{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T04:17:06Z","timestamp":1771647426826,"version":"3.50.1"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"25","license":[{"start":{"date-parts":[[2022,7,12]],"date-time":"2022-07-12T00:00:00Z","timestamp":1657584000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,7,12]],"date-time":"2022-07-12T00:00:00Z","timestamp":1657584000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2022,10]]},"DOI":"10.1007\/s11042-021-11581-w","type":"journal-article","created":{"date-parts":[[2022,7,12]],"date-time":"2022-07-12T07:05:04Z","timestamp":1657609504000},"page":"36715-36733","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["New approach for fingerprint recognition based on stylometric features with blockchain and cancellable biometric aspects"],"prefix":"10.1007","volume":"81","author":[{"given":"Ali","family":"Elsadai","sequence":"first","affiliation":[]},{"given":"Sa\u0161a","family":"Adamovi\u0107","sequence":"additional","affiliation":[]},{"given":"Marko","family":"\u0160arac","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2577-7927","authenticated-orcid":false,"given":"Muzafer","family":"Sara\u010devi\u0107","sequence":"additional","affiliation":[]},{"given":"Sudhir","family":"Kumar Sharma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,12]]},"reference":[{"key":"11581_CR1","doi-asserted-by":"publisher","first-page":"951","DOI":"10.3390\/sym12060951","volume":"12","author":"M Acquah","year":"2020","unstructured":"Acquah M, Chen N, Pan J, Yang H, Yan B (2020) Securing fingerprint template using blockchain and distributed storage system. Symmetry 12:951. https:\/\/doi.org\/10.3390\/sym12060951","journal-title":"Symmetry"},{"issue":"8","key":"11581_CR2","first-page":"858","volume":"70","author":"S Adamovic","year":"2019","unstructured":"Adamovic S, Miskovic V, Milosavljevic M, Sarac M, Veinovic M (2019) Automated language-independent authorship verification (for Indo-European languages). J Am Soc Inf Sci 70(8):858\u2013871","journal-title":"J Am Soc Inf Sci"},{"key":"11581_CR3","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1016\/j.future.2020.01.056","volume":"107","author":"S Adamovic","year":"2020","unstructured":"Adamovic S, Miskovic V, Macek N, Milosavljevic M, Sarac M, Saracevic M, Gnjatovic M (2020) An efficient novel approach for iris recognition based on stylometric features and machine learning techniques. Futur Gener Comput Syst 107:144\u2013157","journal-title":"Futur Gener Comput Syst"},{"key":"11581_CR4","doi-asserted-by":"crossref","unstructured":"Alias NA, Radzi NHM (2016) Fingerprint classification using support vector machine. In: 2016 Fifth ICT International Student Project Conference (ICT-ISPC), Nakhon Pathom, Thailand, 27\u201328 May 2016, pp 105\u2013108","DOI":"10.1109\/ICT-ISPC.2016.7519247"},{"issue":"1","key":"11581_CR5","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman L (2001) Random forests. Mach Learn 45(1):5\u201332","journal-title":"Mach Learn"},{"issue":"3","key":"11581_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1961189.1961199","volume":"2","author":"C-C Chang","year":"2011","unstructured":"Chang C-C, Lin C-J (2011) LIBSVM: a library for support vector machines. ACM Trans Intell Syst Technol (TIST) 2(3):1\u201327","journal-title":"ACM Trans Intell Syst Technol (TIST)"},{"key":"11581_CR7","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1613\/jair.953","volume":"16","author":"NV Chawla","year":"2002","unstructured":"Chawla NV, Bowyer KW, Hall LO, Kegelmeyer PW (2002) SMOTE: synthetic minority over-sampling technique. J Artif Intell Res 16:321\u2013357","journal-title":"J Artif Intell Res"},{"key":"11581_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4236\/jcc.2018.63001","volume":"6","author":"IG Dakhil","year":"2018","unstructured":"Dakhil IG, Ibrahim AA (2018) Design and implementation of fingerprint identification system based on KNN neural network. J Comput Commun 6:1\u201318. https:\/\/doi.org\/10.4236\/jcc.2018.63001","journal-title":"J Comput Commun"},{"key":"11581_CR9","unstructured":"Delgado Mohatar O, Fierrez J, Tolosana R, Vera-Rodriguez R (2020) Blockchain meets biometrics: concepts, application to template protection, and trends. https:\/\/www.arxiv-vanity.com\/papers\/2003.09262. Accessed 20 June 2021"},{"issue":"12","key":"11581_CR10","doi-asserted-by":"publisher","first-page":"3483","DOI":"10.1016\/j.patcog.2013.05.018","volume":"46","author":"H Deng","year":"2013","unstructured":"Deng H, Runger G (2013) Gene selection with guided regularized random forest. Pattern Recogn 46(12):3483\u20133489","journal-title":"Pattern Recogn"},{"key":"11581_CR11","unstructured":"Elmir Y, Elberrichi Z, Adjoudj R (2012) Support vector machinebased fingerprint identification. In: CTCI conference 2012, pp 1-4"},{"key":"11581_CR12","unstructured":"Evans SC, Hershey JE, Saulnier G (2002) Kolmogorov complexity estimation and analysis, In: 6th World Conference on Systemics, Cybernetics and Informatics, Orlando, FL, USA, 14\u201318 July 2002"},{"issue":"1\u20133","key":"11581_CR13","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1023\/A:1012487302797","volume":"46","author":"I Guyon","year":"2002","unstructured":"Guyon I, Weston J, Barnhill S, Vapnik V (2002) Gene selection for cancer classification using support vector machines. Mach Learn 46(1\u20133):389\u2013422","journal-title":"Mach Learn"},{"issue":"1","key":"11581_CR14","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1023\/A:1022631118932","volume":"11","author":"RC Holte","year":"1993","unstructured":"Holte RC (1993) Very simple classification rules perform well on most commonly used datasets. Mach Learn 11(1):63\u201390","journal-title":"Mach Learn"},{"issue":"3","key":"11581_CR15","doi-asserted-by":"publisher","first-page":"170","DOI":"10.5391\/IJFIS.2017.17.3.170","volume":"17","author":"W-S Jeon","year":"2017","unstructured":"Jeon W-S, Rhee S-Y (2017) Fingerprint pattern classification using convolution neural network. Int J Fuzzy Logic Intell Syst 17(3):170\u2013176","journal-title":"Int J Fuzzy Logic Intell Syst"},{"issue":"Supplement 1","key":"11581_CR16","first-page":"112","volume":"25","author":"N Kahraman","year":"2018","unstructured":"Kahraman N, Cam Taskiran ZG, Taskiran M (2018) Novel feature extraction methodology with evaluation in artificial neural networks based fingerprint recognition system. Tehni\u010dki vjesnik 25(Supplement 1):112\u2013119","journal-title":"Tehni\u010dki vjesnik"},{"issue":"2","key":"11581_CR17","first-page":"1","volume":"8","author":"S Kouamo","year":"2016","unstructured":"Kouamo S, Tangha C (2016) Fingerprint recognition with artificial neural networks: application to e-learning. J Intell Learn Syst Appl 8(2):1\u201311","journal-title":"J Intell Learn Syst Appl"},{"issue":"11","key":"11581_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.18637\/jss.v036.i11","volume":"36","author":"MB Kursa","year":"2010","unstructured":"Kursa MB, Rudnicki WR et al (2010) Feature selection with the Boruta package. J Stat Softw 36(11):1\u201313","journal-title":"J Stat Softw"},{"key":"11581_CR19","doi-asserted-by":"crossref","unstructured":"Minaee S, Wang Y (2015) Fingerprint recognition using translation invariant scattering network. In: 2015 IEEE signal processing in medicine and biology Symposium, Philadelphia, PA, USA, 12\u201312 December 2015, pp 1\u20136","DOI":"10.1109\/SPMB.2015.7405471"},{"key":"11581_CR20","doi-asserted-by":"crossref","unstructured":"Pandya B, Cosma G, Alani AA, Taherkhani A, Bharadi V, McGinnity T (2018) Fingerprint classification using a deep convolutional neural network. In: 2018 4th International Conference on information management (ICIM), Oxford, UK, 25\u201327 May 2018, pp 86\u201391","DOI":"10.1109\/INFOMAN.2018.8392815"},{"issue":"8","key":"11581_CR21","first-page":"88","volume":"5","author":"MS Patterh","year":"2017","unstructured":"Patterh MS (2017) A biometric fusion based on face and fingerprint recognition using ANN. Int J Recent Innov Trends Comput Commun 5(8):88\u201392","journal-title":"Int J Recent Innov Trends Comput Commun"},{"issue":"1","key":"11581_CR22","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1002\/int.21948","volume":"33","author":"D Peralta","year":"2018","unstructured":"Peralta D, Triguero I, Garc\u00eda S, Saeys Y, Benitez JM, Herrera F (2018) On the use of convolutional neural networks for robust classification of multiple fingerprint capture. Int J Intell Syst 33(1):213\u2013230","journal-title":"Int J Intell Syst"},{"key":"11581_CR23","unstructured":"Platt J (1998) Sequential minimal optimization: a fast algorithm for training support vector machines, MSR-TR-98-14, published by Microsoft, https:\/\/www.microsoft.com\/en-us\/research\/publication\/sequential-minimal-optimization-a-fast-algorithm-for-training-support-vector-machines\/. Accessed April 1998"},{"key":"11581_CR24","unstructured":"Prokhorenkova L, Gusev G, Vorobev A, Dorogush AV, Gulin A (2018) Cat-Boost: unbiased boosting with categorical features, advances in neural information processing systems, 2018, pp 6638\u20136648, Montr\u00e9al, Canada, December 3\u20138, 2018"},{"key":"11581_CR25","volume-title":"C 4.5: programs for machine learning","author":"JR Quinlan","year":"1993","unstructured":"Quinlan JR (1993) C 4.5: programs for machine learning, 1st edn. Morgan Kaufmann Publishers, San Mateo","edition":"1"},{"issue":"2","key":"11581_CR26","doi-asserted-by":"publisher","first-page":"889","DOI":"10.21917\/ijsc.2015.0125","volume":"5","author":"K Saminathan","year":"2015","unstructured":"Saminathan K, Chakravarthy T, Devi MC (2015) Iris recognition based on kernels of support vector machine. ICTACT J Soft Comput 5(2):889\u2013895","journal-title":"ICTACT J Soft Comput"},{"issue":"4","key":"11581_CR27","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1109\/MCI.2018.2866730","volume":"13","author":"MS Santos","year":"2018","unstructured":"Santos MS, Soares JP, Abreu PH, Araujo H, Santos J (2018) Cross-validation for imbalanced datasets: avoiding overoptimistic and overfitting approaches. IEEE Comput Intell Mag 13(4):59\u201376","journal-title":"IEEE Comput Intell Mag"},{"issue":"3","key":"11581_CR28","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","volume":"27","author":"CE Shannon","year":"1948","unstructured":"Shannon CE (1948) A mathematical theory of communication. Bell Syst Tech J 27(3):379\u2013423","journal-title":"Bell Syst Tech J"},{"key":"11581_CR29","doi-asserted-by":"crossref","unstructured":"Su HR, Chen KY, Wong WJ, Lai S-H (2017) A deep learning approach towards pore extraction for high-resolution fingerprint recognition. In: 2017 IEEE international conference on acoustics, speech and signal processing, New Orleans, LA, USA, 5\u20139 March 2017, pp 2057\u20132061","DOI":"10.1109\/ICASSP.2017.7952518"},{"key":"11581_CR30","doi-asserted-by":"publisher","DOI":"10.5772\/62825","author":"M Sundaram","year":"2016","unstructured":"Sundaram M, Mani A (2016) Face recognition: demystification of multifarious aspect in evaluation metrics, chapter in book \u201cface recognition: semisupervised classification, subspace projection and evaluation methods\u201d (edited by Srinivasan Ramakrishnan). IntechOpen. https:\/\/doi.org\/10.5772\/62825","journal-title":"IntechOpen"},{"key":"11581_CR31","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1023\/A:1007659514849","volume":"40","author":"GI Webb","year":"2000","unstructured":"Webb GI (2000) Multiboosting: a technique for combining boosting and wagging. Mach Learn 40:159\u2013196","journal-title":"Mach Learn"},{"key":"11581_CR32","volume-title":"Data mining: practical machine learning tools and techniques, Morgan kaufmann","author":"I Witten","year":"2016","unstructured":"Witten I, Frank E, Hall M, Pal C (2016) Data mining: practical machine learning tools and techniques, Morgan kaufmann. Elsevier, Amsterdam"},{"issue":"9","key":"11581_CR33","doi-asserted-by":"publisher","first-page":"4789","DOI":"10.1007\/s00521-018-3609-8","volume":"31","author":"F Zeng","year":"2019","unstructured":"Zeng F, Hu S, Xiao K (2019) Research on partial fingerprint recognition algorithm based on deep learning. Neural Comput Appl 31(9):4789\u20134798","journal-title":"Neural Comput Appl"},{"issue":"3","key":"11581_CR34","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1109\/TIT.1977.1055714","volume":"23","author":"J Ziv","year":"1977","unstructured":"Ziv J, Lempel A (1977) A universal algorithm for sequential data compression. IEEE Trans Inf Theory 23(3):337\u2013343","journal-title":"IEEE Trans Inf Theory"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11581-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-11581-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11581-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,24]],"date-time":"2022-09-24T04:21:46Z","timestamp":1663993306000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-11581-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,12]]},"references-count":34,"journal-issue":{"issue":"25","published-print":{"date-parts":[[2022,10]]}},"alternative-id":["11581"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-11581-w","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,7,12]]},"assertion":[{"value":"25 June 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 September 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 September 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 July 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Research involving human and animal rights"}}]}}