICE Trans. Inf. Syst."},{"key":"810_CR16","doi-asserted-by":"crossref","unstructured":"Alghamdi, A., Hammad, M., Ugail, H., Abdel-Raheem, A., Muhammad, K., Khalifa, H.S., Abd El-Latif, A.A.: Detection of myocardial infarction based on novel deep transfer learning methods for urban healthcare in smart cities. Multimedia Tools Appl. 1\u201322 (2020)","DOI":"10.1007\/s11042-020-08769-x"},{"key":"810_CR17","doi-asserted-by":"publisher","first-page":"634","DOI":"10.1016\/j.measurement.2018.05.033","volume":"125","author":"M Hammad","year":"2018","unstructured":"Hammad, M., Maher, A., Wang, K., Jiang, F., Amrani, M.: Detection of abnormal heart conditions based on characteristics of ECG signals. Measurement 125, 634\u2013644 (2018)","journal-title":"Measurement"},{"issue":"7","key":"810_CR18","doi-asserted-by":"publisher","first-page":"2047","DOI":"10.1007\/s00521-018-3616-9","volume":"30","author":"M Amrani","year":"2018","unstructured":"Amrani, M., Hammad, M., Jiang, F., Wang, K., Amrani, A.: Very deep feature extraction and fusion for arrhythmias detection. Neural Comput. Appl. 30(7), 2047\u20132057 (2018)","journal-title":"Neural Comput. Appl."},{"key":"810_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TIM.2020.3033072","volume":"70","author":"M Hammad","year":"2020","unstructured":"Hammad, M., Iliyasu, A.M., Subasi, A., Ho, E.S., Abd El-Latif, A.A.: A multitier deep learning model for arrhythmia detection. IEEE Trans. Instrum. Meas. 70, 1\u20139 (2020)","journal-title":"IEEE Trans. Instrum. Meas."},{"key":"810_CR20","doi-asserted-by":"crossref","unstructured":"Hammad, M., Alkinani, M.H., Gupta, B.B., Abd El-Latif, A.A.: Myocardial infarction detection based on deep neural network on imbalanced data. Multimedia Syst. 1\u201313 (2021)","DOI":"10.1007\/s00530-020-00728-8"},{"key":"810_CR21","doi-asserted-by":"crossref","unstructured":"Hammad, M., P\u0142awiak, P., Wang, K., Acharya, U.R.: ResNet\u2010Attention model for human authentication using ECG signals. Expert Syst. e12547 (2020)","DOI":"10.1111\/exsy.12547"},{"issue":"2","key":"810_CR22","doi-asserted-by":"publisher","first-page":"1857","DOI":"10.1007\/s11042-018-6300-2","volume":"78","author":"M Hammad","year":"2019","unstructured":"Hammad, M., Luo, G., Wang, K.: Cancelable biometric authentication system based on ECG. Multimedia Tools Appl. 78(2), 1857\u20131887 (2019)","journal-title":"Multimedia Tools Appl."},{"key":"810_CR23","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1016\/j.future.2019.06.008","volume":"101","author":"M Hammad","year":"2019","unstructured":"Hammad, M., Zhang, S., Wang, K.: A novel two-dimensional ECG feature extraction and classification algorithm based on convolution neural network for human authentication. Futur. Gener. Comput. Syst. 101, 180\u2013196 (2019)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"6A","key":"810_CR24","first-page":"959","volume":"13","author":"M Hammad","year":"2016","unstructured":"Hammad, M., Ibrahim, M., Hadhoud, M.: A novel biometric based on ECG signals and images for human authentication. Int. Arab J. Inf. Technol. 13(6A), 959\u2013964 (2016)","journal-title":"Int. Arab J. Inf. Technol."},{"key":"810_CR25","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1016\/j.neucom.2018.12.015","volume":"332","author":"K Su","year":"2019","unstructured":"Su, K., Yang, G., Wu, B., Yang, L., Li, D., Su, P., Yin, Y.: Human identification using finger vein and ECG signals. Neurocomputing 332, 111\u2013118 (2019)","journal-title":"Neurocomputing"},{"key":"810_CR26","doi-asserted-by":"crossref","unstructured":"Lu, Y., Xie, S.J., Yoon, S., Wang, Z., Park, D.S.: An available database for the research of finger vein recognition. In: 2013 6th International Congress on Image and Signal Processing (CISP), Vol. 1, pp. 410\u2013415. IEEE (2013)","DOI":"10.1109\/CISP.2013.6744030"},{"issue":"4","key":"810_CR27","doi-asserted-by":"publisher","first-page":"2228","DOI":"10.1109\/TIP.2011.2171697","volume":"21","author":"A Kumar","year":"2011","unstructured":"Kumar, A., Zhou, Y.: Human identification using finger images. IEEE Trans. Image Process. 21(4), 2228\u20132244 (2011)","journal-title":"IEEE Trans. Image Process."},{"key":"810_CR28","unstructured":"Lugovaya T.S. Biometric human identification based on electrocardiogram. [Master's thesis] Faculty of Computing Technologies and Informatics, Electrotechnical University \u201cLETI\u201d, Saint-Petersburg, Russian Federation (2005)"},{"issue":"23","key":"810_CR29","first-page":"e215","volume":"101","author":"AL Goldberger","year":"2003","unstructured":"Goldberger, A.L., Amaral, L.A.N., Glass, L., Hausdorff, J.M., Ivanov, PCh., Mark, R.G., Mietus, J.E., Moody, G.B., Peng, C.-K., Stanley, H.E.: PhysioBank, PhysioToolkit, and PhysioNet: components of a new research resource for complex physiologic signals. Circulation. 101(23), e215\u2013e220 (2003)","journal-title":"Circulation."},{"issue":"7","key":"810_CR30","doi-asserted-by":"publisher","first-page":"4244","DOI":"10.1109\/TII.2019.2900665","volume":"15","author":"W Yang","year":"2019","unstructured":"Yang, W., Wang, S., Hu, J., Zheng, G., Yang, J., Valli, C.: Securing deep learning based edge finger vein biometrics with binary decision diagram. IEEE Trans. Industr. Inf. 15(7), 4244\u20134253 (2019)","journal-title":"IEEE Trans. Industr. Inf."},{"key":"810_CR31","doi-asserted-by":"crossref","unstructured":"Hu, N., Ma, H., Zhan, T.: Finger vein biometric verification using block multi-scale uniform local binary pattern features and block two-directional two-dimension principal component analysis. Optik 163664 (2020)","DOI":"10.1016\/j.ijleo.2019.163664"},{"issue":"6","key":"810_CR32","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1109\/MCE.2019.2941343","volume":"8","author":"CY Liu","year":"2019","unstructured":"Liu, C.Y., Ruan, S.J., Lai, Y.R., Yao, C.Y.: Finger-vein as a biometric-based authentication. IEEE Consumer Electron. Mag. 8(6), 29\u201334 (2019)","journal-title":"IEEE Consumer Electron. Mag."},{"key":"810_CR33","doi-asserted-by":"crossref","unstructured":"Peng, J., Li, Q., Wang, N., El-Latif, A.A.A., Niu, X.: An effective preprocessing method for finger vein recognition. In Fifth International Conference on Digital Image Processing (ICDIP 2013), Vol. 8878, p. 887808. International Society for Optics and Photonics (2013)","DOI":"10.1117\/12.2030689"},{"key":"810_CR34","doi-asserted-by":"crossref","unstructured":"Peng, J., Wang, N., El-Latif, A.A.A., Li, Q., Niu, X.: Finger-vein verification using Gabor filter and sift feature matching. In: 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 45\u201348. IEEE (2012)","DOI":"10.1109\/IIH-MSP.2012.17"},{"issue":"2","key":"810_CR35","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/s00138-015-0745-3","volume":"27","author":"Y Matsuda","year":"2016","unstructured":"Matsuda, Y., Miura, N., Nagasaka, A., Kiyomizu, H., Miyatake, T.: Finger-vein authentication based on deformation-tolerant feature-point matching. Mach. Vis. Appl. 27(2), 237\u2013250 (2016)","journal-title":"Mach. Vis. Appl."},{"issue":"2","key":"810_CR36","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1504\/IJCAT.2015.068923","volume":"51","author":"J Peng","year":"2015","unstructured":"Peng, J., Li, Q., El-Latif, A.A.A., Niu, X.: Finger multibiometric cryptosystem based on score-level fusion. Int. J. Comput. Appl. Technol. 51(2), 120\u2013130 (2015)","journal-title":"Int. J. Comput. Appl. Technol."},{"issue":"5","key":"810_CR37","doi-asserted-by":"publisher","first-page":"623","DOI":"10.1016\/j.patrec.2011.11.002","volume":"33","author":"J Yang","year":"2012","unstructured":"Yang, J., Zhang, X.: Feature-level fusion of fingerprint and finger-vein for personal identification. Pattern Recogn. Lett. 33(5), 623\u2013628 (2012)","journal-title":"Pattern Recogn. Lett."},{"issue":"23","key":"810_CR38","doi-asserted-by":"publisher","first-page":"6891","DOI":"10.1016\/j.ijleo.2014.07.027","volume":"125","author":"J Peng","year":"2014","unstructured":"Peng, J., El-Latif, A.A.A., Li, Q., Niu, X.: Multimodal biometric authentication based on score level fusion of finger biometrics. Optik 125(23), 6891\u20136897 (2014)","journal-title":"Optik"},{"issue":"4","key":"810_CR39","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1109\/TBIOM.2020.2981673","volume":"2","author":"S Kirchgasser","year":"2020","unstructured":"Kirchgasser, S., Kauba, C., Lai, Y.L., Zhe, J., Uhl, A.: Finger vein template protection based on alignment-robust feature description and index-of-maximum hashing. IEEE Trans. Biometr. Behav. Identity Sci. 2(4), 337\u2013349 (2020)","journal-title":"IEEE Trans. Biometr. Behav. Identity Sci."},{"key":"810_CR40","doi-asserted-by":"crossref","unstructured":"Kauba, C., Prommegger, B., Uhl, A.: The two sides of the finger-an evaluation on the recognition performance of dorsal vs. palmar finger-veins. In: 2018 International Conference of the Biometrics Special Interest Group (BIOSIG), pp. 1\u20135. IEEE (2018)","DOI":"10.23919\/BIOSIG.2018.8553277"},{"key":"810_CR41","doi-asserted-by":"publisher","first-page":"163664","DOI":"10.1016\/j.ijleo.2019.163664","volume":"208","author":"N Hu","year":"2020","unstructured":"Hu, N., Ma, H., Zhan, T.: Finger vein biometric verification using block multi-scale uniform local binary pattern features and block two-directional two-dimension principal component analysis. Optik 208, 163664 (2020)","journal-title":"Optik"},{"key":"810_CR42","doi-asserted-by":"publisher","first-page":"50519","DOI":"10.1109\/ACCESS.2020.2979902","volume":"8","author":"X Meng","year":"2020","unstructured":"Meng, X., Xi, X., Li, Z., Zhang, Q.: Finger Vein recognition based on fusion of deformation information. IEEE Access 8, 50519\u201350530 (2020)","journal-title":"IEEE Access"},{"issue":"11","key":"810_CR43","doi-asserted-by":"publisher","first-page":"8690","DOI":"10.1109\/TIM.2020.3001410","volume":"69","author":"W Yang","year":"2020","unstructured":"Yang, W., Luo, W., Kang, W., Huang, Z., Wu, Q.: FVRAS-Net: an embedded finger-vein recognition and AntiSpoofing system using a unified CNN. IEEE Trans. Instrum. Meas. 69(11), 8690\u20138701 (2020)","journal-title":"IEEE Trans. Instrum. Meas."},{"key":"810_CR44","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1016\/j.compbiomed.2018.09.027","volume":"102","author":"Z Zhao","year":"2018","unstructured":"Zhao, Z., Zhang, Y., Deng, Y., Zhang, X.: ECG authentication system design incorporating a convolutional neural network and generalized S-Transformation. Comput. Biol. Med. 102, 168\u2013179 (2018)","journal-title":"Comput. Biol. Med."},{"key":"810_CR45","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/j.future.2017.11.037","volume":"81","author":"P Peris-Lopez","year":"2018","unstructured":"Peris-Lopez, P., Gonz\u00e1lez-Manzano, L., Camara, C., de Fuentes, J.M.: Effect of attacker characterization in ECG-based continuous authentication mechanisms for Internet of Things. Futur. Gener. Comput. Syst. 81, 67\u201377 (2018)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"5","key":"810_CR46","doi-asserted-by":"publisher","first-page":"9200","DOI":"10.1109\/JIOT.2019.2929087","volume":"6","author":"P Huang","year":"2019","unstructured":"Huang, P., Guo, L., Li, M., Fang, Y.: Practical Privacy-preserving ECG-based authentication for IoT-based Healthcare. IEEE Internet Things J. 6(5), 9200\u20139210 (2019)","journal-title":"IEEE Internet Things J."},{"key":"810_CR47","doi-asserted-by":"publisher","first-page":"51598","DOI":"10.1109\/ACCESS.2019.2912519","volume":"7","author":"Y Chu","year":"2019","unstructured":"Chu, Y., Shen, H., Huang, K.: ECG authentication method based on parallel multi-scale one-dimensional residual network with center and margin loss. IEEE Access 7, 51598\u201351607 (2019)","journal-title":"IEEE Access"},{"key":"810_CR48","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1016\/j.scs.2017.12.023","volume":"40","author":"JS Arteaga-Falconi","year":"2018","unstructured":"Arteaga-Falconi, J.S., Al Osman, H., El Saddik, A.: ECG and fingerprint bimodal authentication. Sustain. Cities Soc. 40, 274\u2013283 (2018)","journal-title":"Sustain. Cities Soc."},{"key":"810_CR49","unstructured":"Hsiao, C.-C., Wang, S.-W., Lin, R., Lee, R.-G.: Multiple biometric authentication for personal identity using wearable device. In: Systems, Man, and Cybernetics (SMC), 2016 IEEE International Conference on, pp. 000673-000678 (2016)"},{"key":"810_CR50","doi-asserted-by":"publisher","first-page":"26527","DOI":"10.1109\/ACCESS.2018.2886573","volume":"7","author":"M Hammad","year":"2018","unstructured":"Hammad, M., Liu, Y., Wang, K.: Multimodal biometric authentication systems using convolution neural network based on different level fusion of ECG and fingerprint. IEEE Access 7, 26527\u201326542 (2018)","journal-title":"IEEE Access"},{"key":"810_CR51","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/j.cose.2018.11.003","volume":"81","author":"M Hammad","year":"2019","unstructured":"Hammad, M., Wang, K.: Parallel score fusion of ECG and fingerprint for human authentication based on convolution neural network. Comput. Secur. 81, 107\u2013122 (2019)","journal-title":"Comput. Secur."},{"issue":"3","key":"810_CR52","doi-asserted-by":"publisher","first-page":"3799","DOI":"10.3390\/s130303799","volume":"13","author":"L Yang","year":"2013","unstructured":"Yang, L., Yang, G., Yin, Y., Xiao, R.: Sliding window-based region of interest extraction for finger vein images. Sensors 13(3), 3799\u20133815 (2013)","journal-title":"Sensors"},{"issue":"1","key":"810_CR53","first-page":"1929","volume":"15","author":"N Srivastava","year":"2014","unstructured":"Srivastava, N., Hinton, G., Krizhevsky, A., Sutskever, I., Salakhutdinov, R.: Dropout: a simple way to prevent neural networks from overfitting. J. Mach. Learn. Res. 15(1), 1929\u20131958 (2014)","journal-title":"J. Mach. Learn. Res."},{"key":"810_CR54","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/j.eswa.2015.10.047","volume":"47","author":"M Haghighat","year":"2016","unstructured":"Haghighat, M., Abdel-Mottaleb, M., Alhalabi, W.: Fully automatic face normalization and single sample face recognition in unconstrained environments. Expert Syst Appl 47, 23\u201334 (2016)","journal-title":"Expert Syst Appl"},{"issue":"4","key":"810_CR55","doi-asserted-by":"publisher","first-page":"598","DOI":"10.1109\/83.913594","volume":"10","author":"C Liu","year":"2001","unstructured":"Liu, C., Wechsler, H.: A shape- and texture-based enhanced Fisher classifier for face recognition. IEEE Trans. Image Process. 10(4), 598\u2013608 (2001)","journal-title":"IEEE Trans. Image Process."},{"key":"810_CR56","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.inffus.2017.12.003","volume":"44","author":"J Fierrez","year":"2018","unstructured":"Fierrez, J., Morales, A., Vera-Rodriguez, R., Camacho, D.: Multiple classifiers in biometrics. Part 1: fundamentals and review. Inf. Fusion 44, 57\u201364 (2018)","journal-title":"Inf. Fusion"},{"issue":"8","key":"810_CR57","doi-asserted-by":"publisher","first-page":"4775","DOI":"10.1109\/TGRS.2017.2700322","volume":"55","author":"S Chaib","year":"2017","unstructured":"Chaib, S., Liu, H., Gu, Y., Yao, H.: Deep feature fusion for VHR remote sensing scene classification. IEEE Trans. Geosci. Remote Sens. 55(8), 4775\u20134784 (2017)","journal-title":"IEEE Trans. Geosci. Remote Sens."},{"key":"810_CR58","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1016\/j.inffus.2018.11.018","volume":"49","author":"SKS Modak","year":"2019","unstructured":"Modak, S.K.S., Jha, V.K.: Multibiometric fusion strategy and its applications: a review. Inf. Fusion 49, 174\u2013204 (2019)","journal-title":"Inf. Fusion"},{"issue":"3","key":"810_CR59","first-page":"27","volume":"2","author":"CC Chang","year":"2011","unstructured":"Chang, C.C., Lin, C.J.: LIBSVM: a library for support vector machines. ACM Trans Intell. Syst. Technol. (TIST) 2(3), 27 (2011)","journal-title":"ACM Trans Intell. Syst. Technol. (TIST)"},{"key":"810_CR60","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1016\/j.asoc.2015.10.011","volume":"38","author":"AA Aburomman","year":"2016","unstructured":"Aburomman, A.A., Reaz, M.B.I.: A novel SVM-kNN-PSO ensemble method for intrusion detection system. Appl. Soft Comput. 38, 360\u2013372 (2016)","journal-title":"Appl. Soft Comput."},{"issue":"3","key":"810_CR61","doi-asserted-by":"publisher","first-page":"377","DOI":"10.3797\/scipharm.0803-30","volume":"76","author":"H Dureja","year":"2008","unstructured":"Dureja, H., Gupta, S., Madan, A.K.: Topological models for prediction of pharmacokinetic parameters of cephalosporins using random forest, decision tree and moving average analysis. Sci. Pharm. 76(3), 377\u2013394 (2008)","journal-title":"Sci. Pharm."},{"issue":"1\u20138","key":"810_CR62","first-page":"41","volume":"10","author":"RS Perdana","year":"2018","unstructured":"Perdana, R.S., Pinandito, A.: Combining likes-retweet analysis and naive Bayes classifier within twitter for sentiment analysis. J. Telecommun. Electron. Comput. Eng. (JTEC) 10(1\u20138), 41\u201346 (2018)","journal-title":"J. Telecommun. Electron. Comput. Eng. (JTEC)"},{"issue":"4","key":"810_CR63","first-page":"971","volume":"60","author":"R Tadeusiewicz","year":"2015","unstructured":"Tadeusiewicz, R.: Neural networks in mining sciences\u2013general overview and some representative examples. Arch. Min. Sci. 60(4), 971\u2013984 (2015)","journal-title":"Arch. Min. Sci."},{"issue":"3","key":"810_CR64","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1049\/iet-bmt.2016.0112","volume":"6","author":"S Veluchamy","year":"2016","unstructured":"Veluchamy, S., Karlmarx, L.R.: System for multimodal biometric recognition based on finger knuckle and finger vein using feature-level fusion and k-support vector machine classifier. IET Biometr. 6(3), 232\u2013242 (2016)","journal-title":"IET Biometr."},{"key":"810_CR65","doi-asserted-by":"crossref","unstructured":"Mishra, D., Naik, B., Sahoo, R.M., Nayak, J.: Deep recurrent neural network (Deep-RNN) for classification of nonlinear data. In: Computational Intelligence in Pattern Recognition, pp. 207\u2013215. Springer, Singapore (2020)","DOI":"10.1007\/978-981-15-2449-3_17"},{"issue":"3","key":"810_CR66","doi-asserted-by":"publisher","first-page":"511","DOI":"10.1007\/s00357-018-9270-1","volume":"35","author":"J Nayak","year":"2018","unstructured":"Nayak, J., Naik, B.: A novel honey-bees mating optimization approach with higher order neural network for classification. J. Classif. 35(3), 511\u2013548 (2018)","journal-title":"J. Classif."},{"key":"810_CR67","doi-asserted-by":"crossref","unstructured":"Nayak, J., Vakula, K., Dinesh, P., Naik, B.: Applications and advancements of firefly algorithm in classification: an analytical perspective. In: Computational Intelligence in Pattern Recognition, pp. 1011\u20131028. Springer, Singapore (2020)","DOI":"10.1007\/978-981-13-9042-5_87"}],"container-title":["Multimedia Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-021-00810-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00530-021-00810-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-021-00810-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,28]],"date-time":"2022-07-28T21:21:49Z","timestamp":1659043309000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00530-021-00810-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,24]]},"references-count":67,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,8]]}},"alternative-id":["810"],"URL":"https:\/\/doi.org\/10.1007\/s00530-021-00810-9","relation":{},"ISSN":["0942-4962","1432-1882"],"issn-type":[{"value":"0942-4962","type":"print"},{"value":"1432-1882","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,8,24]]},"assertion":[{"value":"9 November 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 May 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 August 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}