{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T10:49:13Z","timestamp":1772275753880,"version":"3.50.1"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"19","license":[{"start":{"date-parts":[[2022,1,6]],"date-time":"2022-01-06T00:00:00Z","timestamp":1641427200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,6]],"date-time":"2022-01-06T00:00:00Z","timestamp":1641427200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2022,8]]},"DOI":"10.1007\/s11042-021-11578-5","type":"journal-article","created":{"date-parts":[[2022,1,6]],"date-time":"2022-01-06T22:02:35Z","timestamp":1641506555000},"page":"26873-26888","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":121,"title":["Spoofing detection system for e-health digital twin using EfficientNet Convolution Neural Network"],"prefix":"10.1007","volume":"81","author":[{"given":"Hitendra","family":"Garg","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3400-3504","authenticated-orcid":false,"given":"Bhisham","family":"Sharma","sequence":"additional","affiliation":[]},{"given":"Shashi","family":"Shekhar","sequence":"additional","affiliation":[]},{"given":"Rohit","family":"Agarwal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,6]]},"reference":[{"key":"11578_CR1","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1016\/j.procs.2015.08.061","volume":"58","author":"K Abhishek","year":"2015","unstructured":"Abhishek K, Yogi A (2015) A minutiae count based method for fake fingerprint detection. Procedia Comput Sci 58:447\u2013452","journal-title":"Procedia Comput Sci"},{"issue":"3","key":"11578_CR2","doi-asserted-by":"publisher","first-page":"2627","DOI":"10.1007\/s11277-020-07700-9","volume":"115","author":"R Agarwal","year":"2020","unstructured":"Agarwal R, Jalal AS, Arya KV (2020) Enhanced binary hexagonal extrema pattern (EBH X EP) descriptor for iris liveness detection. Wireless Pers Commun 115(3):2627\u20132643","journal-title":"Wireless Pers Commun"},{"issue":"2","key":"11578_CR3","first-page":"177","volume":"11","author":"R Agrawal","year":"2019","unstructured":"Agrawal R, Jalal AS, Arya KV (2019) Fake fingerprint liveness detection based on micro and macro features. Int J Biom 11(2):177\u2013206","journal-title":"Int J Biom"},{"issue":"3","key":"11578_CR4","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1049\/iet-bmt.2012.0071","volume":"3","author":"A Anjos","year":"2013","unstructured":"Anjos A, Chakka MM, Marcel S (2013) Motion-based counter-measures to photo attacks in face recognition. IET Biom 3(3):147\u2013158","journal-title":"IET Biom"},{"issue":"5","key":"11578_CR5","doi-asserted-by":"publisher","first-page":"894","DOI":"10.1109\/JBHI.2013.2257818","volume":"17","author":"A Bahga","year":"2013","unstructured":"Bahga A, Madisetti VK (2013) A cloud-based approach for interoperable electronic health records (EHRs). IEEE J Biomed Health Inform 17(5):894\u2013906","journal-title":"IEEE J Biomed Health Inform"},{"issue":"1","key":"11578_CR6","first-page":"37","volume":"8","author":"M Brettel","year":"2014","unstructured":"Brettel M, Friederichsen N, Keller M, Rosenberg M (2014) How virtualization, decentralization and network building change the manufacturing landscape: an industry 40 perspective. Int J Mech Sci 8(1):37\u201344","journal-title":"Int J Mech Sci"},{"issue":"9","key":"11578_CR7","doi-asserted-by":"publisher","first-page":"1705","DOI":"10.1109\/TPAMI.2009.155","volume":"32","author":"J Chen","year":"2009","unstructured":"Chen J, Shan S, He C, Zhao G, Pietikainen M, Chen X, Gao W (2009) WLD: a robust local image descriptor. IEEE Trans Pattern Anal Mach Intell 32(9):1705\u20131720","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"12","key":"11578_CR8","doi-asserted-by":"publisher","first-page":"1513","DOI":"10.1016\/j.patrec.2012.04.002","volume":"33","author":"R Chen","year":"2012","unstructured":"Chen R, Lin X, Ding T (2012) Liveness detection for iris recognition using multispectral images. Pattern Recogn Lett 33(12):1513\u20131519","journal-title":"Pattern Recogn Lett"},{"issue":"7","key":"11578_CR9","doi-asserted-by":"publisher","first-page":"1461","DOI":"10.1109\/TIFS.2016.2535899","volume":"11","author":"RK Dubey","year":"2016","unstructured":"Dubey RK, Goh J, Thing VL (2016) Fingerprint liveness detection from single image using low-level features and shape analysis. IEEE Trans Inf Forensics Secur 11(7):1461\u20131475","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"11578_CR10","unstructured":"Framling K, Holmstr\u00f6m J, Ala-Risku T, Karkkainen M (2003) Product agents for handling information about physical objects. Helsinki University Technology, Department Computer Science Engineering Series B TKO-B, Espoo"},{"issue":"1","key":"11578_CR11","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1016\/j.future.2010.11.024","volume":"28","author":"J Galbally","year":"2012","unstructured":"Galbally J, Alonso-Fernandez F, Fierrez J, Ortega-Garcia J (2012) A high performance fingerprint liveness detection method based on quality related features. Futur Gener Comput Syst 28(1):311\u2013321","journal-title":"Futur Gener Comput Syst"},{"key":"11578_CR12","doi-asserted-by":"crossref","unstructured":"Galbally J, Ortiz-Lopez J, Fierrez J, Ortega-Garcia J (2012). Iris liveness detection based on quality related features. In: 2012 5th IAPR International Conference on Biometrics (ICB) (pp. 271\u2013276). IEEE","DOI":"10.1109\/ICB.2012.6199819"},{"issue":"2","key":"11578_CR13","doi-asserted-by":"publisher","first-page":"710","DOI":"10.1109\/TIP.2013.2292332","volume":"23","author":"J Galbally","year":"2013","unstructured":"Galbally J, Marcel S, Fierrez J (2013) Image quality assessment for fake biometric detection: application to iris, fingerprint, and face recognition. IEEE Trans Image Process 23(2):710\u2013724","journal-title":"IEEE Trans Image Process"},{"key":"11578_CR14","doi-asserted-by":"crossref","unstructured":"Glaessgen E, Stargel D (2012) The digital twin paradigm for future NASA and U.S. Air Force vehicles. In: Proceeding of the 53rd Structural Dynamics, and Materials Conference, Special Session Digit. Twin, 2012, p. 818.","DOI":"10.2514\/6.2012-1818"},{"key":"11578_CR15","doi-asserted-by":"crossref","unstructured":"Glaessgen E, Stargel D (2012) The digital twin paradigm for future NASA and U.S. air force vehicles. In: Proceeding of the 53rd AIAA\/ASME\/ASCE\/AHS\/ASC structures, structural dynamics, and materials conference 20th AIAA\/ASME\/AHS adapting structure conference, 14th AIAA, Honolulu pp 1\u201314","DOI":"10.2514\/6.2012-1818"},{"key":"11578_CR16","doi-asserted-by":"crossref","unstructured":"Gockel B, Tudor A, Brandyberry M, Penmetsa R, Tuegel E (2012) Challenges with structural life forecasting using realistic mission profiles. In Structural Dynamics and Materials Conference. p 1812","DOI":"10.2514\/6.2012-1813"},{"issue":"4","key":"11578_CR17","doi-asserted-by":"publisher","first-page":"1050","DOI":"10.1016\/j.patcog.2014.05.021","volume":"48","author":"D Gragnaniello","year":"2015","unstructured":"Gragnaniello D, Poggi G, Sansone C, Verdoliva L (2015) Local contrast phase descriptor for fingerprint liveness detection. Pattern Recogn 48(4):1050\u20131058","journal-title":"Pattern Recogn"},{"issue":"4","key":"11578_CR18","doi-asserted-by":"publisher","first-page":"849","DOI":"10.1109\/TIFS.2015.2404294","volume":"10","author":"D Gragnaniello","year":"2015","unstructured":"Gragnaniello D, Poggi G, Sansone C, Verdoliva L (2015) An investigation of local descriptors for biometric spoofing detection. IEEE Trans Inf Forensics Secur 10(4):849\u2013863","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"11578_CR19","unstructured":"Grieves M (2015).Digital twin: manufacturing excellence through virtual factory replication. digital twin white paper. Available: https:\/\/research.fit.edu\/media\/sitespecific\/researchfitedu\/camid\/documents\/1411.0_Digital_Twin_White_Paper_Dr_Grieves.pdf. Accessed 16 Oct 2019"},{"key":"11578_CR20","first-page":"85","volume-title":"Digital Twin: Mitigating Unpredictable, Undesirable Emergent Behavior in Complex Systems","author":"M Grieves","year":"2017","unstructured":"Grieves M, Vickers J (2017) Digital Twin: Mitigating Unpredictable, Undesirable Emergent Behavior in Complex Systems. Springer, Berlin, pp 85\u2013113"},{"key":"11578_CR21","doi-asserted-by":"crossref","unstructured":"Grieves M, Vickers J (2017) Digital twin: mitigating unpredictable, undesirable emergent behavior in complex systems. In: Transdisciplinary perspectives on complex systems. Springer, Berlin, pp 85\u2013113","DOI":"10.1007\/978-3-319-38756-7_4"},{"key":"11578_CR22","unstructured":"Guo L, Chen F, Chen L, Tang X (2010) The building of cloud computing environment for e-health. In: Proceeding of the IEEE International Conference E-Health Network Digital Ecosystem Technology, pp 89\u201392"},{"issue":"1","key":"11578_CR23","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1109\/TBME.2012.2222404","volume":"60","author":"C He","year":"2013","unstructured":"He C, Fan X, Li Y (2013) Toward ubiquitous healthcare services with a novel effcient cloud platform. IEEE Trans Biomed Eng 60(1):230\u2013234","journal-title":"IEEE Trans Biomed Eng"},{"key":"11578_CR24","unstructured":"Hochhalter JD et al. (2014) Coupling damage-sensing particles to the digital twin concept. NASA Langley Res. Center, Hampton, VA, USA, Technical report NASA\/TM-2014-218257, L-20401, and NF1676L-18764"},{"key":"11578_CR25","unstructured":"Kannala J, Rahtu E (2012). Bsif: binarized statistical image features. In: Proceedings of the 21st international conference on pattern recognition (ICPR2012) (pp. 1363\u20131366). IEEE"},{"key":"11578_CR26","doi-asserted-by":"crossref","unstructured":"Latif G, Alghazo J (2021) IoT Cloud Based Rx healthcare expert system. In: Fog computing for healthcare 4.0 environments (pp. 251\u2013265). Springer, Cham","DOI":"10.1007\/978-3-030-46197-3_10"},{"issue":"4","key":"11578_CR27","first-page":"44","volume":"25","author":"X Liu","year":"2017","unstructured":"Liu X, Jiang Y (2017) Fingerprint spoof detection using gradient cooccurrence matrix. Eng Lett 25(4):44","journal-title":"Eng Lett"},{"issue":"1","key":"11578_CR28","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1049\/iet-bmt.2011.0009","volume":"1","author":"J M\u00e4\u00e4tt\u00e4","year":"2012","unstructured":"M\u00e4\u00e4tt\u00e4 J, Hadid A, Pietik\u00e4inen M (2012) Face spoofing detection from single images using texture and local shape analysis. IET Biom 1(1):3\u201310","journal-title":"IET Biom"},{"key":"11578_CR29","doi-asserted-by":"crossref","unstructured":"Matsumoto T (2002) Gummy and conductive silicone rubber fingers importance of vulnerability analysis. In International conference on the theory and application of cryptology and information security (pp. 574\u2013575). Springer, Berlin","DOI":"10.1007\/3-540-36178-2_36"},{"issue":"4","key":"11578_CR30","doi-asserted-by":"publisher","first-page":"253","DOI":"10.5455\/aim.2019.27.253-258","volume":"27","author":"S Nasiri","year":"2019","unstructured":"Nasiri S, Sadoughi F, Tadayon MH, Dehnad A (2019) Security requirements of internet of things-based healthcare system: a survey study. Acta Inform Medica 27(4):253","journal-title":"Acta Inform Medica"},{"issue":"6","key":"11578_CR31","doi-asserted-by":"publisher","first-page":"1206","DOI":"10.1109\/TIFS.2016.2520880","volume":"11","author":"RF Nogueira","year":"2016","unstructured":"Nogueira RF, de Alencar Lotufo R, Machado RC (2016) Fingerprint liveness detection using convolutional neural networks. IEEE Trans Inf Forensics Secur 11(6):1206\u20131213","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"11578_CR32","doi-asserted-by":"crossref","unstructured":"Nosaka R, Ohkawa Y, Fukui, K (2011) Feature extraction based on co-occurrence of adjacent local binary patterns. In: Pacific-rim symposium on image and video technology (pp. 82\u201391). Springer, Berlin","DOI":"10.1007\/978-3-642-25346-1_8"},{"issue":"7","key":"11578_CR33","doi-asserted-by":"publisher","first-page":"971","DOI":"10.1109\/TPAMI.2002.1017623","volume":"24","author":"T Ojala","year":"2002","unstructured":"Ojala T, Pietikainen M, Maenpaa T (2002) Multiresolution gray-scale and rotation invariant texture classification with local binary patterns. IEEE Trans Pattern Anal Mach Intell 24(7):971\u2013987","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"11578_CR34","doi-asserted-by":"crossref","unstructured":"Ojansivu V, Rahtu E, Heikkila J (2008) Rotation invariant local phase quantization for blur insensitive texture analysis. In: 2008 19th International conference on pattern recognition (pp. 1\u20134). IEEE","DOI":"10.1109\/ICPR.2008.4761377"},{"issue":"10","key":"11578_CR35","doi-asserted-by":"publisher","first-page":"2048","DOI":"10.1109\/TIFS.2015.2440188","volume":"10","author":"KB Raja","year":"2015","unstructured":"Raja KB, Raghavendra R, Busch C (2015) Video presentation attack detection in visible spectrum iris recognition using magnified phase information. IEEE Trans Inf Forensics Secur 10(10):2048\u20132056","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"11578_CR36","doi-asserted-by":"crossref","unstructured":"Reifsnider K, Majumdar P (2013) Multiphysics stimulated simulation digital twin methods for fleet management. In Proceeding of the 54thAIAA\/ASME\/ASCE\/AHS\/ASC structural dynamics, and materials conference, Boston 2013, pp 1\u201311","DOI":"10.2514\/6.2013-1578"},{"key":"11578_CR37","doi-asserted-by":"crossref","unstructured":"Ruiz-Albacete V, Tome-Gonzalez P, Alonso-Fernandez F, Galbally J, Fierrez J, Ortega-Garcia J (2008) Direct attacks using fake images in iris verification. In: European workshop on biometrics and identity management (pp. 181\u2013190). Springer, Berlin","DOI":"10.1007\/978-3-540-89991-4_19"},{"key":"11578_CR38","doi-asserted-by":"crossref","unstructured":"Russakovsky O, Deng J Su H, Krause J, Satheesh S, Ma S, ... & Berg A.(2015) Imagenet large scale visual recognition challenge. Int J Comput Vis, 115(3), 211-252","DOI":"10.1007\/s11263-015-0816-y"},{"issue":"1","key":"11578_CR39","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/s42452-019-1925-y","volume":"2","author":"S Selvaraj","year":"2020","unstructured":"Selvaraj S, Sundaravaradhan S (2020) Challenges and opportunities in IoT healthcare systems: a systematic review. SN Appl Sci 2(1):139","journal-title":"SN Appl Sci"},{"key":"11578_CR40","unstructured":"Shafto M, Conroy M, Doyle R, Glaessgen E, Kemp C, LeMoigne J, Wang L (2010) Modeling, simulation, information technology & processing roadmap. National Aeronautics and Space Administration. Available https:\/\/www.nasa.gov\/pdf\/501321main_TA11-MSITP-DRAFT-Nov2010-A1.pdf. Accessed 16 Oct 2019"},{"key":"11578_CR41","unstructured":"St\u00e9n A, Kaseva A, Virtanen T (2003) Fooling fingerprint scanners-biometric vulnerabilities of the precise biometrics 100 SC scanner. In: Proceedings of 4th Australian Information Warfare and IT Security Conference, vol. 2003, pp. 333\u2013340"},{"key":"11578_CR42","unstructured":"Tan M, Le QV (2019) Efficientnet: rethinking model scaling for convolutional neural networks. arXiv preprint arXiv:1905.11946"},{"issue":"5","key":"11578_CR43","doi-asserted-by":"publisher","first-page":"815","DOI":"10.1109\/TPAMI.2009.77","volume":"32","author":"E Tola","year":"2009","unstructured":"Tola E, Lepetit V, Fua P (2009) Daisy: an efficient dense descriptor applied to wide-baseline stereo. IEEE Trans Pattern Anal Mach Intell 32(5):815\u2013830","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"11578_CR44","doi-asserted-by":"crossref","unstructured":"Tuegel E (2012) The airframe digital twin: some challenges to realization. In: Proceeding of the 53rd structures, structural dynamics, and materials conference, p. 1812.","DOI":"10.2514\/6.2012-1812"},{"key":"11578_CR45","doi-asserted-by":"publisher","DOI":"10.1155\/2011\/154798","author":"EJ Tuegel","year":"2011","unstructured":"Tuegel EJ, Ingraffea AR, Eason EG, Spottswood SM (2011) Reengineering aircraft structural life prediction using a digital twin. Int J Aerosp Eng. https:\/\/doi.org\/10.1155\/2011\/154798","journal-title":"Int J Aerosp Eng"},{"issue":"1","key":"11578_CR46","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/JBHI.2013.2257821","volume":"18","author":"P Van Gorp","year":"2014","unstructured":"Van Gorp P, Comuzzi M (2014) Lifelong personal health data and application software via virtual machines in the cloud. IEEE J Biomed Health Inform 18(1):36\u201345","journal-title":"IEEE J Biomed Health Inform"},{"issue":"5","key":"11578_CR47","doi-asserted-by":"publisher","first-page":"851","DOI":"10.1109\/TIFS.2014.2313025","volume":"9","author":"D Yadav","year":"2014","unstructured":"Yadav D, Kohli N, Doyle JS, Singh R, Vatsa M, Bowyer KW (2014) Unraveling the effect of textured contact lenses on iris recognition. IEEE Trans Inf Forensics Secur 9(5):851\u2013862","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"9","key":"11578_CR48","first-page":"104","volume":"38","author":"Q Yao","year":"2014","unstructured":"Yao Q, Han X, Ma X-K, Xue Y-F, Chen Y-J, Li J-S (2014) Cloud-based hospital information system as a service for grassroots healthcare institutions. J Healthcare Syst 38(9):104","journal-title":"J Healthcare Syst"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11578-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-11578-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11578-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,19]],"date-time":"2022-07-19T07:16:21Z","timestamp":1658214981000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-11578-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,6]]},"references-count":48,"journal-issue":{"issue":"19","published-print":{"date-parts":[[2022,8]]}},"alternative-id":["11578"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-11578-5","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,6]]},"assertion":[{"value":"31 January 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 August 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 September 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 January 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}