{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T16:38:19Z","timestamp":1772642299352,"version":"3.50.1"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2022,11,20]],"date-time":"2022-11-20T00:00:00Z","timestamp":1668902400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,11,20]],"date-time":"2022-11-20T00:00:00Z","timestamp":1668902400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Pattern Anal Applic"],"published-print":{"date-parts":[[2023,5]]},"DOI":"10.1007\/s10044-022-01118-8","type":"journal-article","created":{"date-parts":[[2022,11,20]],"date-time":"2022-11-20T15:02:32Z","timestamp":1668956552000},"page":"505-516","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["On error reduction by the symmetric rejection method in multi-stage biometric verification systems"],"prefix":"10.1007","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8009-370X","authenticated-orcid":false,"given":"Md Shafaeat","family":"Hossain","sequence":"first","affiliation":[]},{"given":"Jundong","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Khandaker","family":"Rahman","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,20]]},"reference":[{"issue":"12","key":"1118_CR1","doi-asserted-by":"publisher","first-page":"4824","DOI":"10.1007\/s10489-018-1257-4","volume":"48","author":"M Hossain","year":"2018","unstructured":"Hossain M, Chen J, Rahman K (2018) On enhancing serial fusion based multi-biometric verification system. Appl Intell 48(12):4824\u20134833","journal-title":"Appl Intell"},{"issue":"9","key":"1118_CR2","doi-asserted-by":"publisher","first-page":"884","DOI":"10.1016\/j.patrec.2010.01.028","volume":"31","author":"L Allano","year":"2010","unstructured":"Allano L, Dorizzi B, Garcia-Salicetti S (2010) Tuning cost and performance in multi-biometric systems: a novel and consistent view of fusion strategies based on the sequential probability ratio test (SPRT). Pattern Recognit Lett 31(9):884\u2013890","journal-title":"Pattern Recognit Lett"},{"key":"1118_CR3","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/s10044-020-00899-0","volume":"24","author":"M Hossain","year":"2021","unstructured":"Hossain M, Balagani K, Phoha V (2021) Effectiveness of symmetric rejection for a secure and user convenient multistage biometric system. Pattern Anal Appl 24:49\u201360","journal-title":"Pattern Anal Appl"},{"key":"1118_CR4","doi-asserted-by":"crossref","unstructured":"Takahashi K, Mimura M, Isobe Y, Seto Y (2004) A secure and user-friendly multimodal biometric system. In: Proceedings of the SPIE, pp 12\u201319","DOI":"10.1117\/12.538894"},{"key":"1118_CR5","doi-asserted-by":"publisher","first-page":"1569","DOI":"10.1007\/s10044-021-01008-5","volume":"24","author":"M Hossain","year":"2021","unstructured":"Hossain M, Phoha V (2021) Enhancing performance and user convenience of multi-biometric verification systems. Pattern Anal Appl 24:1569\u20131582","journal-title":"Pattern Anal Appl"},{"key":"1118_CR6","doi-asserted-by":"crossref","unstructured":"Akhtar Z, Fumera G, Marcialis GL, Roli F (2012) Evaluation of serial and parallel multibiometric systems under spoofing attacks. In: International conference on biometrics: theory, applications and systems (BTAS), pp 283\u2013288","DOI":"10.1109\/BTAS.2012.6374590"},{"issue":"4","key":"1118_CR7","first-page":"849","volume":"4","author":"N Poh","year":"2009","unstructured":"Poh N, Bourlai T, Kittler J, Allano L, Alonso-Fernandez F, Ambekar O, Baker J, Dorizzi B, Fatukasi O, Fierrez J, Ganster H, Ortega-Garcia J, Maurer D, Salah AA, Scheidat T, Vielhauer C (2009) Benchmarking quality-dependent and cost-sensitive score-level multimodal biometric fusion algorithms. IEEE TIFS 4(4):849\u2013866","journal-title":"IEEE TIFS"},{"key":"1118_CR8","doi-asserted-by":"crossref","unstructured":"Popescu-Bodorin N, Balas VE, Motoc IM (2011) 8-valent fuzzy logic for iris recognition and biometry. In: International symposium on computational intelligence and intelligent informatics (ISCIII), pp 149\u2013154","DOI":"10.1109\/ISCIII.2011.6069761"},{"key":"1118_CR9","doi-asserted-by":"crossref","unstructured":"Popescu-Bodorin N, Noaica CM, Penariu P (2015) Iris recognition with 4 or 5 fuzzy sets. In: IFSA-EUSFLAT","DOI":"10.2991\/ifsa-eusflat-15.2015.204"},{"key":"1118_CR10","doi-asserted-by":"crossref","unstructured":"Vatsa M, Singh R, Noore A (2009) Context switching algorithm for selective multibiometric fusion. In: Proceedings of international conference on pattern recognition and machine intelligence, pp 452\u2013457","DOI":"10.1007\/978-3-642-11164-8_73"},{"issue":"3","key":"1118_CR11","doi-asserted-by":"publisher","first-page":"470","DOI":"10.1109\/TIFS.2010.2056683","volume":"5","author":"M Vatsa","year":"2010","unstructured":"Vatsa M, Singh R, Noore A, Ross A (2010) On the dynamic selection of biometric fusion algorithms. IEEE Trans Inf Forensics Secur 5(3):470\u2013479","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"1118_CR12","doi-asserted-by":"crossref","unstructured":"Bhatt HS, Bharadwaj S, Vatsa M, Singh R, Ross A, Noore A (2011) A framework for quality-based biometric classifier selection. In: 2011 International joint conference on biometrics (IJCB), pp 1\u20137","DOI":"10.1109\/IJCB.2011.6117518"},{"issue":"11","key":"1118_CR13","doi-asserted-by":"publisher","first-page":"3428","DOI":"10.1016\/j.patcog.2015.05.002","volume":"48","author":"S Bharadwaj","year":"2015","unstructured":"Bharadwaj S, Bhatt HS, Singh R, Vatsa M, Noore A (2015) Qfuse: online learning framework for adaptive biometric system. Pattern Recognit 48(11):3428\u20133439","journal-title":"Pattern Recognit"},{"key":"1118_CR14","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/s11265-018-1385-4","volume":"91","author":"M Sabri","year":"2019","unstructured":"Sabri M, Moin M, Razzazi F (2019) A new framework for match on card and match on host quality based multimodal biometric authentication. J Signal Process Syst 91:163\u2013177. https:\/\/doi.org\/10.1007\/s11265-018-1385-4","journal-title":"J Signal Process Syst"},{"issue":"10","key":"1118_CR15","doi-asserted-by":"publisher","first-page":"1681","DOI":"10.1109\/TIFS.2014.2346703","volume":"9","author":"Q Zhang","year":"2014","unstructured":"Zhang Q, Yin Y, Zhan D-C, Peng J (2014) A novel serial multimodal biometrics framework based on semisupervised learning techniques. IEEE Trans Inf Forensics Secur 9(10):1681\u20131694","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"1118_CR16","doi-asserted-by":"crossref","unstructured":"Hossain MS, Balagani KS, Phoha VV (2013) On controlling genuine reject rate in multi-stage biometric verification. In: CVPRW, pp 194\u2013199","DOI":"10.1109\/CVPRW.2013.36"},{"key":"1118_CR17","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/j.patrec.2018.02.015","volume":"126","author":"M Sajjad","year":"2018","unstructured":"Sajjad M, Khan S, Hussain T, Muhammad K, Sangaiah AK, Castiglione A, Esposito C, Baik SW (2019) CNN-based anti-spoofing two-tier multi-factor authentication system. Pattern Recognit Lett 126:123\u2013131. https:\/\/doi.org\/10.1016\/j.patrec.2018.02.015","journal-title":"Pattern Recognit Lett"},{"key":"1118_CR18","doi-asserted-by":"publisher","first-page":"1016","DOI":"10.1007\/s10489-018-1311-2","volume":"49","author":"R Dwivedi","year":"2019","unstructured":"Dwivedi R, Dey S (2019) A novel hybrid score level and decision level fusion scheme for cancelable multi-biometric verification. Appl Intell 49:1016\u20131035. https:\/\/doi.org\/10.1007\/s10489-018-1311-2","journal-title":"Appl Intell"},{"key":"1118_CR19","doi-asserted-by":"crossref","unstructured":"Jomaa RM, Islam MS, Mathkour H (2018) Improved sequential fusion of heart-signal and fingerprint for anti-spoofing. In: Proceedings of IEEE conference on identity, security, and behavior analysis (ISBA), pp 1\u20137","DOI":"10.1109\/ISBA.2018.8311476"},{"issue":"8","key":"1118_CR20","doi-asserted-by":"publisher","first-page":"5132","DOI":"10.1016\/j.jksuci.2022.01.004","volume":"34","author":"RM Jomaa","year":"2022","unstructured":"Jomaa RM, Islam MS, Mathkour H, Al-Ahmadi S (2022) A multilayer system to boost the robustness of fingerprint authentication against presentation attacks by fusion with heart-signal. J King Saud Univ Comput Inf Sci 34(8):5132\u20135143. https:\/\/doi.org\/10.1016\/j.jksuci.2022.01.004","journal-title":"J King Saud Univ Comput Inf Sci"},{"key":"1118_CR21","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-021-03153-0","author":"B Abd El-Rahiem","year":"2022","unstructured":"Abd El-Rahiem B, Abd El Samie FE, Amin M (2022) Efficient cancellable multi-biometric recognition system based on deep learning and bio-hashing. Appl Intell. https:\/\/doi.org\/10.1007\/s10489-021-03153-0","journal-title":"Appl Intell"},{"key":"1118_CR22","doi-asserted-by":"crossref","unstructured":"Murakami T, Takahashi K, Matsuura K (2012) Towards optimal countermeasures against wolves and lambs in biometrics. In: IEEE conference on biometrics: theory, application and system (BTAS), pp 69\u201376","DOI":"10.1109\/BTAS.2012.6374559"},{"issue":"11","key":"1118_CR23","doi-asserted-by":"publisher","first-page":"2807","DOI":"10.1016\/j.patcog.2008.12.010","volume":"42","author":"GL Marcialis","year":"2009","unstructured":"Marcialis GL, Roli F, Didaci L (2009) Personal identity verification by serial fusion of fingerprint and face matchers. Pattern Recognit 42(11):2807\u20132817","journal-title":"Pattern Recognit"},{"key":"1118_CR24","doi-asserted-by":"crossref","unstructured":"Marcialis GL, Mastinu P, Roli F (2010) Serial fusion of multi-modal biometric systems. In: IEEE workshop on BIOMS, pp 1\u20137","DOI":"10.1109\/BIOMS.2010.5610438"},{"key":"1118_CR25","doi-asserted-by":"publisher","first-page":"2099","DOI":"10.1016\/S0031-3203(00)00059-5","volume":"33","author":"G Fumera","year":"2000","unstructured":"Fumera G, Roli F, Giacinto G (2000) Reject option with multiple thresholds. Pattern Recognit 33:2099\u20132101","journal-title":"Pattern Recognit"},{"key":"1118_CR26","doi-asserted-by":"crossref","unstructured":"Tortorella F (2000) An optimal reject rule for binary classifiers. In: Proceedings of the joint IAPR workshops, pp 611\u2013620","DOI":"10.1007\/3-540-44522-6_63"},{"key":"1118_CR27","doi-asserted-by":"publisher","first-page":"943","DOI":"10.1016\/j.patrec.2004.09.042","volume":"26","author":"CM Santos-Pereira","year":"2005","unstructured":"Santos-Pereira CM, Pires AM (2005) On optimal reject rules and roc curves. Pattern Recognit Lett 26:943\u2013952","journal-title":"Pattern Recognit Lett"},{"key":"1118_CR28","doi-asserted-by":"crossref","unstructured":"Hossain MS, Balagani KS, Phoha VV (2012) New impostor score based rejection methods for continuous keystroke verification with weak templates. In: IEEE conference on biometrics: theory, application and system (BTAS)","DOI":"10.1109\/BTAS.2012.6374585"},{"key":"1118_CR29","doi-asserted-by":"publisher","first-page":"908","DOI":"10.1016\/j.patrec.2005.10.015","volume":"27","author":"TCW Landgrebe","year":"2006","unstructured":"Landgrebe TCW, Tax DMJ, Pacl\u00edk P, Duin RPW (2006) The interaction between classification and reject performance for distance-based reject-option classifiers. Pattern Recognit Lett 27:908\u2013917","journal-title":"Pattern Recognit Lett"},{"key":"1118_CR30","first-page":"1823","volume":"9","author":"PL Bartlett","year":"2008","unstructured":"Bartlett PL, Wegkamp MH (2008) Classification with a reject option using a hinge loss. J Mach Learn Res 9:1823\u20131840","journal-title":"J Mach Learn Res"},{"issue":"1","key":"1118_CR31","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/TIT.1970.1054406","volume":"16","author":"CK Chow","year":"1970","unstructured":"Chow CK (1970) On optimum recognition error and reject tradeoff. IEEE Trans Inf Theory 16(1):41\u201346","journal-title":"IEEE Trans Inf Theory"},{"issue":"1","key":"1118_CR32","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/TAI.2021.3064003","volume":"2","author":"T Edwards","year":"2021","unstructured":"Edwards T, Hossain MS (2021) Effectiveness of deep learning on serial fusion based biometric systems. IEEE Trans Artif Intell 2(1):28\u201341. https:\/\/doi.org\/10.1109\/TAI.2021.3064003","journal-title":"IEEE Trans Artif Intell"},{"key":"1118_CR33","unstructured":"NIST: Biometric Scores Set (2011). http:\/\/www.nist.gov\/itl\/iad\/ig\/biometricscores.cfm"},{"key":"1118_CR34","volume-title":"Sequential analysis","author":"A Wald","year":"1947","unstructured":"Wald A (1947) Sequential analysis, 1st edn. Wiley","edition":"1"},{"key":"1118_CR35","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1109\/TPAMI.2007.70796","volume":"30","author":"K Nandakumar","year":"2008","unstructured":"Nandakumar K, Chen Y, Dass SC, Jain A (2008) Likelihood ratio-based biometric score fusion. IEEE Trans Pattern Anal Mach Intell 30:342\u2013347","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"1118_CR36","unstructured":"Phoha V, Joshi S (2013) Method and system of Identifying users based upon free text keystroke (US Patent No. 8489635, Issued July 16, 2013)"},{"key":"1118_CR37","unstructured":"Ilonen J (2003) Keystroke dynamics. Advanced Topics in Information Processing\u2014Lecture"},{"key":"1118_CR38","doi-asserted-by":"crossref","unstructured":"Kumar A (2008) Incorporating cohort information for reliable palmprint authentication. In: Sixth Indian conference on computer vision, graphics image processing, 2008. ICVGIP\u201908, pp 583\u2013590","DOI":"10.1109\/ICVGIP.2008.73"},{"issue":"3","key":"1118_CR39","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1142\/S0219467803001147","volume":"3","author":"ME Schuckers","year":"2003","unstructured":"Schuckers ME (2003) Using the beta-binomial distribution to assess performance of a biometric identification device. Int J Image Gr 3(3):523\u2013529","journal-title":"Int J Image Gr"}],"container-title":["Pattern Analysis and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10044-022-01118-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10044-022-01118-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10044-022-01118-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,15]],"date-time":"2023-04-15T04:35:56Z","timestamp":1681533356000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10044-022-01118-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,20]]},"references-count":39,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,5]]}},"alternative-id":["1118"],"URL":"https:\/\/doi.org\/10.1007\/s10044-022-01118-8","relation":{},"ISSN":["1433-7541","1433-755X"],"issn-type":[{"value":"1433-7541","type":"print"},{"value":"1433-755X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,11,20]]},"assertion":[{"value":"30 January 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 October 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 November 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no conflicts of interest to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}