{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,22]],"date-time":"2026-02-22T04:29:37Z","timestamp":1771734577473,"version":"3.50.1"},"reference-count":66,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,5,26]],"date-time":"2023-05-26T00:00:00Z","timestamp":1685059200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,5,26]],"date-time":"2023-05-26T00:00:00Z","timestamp":1685059200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2024,1]]},"DOI":"10.1007\/s11042-023-15337-6","type":"journal-article","created":{"date-parts":[[2023,5,26]],"date-time":"2023-05-26T08:02:26Z","timestamp":1685088146000},"page":"6113-6136","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["A multi-classifier system for automatic fingerprint classification using transfer learning and majority voting"],"prefix":"10.1007","volume":"83","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3387-0550","authenticated-orcid":false,"given":"Hajer","family":"Walhazi","sequence":"first","affiliation":[]},{"given":"Ahmed","family":"Maalej","sequence":"additional","affiliation":[]},{"given":"Najoua Essoukri Ben","family":"Amara","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,26]]},"reference":[{"key":"15337_CR1","unstructured":"Anguli Synthetic fingerprint generator, https:\/\/dsl.cds.iisc.ac.in\/projects\/Anguli [Online; Accessed May 2021]"},{"key":"15337_CR2","doi-asserted-by":"publisher","unstructured":"Abdulrahman S A, Alhayani B (2021) A comprehensive survey on the biometric systems based on physiological and behavioural characteristics. Materials Today: Proceedings. https:\/\/doi.org\/10.1016\/j.matpr.2021.07.005","DOI":"10.1016\/j.matpr.2021.07.005"},{"key":"15337_CR3","doi-asserted-by":"publisher","first-page":"102708","DOI":"10.1016\/j.trc.2020.102708","volume":"118","author":"ZE Abou Elassad","year":"2020","unstructured":"Abou Elassad Z E, Mousannif H, Al Moatassime H (2020) A real-time crash prediction fusion framework: an imbalance-aware strategy for collision avoidance systems. Transport Res Part C: Emerging Technol 118:102708","journal-title":"Transport Res Part C: Emerging Technol"},{"key":"15337_CR4","doi-asserted-by":"publisher","unstructured":"Akhter M, Zheng J, Afzal F, Lin H, Riaz S, Mehmood A (2021) Supervised ensemble learning methods towards automatically filtering urdu fake news within social media. PeerJ Computer Science, 7. https:\/\/doi.org\/10.7717\/peerj-cs.425","DOI":"10.7717\/peerj-cs.425"},{"issue":"1","key":"15337_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-021-00444-8","volume":"8","author":"L Alzubaidi","year":"2021","unstructured":"Alzubaidi L, Zhang J, Humaidi A J, Al-Dujaili A, Duan Y, Al-Shamma O, Santamar\u00eda J, Fadhel M A, Al-Amidie M, Farhan L (2021) Review of deep learning: concepts, cnn architectures, challenges, applications, future directions. J Big Data 8(1):1\u201374. https:\/\/doi.org\/10.1186\/s40537-021-00444-8","journal-title":"J Big Data"},{"key":"15337_CR6","unstructured":"Ansari A H (2011) Generation and storage of large synthetic fingerprint database. ME Thesis, Jul"},{"key":"15337_CR7","doi-asserted-by":"publisher","unstructured":"Behera T K, Khan M A, Bakshi S (2022) Brain mr image classification using superpixel-based deep transfer learning. IEEE J Biomed Health Inform, 1\u201311. https:\/\/doi.org\/10.1109\/JBHI.2022.3216270","DOI":"10.1109\/JBHI.2022.3216270"},{"key":"15337_CR8","doi-asserted-by":"publisher","unstructured":"Cao K, Jain A (2018) Fingerprint synthesis: evaluating fingerprint search at scale. In: 2018 International Conference on Biometrics (ICB). IEEE, pp 31\u201338. https:\/\/doi.org\/10.1109\/ICB2018.2018.00016","DOI":"10.1109\/ICB2018.2018.00016"},{"issue":"1","key":"15337_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s12864-019-6413-7","volume":"21","author":"D Chicco","year":"2020","unstructured":"Chicco D, Jurman G (2020) The advantages of the matthews correlation coefficient (mcc) over f1 score and accuracy in binary classification evaluation. BMC genomics 21(1):1\u201313. https:\/\/doi.org\/10.1186\/s12864-019-6413-7","journal-title":"BMC genomics"},{"key":"15337_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/app13010156","volume":"13","author":"D Clement","year":"2023","unstructured":"Clement D, Agu E, Suleiman M A, Obayemi J, Adeshina S, Soboyejo W (2023) Multi-class breast cancer histopathological image classification using multi-scale pooled image feature representation (mpifr) and one-versus-one support vector machines. Appl Sci 13:1. https:\/\/doi.org\/10.3390\/app13010156","journal-title":"Appl Sci"},{"key":"15337_CR11","doi-asserted-by":"publisher","first-page":"2020","DOI":"10.1177\/1548512920951275","volume":"19","author":"D Dasgupta","year":"2020","unstructured":"Dasgupta D, Akhtar Z, Sen S (2020) Machine learning in cybersecurity: a comprehensive survey. J Defense Model Simul 19:2020. https:\/\/doi.org\/10.1177\/1548512920951275","journal-title":"J Defense Model Simul"},{"issue":"25","key":"15337_CR12","doi-asserted-by":"publisher","first-page":"36715","DOI":"10.1007\/s11042-021-11581-w","volume":"81","author":"A Elsadai","year":"2022","unstructured":"Elsadai A, Adamovi\u0107 S, \u0160arac M, Sara\u010devi\u0107 M, Kumar Sharma S (2022) New approach for fingerprint recognition based on stylometric features with blockchain and cancellable biometric aspects. Multimed Tools Applic 81 (25):36715\u201336733","journal-title":"Multimed Tools Applic"},{"key":"15337_CR13","doi-asserted-by":"crossref","unstructured":"Fiumara G, Flanagan P, Schwarz M, Tabassi E, Boehnen C (2018) National institute of standards and technology special database 301: Nail to nail fingerprint challenge dry run. Technical Note 2002, National Insti- tute of Standards and Technology. https:\/\/nvlpubs.nist.gov\/nistpubs\/TechnicalNotes\/NIST.TN.2002.pdf","DOI":"10.6028\/NIST.TN.2002"},{"key":"15337_CR14","doi-asserted-by":"crossref","unstructured":"Garris M D, Garris M D (2000) Nist special database 27: fingerprint minutiae from latent and matching tenprint images","DOI":"10.6028\/NIST.IR.6534"},{"key":"15337_CR15","doi-asserted-by":"publisher","unstructured":"Ghiani L, Yambay D, Mura V, Tocco S, Marcialis G L, Roli F, Schuckcrs S (2013) Livdet 2013 fingerprint liveness detection competition 2013. In: 2013 International conference on biometrics (ICB), pp 1\u20136, https:\/\/doi.org\/10.1109\/ICB.2013.6613027","DOI":"10.1109\/ICB.2013.6613027"},{"key":"15337_CR16","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1016\/j.imavis.2016.07.002","volume":"58","author":"L Ghiani","year":"2017","unstructured":"Ghiani L, Yambay D A, Mura V, Marcialis G L, Roli F, Schuckers S A (2017) Review of the fingerprint liveness detection (livdet) competition series: 2009 to 2015. Image Vis Comput 58:110\u2013128. https:\/\/doi.org\/10.1016\/j.imavis.2016.07.002","journal-title":"Image Vis Comput"},{"key":"15337_CR17","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1016\/j.inffus.2020.07.007","volume":"64","author":"S Gonz\u00e1lez","year":"2020","unstructured":"Gonz\u00e1lez S, Garc\u00eda S, Del Ser J, Rokach L, Herrera F (2020) A practical tutorial on bagging and boosting based ensembles for machine learning: algorithms, software tools, performance study, practical perspectives and opportunities. Inform Fus 64:205\u2013237. https:\/\/doi.org\/10.1016\/j.inffus.2020.07.007","journal-title":"Inform Fus"},{"key":"15337_CR18","doi-asserted-by":"publisher","unstructured":"Hamdi D E, Elouedi I, Fathallah A, Nguyuen M K, Hamouda A (2018) Combining fingerprints and their radon transform as input to deep learning for a fingerprint classification task. In: 2018 15th International conference on control, automation, robotics and vision (ICARCV), pp 1448\u20131453. https:\/\/doi.org\/10.1109\/ICARCV.2018.8581072","DOI":"10.1109\/ICARCV.2018.8581072"},{"key":"15337_CR19","doi-asserted-by":"publisher","unstructured":"He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 770\u2013778. https:\/\/doi.org\/10.1109\/CVPR.2016.90","DOI":"10.1109\/CVPR.2016.90"},{"key":"15337_CR20","doi-asserted-by":"publisher","unstructured":"He K, Zhang X, Ren S, Sun J (2016) Identity mappings in deep residual networks. In: European conference on computer vision. Springer, pp 630\u2013645. https:\/\/doi.org\/10.1007\/978-3-319-46493-0_38","DOI":"10.1007\/978-3-319-46493-0_38"},{"key":"15337_CR21","unstructured":"Henry E R (1913) Classification and uses of finger prints"},{"key":"15337_CR22","doi-asserted-by":"publisher","unstructured":"Howard A, Sandler M, Chen B, Wang W, Chen L, Tan M, Chu G, Vasudevan V, Zhu Y, Pang R, Adam H, Le Q (2019) Searching for mobilenetv3. In: 2019 IEEE\/CVF International conference on computer vision (ICCV). IEEE Computer Society, Los Alamitos, pp 1314\u20131324. https:\/\/doi.org\/10.1109\/ICCV.2019.00140, https:\/\/doi.ieeecomputersociety.org\/10.1109\/ICCV.2019.00140","DOI":"10.1109\/ICCV.2019.00140"},{"key":"15337_CR23","doi-asserted-by":"publisher","unstructured":"Huang X, Qian P, Liu M (2020) Latent fingerprint image enhancement based on progressive generative adversarial network. In: 2020 IEEE\/CVF Conference on computer vision and pattern recognition workshops (CVPRW), pp 3481\u20133489. https:\/\/doi.org\/10.1109\/CVPRW50498.2020.00408","DOI":"10.1109\/CVPRW50498.2020.00408"},{"key":"15337_CR24","doi-asserted-by":"publisher","unstructured":"Jaafar R, Walhazi H, Maalej A, Ben Amara N E (2022) U-net based deep learning architectures for latent fingerprint segmentation. In: 2022 19th International multi-conference on systems, signals and devices (SSD), pp 485\u2013490. https:\/\/doi.org\/10.1109\/SSD54932.2022.9955982","DOI":"10.1109\/SSD54932.2022.9955982"},{"key":"15337_CR25","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.patrec.2015.12.013","volume":"79","author":"AK Jain","year":"2016","unstructured":"Jain A K, Nandakumar K, Ross A (2016) 50 years of biometric research: accomplishments, challenges, and opportunities. Pattern Recogn Lett 79:80\u2013105. https:\/\/doi.org\/10.1016\/j.patrec.2015.12.013","journal-title":"Pattern Recogn Lett"},{"key":"15337_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TBIOM.2021.3115465","volume":"PP","author":"A Jain","year":"2021","unstructured":"Jain A, Deb D, Engelsma J (2021) Biometrics: trust, but verify. IEEE Trans Biometr Behav Identity Sci PP:1\u20131. https:\/\/doi.org\/10.1109\/TBIOM.2021.3115465","journal-title":"IEEE Trans Biometr Behav Identity Sci"},{"issue":"1","key":"15337_CR27","doi-asserted-by":"publisher","first-page":"1208","DOI":"10.2991\/ijcis.d.210318.002","volume":"14","author":"I Jawarneh","year":"2021","unstructured":"Jawarneh I, Alsharman N (2021) The mathematical model and deep learning features selection for whorl fingerprint classifications. Int J Comput Intell Syst 14(1):1208\u20131216","journal-title":"Int J Comput Intell Syst"},{"key":"15337_CR28","unstructured":"Joshi M, Mazumdar B, Dey S (2018) Security vulnerabilities against fingerprint biometric system. arXiv e-prints, 1805"},{"issue":"8","key":"15337_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1371\/journal.pone.0041882","volume":"7","author":"G Jurman","year":"2012","unstructured":"Jurman G, Riccadonna S, Furlanello C (2012) A comparison of mcc and cen error measures in multi-class prediction. PLOS ONE 7(8):1\u20138. https:\/\/doi.org\/10.1371\/journal.pone.0041882","journal-title":"PLOS ONE"},{"key":"15337_CR30","doi-asserted-by":"publisher","first-page":"10","DOI":"10.3390\/app10103359","volume":"10","author":"I Kandel","year":"2020","unstructured":"Kandel I, Castelli M (2020) How deeply to fine-tune a convolutional neural network: a case study using a histopathology dataset. Appl Sci 10:10. https:\/\/doi.org\/10.3390\/app10103359","journal-title":"Appl Sci"},{"key":"15337_CR31","doi-asserted-by":"publisher","first-page":"16565","DOI":"10.1007\/s11042-020-08708-w","volume":"80","author":"G Kumar","year":"2021","unstructured":"Kumar G, Bakshi S, Sa P K, Majhi B (2021) Non-overlapped blockwise interpolated local binary pattern as periocular feature. Multimed Tools Applic 80:16565\u201316597","journal-title":"Multimed Tools Applic"},{"key":"15337_CR32","doi-asserted-by":"publisher","first-page":"106379","DOI":"10.1016\/j.aquatox.2022.106379","volume":"255","author":"X Li","year":"2023","unstructured":"Li X, Liu G, Wang Z, Zhang L, Liu H, Ai H (2023) Ensemble multiclassification model for aquatic toxicity of organic compounds. Aquat Toxicol 255:106379. https:\/\/doi.org\/10.1016\/j.aquatox.2022.106379","journal-title":"Aquat Toxicol"},{"key":"15337_CR33","doi-asserted-by":"publisher","unstructured":"Maio D, Maltoni D, Cappelli R, Wayman JL, Jain AK (2002) Fvc2002: second fingerprint verification competition. In: 2002 International conference on pattern recognition, vol 3, pp 811\u2013814, https:\/\/doi.org\/10.1109\/ICPR.2002.1048144","DOI":"10.1109\/ICPR.2002.1048144"},{"key":"15337_CR34","doi-asserted-by":"crossref","unstructured":"Maio D, Maltoni D, Cappelli R, Wayman J L, Jain A K (2004) Fvc2004: third fingerprint verification competition. In: International conference on biometric authentication. Springer, pp 1\u20137","DOI":"10.1007\/978-3-540-25948-0_1"},{"issue":"12","key":"15337_CR35","doi-asserted-by":"publisher","first-page":"10916","DOI":"10.1016\/j.eswa.2012.03.033","volume":"39","author":"AI Marqu\u00e9s","year":"2012","unstructured":"Marqu\u00e9s AI, Garc\u00eda V, S\u00e1nchez JS (2012) Two-level classifier ensembles for credit risk assessment. Expert Syst Appl 39(12):10916\u201310922. https:\/\/doi.org\/10.1016\/j.eswa.2012.03.033","journal-title":"Expert Syst Appl"},{"key":"15337_CR36","doi-asserted-by":"publisher","first-page":"5","DOI":"10.3390\/sym13050750","volume":"13","author":"C Militello","year":"2021","unstructured":"Militello C, Rundo L, Vitabile S, Conti V (2021) Fingerprint classification based on deep learning approaches: experimental findings and comparisons. Symmetry 13:5. https:\/\/doi.org\/10.3390\/sym13050750","journal-title":"Symmetry"},{"key":"15337_CR37","doi-asserted-by":"publisher","first-page":"119845","DOI":"10.1016\/j.eswa.2023.119845","volume":"222","author":"T Mo","year":"2023","unstructured":"Mo T, Wang L, Wu Y, Huang J, Liu W, Yang R, Zhen X (2023) Classifier ensemble with evolutionary optimisation enforced random projections. Expert Syst Appl 222:119845. https:\/\/doi.org\/10.1016\/j.eswa.2023.119845","journal-title":"Expert Syst Appl"},{"key":"15337_CR38","doi-asserted-by":"publisher","first-page":"106568","DOI":"10.1016\/j.asoc.2020.106568","volume":"95","author":"A Monir","year":"2020","unstructured":"Monir A, Onieva E, Wozniak M (2020) Training set selection and swarm intelligence for enhanced integration in multiple classifier systems. Appl Soft Comput 95:106568. https:\/\/doi.org\/10.1016\/j.asoc.2020.106568","journal-title":"Appl Soft Comput"},{"key":"15337_CR39","doi-asserted-by":"publisher","unstructured":"Nahar P, Chaudhari N, Tanwani S (2022) Fingerprint classification system using cnn. Multimed Tools Applic, 81. https:\/\/doi.org\/10.1007\/s11042-022-12294-4","DOI":"10.1007\/s11042-022-12294-4"},{"key":"15337_CR40","unstructured":"Nist (2019) Biometric special databases and software. https:\/\/www.nist.gov\/itl\/iad\/image-group\/resources\/biometric-special-databases-and-software, [Online; accessed 17. May 2021]"},{"key":"15337_CR41","unstructured":"Park E, Cui X, Kim W, Liu J, Kim H (2018) Patch-based fake fingerprint detection using a fully convolutional neural network with a small number of parameters and an optimal threshold. arXiv:1803.07817 [cs.CV]"},{"key":"15337_CR42","doi-asserted-by":"publisher","unstructured":"Predi\u0107 B, Mani\u0107 D, Sara\u010devi\u0107 M, Karaba\u0161evi\u0107 D, Stanujki\u0107 D (2022) Automatic image caption generation based on some machine learning algorithms. Math Probl Eng, 2022. https:\/\/doi.org\/10.1155\/2022\/4001460","DOI":"10.1155\/2022\/4001460"},{"key":"15337_CR43","unstructured":"Rai A, Dey S, Patidar P, Rai P (2023) Mosfpad: an end-to-end ensemble of mobilenet and support vector classifier for fingerprint presentation attack detection. arXiv:2303.01465"},{"key":"15337_CR44","doi-asserted-by":"publisher","unstructured":"Raj S, Pannu J, Fernandes S, Ramanathan A, Pullum L, Jha S (2019) Attacking nist biometric image software using nonlinear optimization. Pattern Recogn Lett, 131. https:\/\/doi.org\/10.1016\/j.patrec.2019.12.003","DOI":"10.1016\/j.patrec.2019.12.003"},{"key":"15337_CR45","doi-asserted-by":"publisher","unstructured":"Rajasekar V, Krishnamoorthi S, Sara\u0109evi\u0107 M, Pepic D, Zajmovi\u0107 M, Zogic H (2022) Ensemble machine learning methods to predict the constituents in the human body. Computer Science, 23. https:\/\/doi.org\/10.7494\/csci.2022.23.1.4315","DOI":"10.7494\/csci.2022.23.1.4315"},{"key":"15337_CR46","doi-asserted-by":"publisher","first-page":"35","DOI":"10.3233\/HIS-2006-3104","volume":"3","author":"R Ranawana","year":"2006","unstructured":"Ranawana R, Palade V (2006) Multi-classifier systems: review and a roadmap for developers. Int J Hybrid Intell Syst 3:35\u201361. https:\/\/doi.org\/10.3233\/HIS-2006-3104","journal-title":"Int J Hybrid Intell Syst"},{"issue":"3","key":"15337_CR47","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/s11263-015-0816-y","volume":"115","author":"O Russakovsky","year":"2015","unstructured":"Russakovsky O, Deng J, Su H, Krause J, Satheesh S, Ma S, Huang Z, Karpathy A, Khosla A, Bernstein M et al (2015) Imagenet large scale visual recognition challenge. Int J Comput Vis 115(3):211\u2013252. https:\/\/doi.org\/10.1007\/s11263-015-0816-y","journal-title":"Int J Comput Vis"},{"key":"15337_CR48","doi-asserted-by":"publisher","unstructured":"Shaheed K, Mao A, Qureshi I, Kumar M, Abbas Q, Ullah I, Zhang X (2021) A systematic review on physiological-based biometric recognition systems: current and future trends. Archives of Computational Methods in Engineering, 1\u201344. https:\/\/doi.org\/10.1007\/s11831-021-09560-3","DOI":"10.1007\/s11831-021-09560-3"},{"key":"15337_CR49","unstructured":"Simonyan K, Zisserman A (2015) Very deep convolutional networks for large-scale image recognition. arXiv:1409.1556 [cs.CV]"},{"key":"15337_CR50","doi-asserted-by":"crossref","unstructured":"Singla N, Kaur M, Sofat S (2022) Hybrid framework for identifying partial latent fingerprints using minutiae points and pores. Multimed Tools Applic, 1\u201318","DOI":"10.1007\/s11042-021-11541-4"},{"key":"15337_CR51","unstructured":"SM J, Aravindan C, Appavu R et al (2022) Classification of skin cancer from dermoscopic images using deep neural network architectures. Multimed Tools Applic, 1\u201316"},{"key":"15337_CR52","doi-asserted-by":"publisher","first-page":"41","DOI":"10.2478\/jaiscr-2018-0023","volume":"9","author":"G Souza","year":"2019","unstructured":"Souza G, Santos D, Pires R, Marana A, Papa J (2019) Deep features extraction for robust fingerprint spoofing attack detection. J Artif Intell Soft Comput Res 9:41\u201349. https:\/\/doi.org\/10.2478\/jaiscr-2018-0023","journal-title":"J Artif Intell Soft Comput Res"},{"key":"15337_CR53","first-page":"1","volume":"17","author":"MA Sullabi","year":"2021","unstructured":"Sullabi M A, AL-Montaser J H (2021) Fingerprint classification technique using gradient-based method for singular points detection. J Acad Res(Appl Sci) 17:1","journal-title":"J Acad Res(Appl Sci)"},{"key":"15337_CR54","doi-asserted-by":"publisher","unstructured":"Szegedy C, Vanhoucke V, Ioffe S, Shlens J, Wojna Z (2016) Rethinking the inception architecture for computer vision. In: 2016 IEEE Conference on computer vision and pattern recognition (CVPR), pp 2818\u20132826. https:\/\/doi.org\/10.1109\/CVPR.2016.308","DOI":"10.1109\/CVPR.2016.308"},{"key":"15337_CR55","doi-asserted-by":"publisher","unstructured":"Szegedy C, Ioffe S, Vanhoucke V, Alemi A (2017) Inception-v4, inception-resnet and the impact of residual connections on learning, 31. https:\/\/doi.org\/10.1609\/aaai.v31i1.11231, https:\/\/ojs.aaai.org\/index.php\/AAAI\/article\/view\/11231","DOI":"10.1609\/aaai.v31i1.11231"},{"key":"15337_CR56","unstructured":"Tan M, Le Q (2019) Efficientnet: rethinking model scaling for convolutional neural networks. In: International conference on machine learning, vol 97. PMLR, pp 6105\u20136114. https:\/\/proceedings.mlr.press\/v97\/tan19a.html"},{"issue":"1","key":"15337_CR57","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-020-00349-y","volume":"7","author":"J Tanha","year":"2020","unstructured":"Tanha J, Abdi Y, Samadi N, Razzaghi N, Asadpour M (2020) Boosting methods for multi-class imbalanced data classification: an experimental review. J Big Data 7(1):1\u201347. https:\/\/doi.org\/10.1186\/s40537-020-00349-y","journal-title":"J Big Data"},{"issue":"2","key":"15337_CR58","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1016\/j.jestch.2019.06.005","volume":"23","author":"DM Uliyan","year":"2020","unstructured":"Uliyan D M, Sadeghi S, Jalab H A (2020) Anti-spoofing method for fingerprint recognition using patch based deep learning machine. Eng Sci Technol Int J 23(2):264\u2013273. https:\/\/doi.org\/10.1016\/j.jestch.2019.06.005","journal-title":"Eng Sci Technol Int J"},{"key":"15337_CR59","doi-asserted-by":"publisher","unstructured":"Walhazi H, Haddada L R, Maalej A, Amara N E B (2020) Preprocessing latent-fingerprint images for improving segmentation using morphological snakes. In: 2020 5th International conference on advanced technologies for signal and image processing (ATSIP), pp 1\u20136. https:\/\/doi.org\/10.1109\/ATSIP49331.2020.9231908","DOI":"10.1109\/ATSIP49331.2020.9231908"},{"key":"15337_CR60","doi-asserted-by":"publisher","unstructured":"Walhazi H, Maalej A, Amara N E B (2020) Mask2lfp: mask-constrained adversarial latent fingerprint synthesis. In: 2020 International conference on cyberworlds (CW), pp 265\u2013271. https:\/\/doi.org\/10.1109\/CW49994.2020.00049","DOI":"10.1109\/CW49994.2020.00049"},{"key":"15337_CR61","doi-asserted-by":"publisher","unstructured":"Wu F, Yan S, Smith J, Zhang B (2021) Deep multiple classifier fusion for traffic scene recognition. Granular Comput, 6. https:\/\/doi.org\/10.1007\/s41066-019-00182-6","DOI":"10.1007\/s41066-019-00182-6"},{"key":"15337_CR62","doi-asserted-by":"publisher","unstructured":"Yambay D, Ghiani L, Denti P, Marcialis G L, Roli F, Schuckers S (2012) Livdet 2011 \u2014 fingerprint liveness detection competition 2011. In: 2012 5th IAPR International conference on biometrics (ICB), pp 208\u2013215. https:\/\/doi.org\/10.1109\/ICB.2012.6199810","DOI":"10.1109\/ICB.2012.6199810"},{"key":"15337_CR63","doi-asserted-by":"publisher","first-page":"102144","DOI":"10.1016\/j.bspc.2020.102144","volume":"63","author":"R Zhang","year":"2021","unstructured":"Zhang R, Zong Q, Dou L, Zhao X, Tang Y, Li Z (2021) Hybrid deep neural network using transfer learning for eeg motor imagery decoding. Biomed Signal Process Control 63:102144. https:\/\/doi.org\/10.1016\/j.bspc.2020.102144","journal-title":"Biomed Signal Process Control"},{"issue":"3","key":"15337_CR64","doi-asserted-by":"publisher","first-page":"1050","DOI":"10.1016\/j.patcog.2009.08.004","volume":"43","author":"Q Zhao","year":"2010","unstructured":"Zhao Q, Zhang D, Zhang L, Luo N (2010) High resolution partial fingerprint alignment using pore\u2013valley descriptors. Pattern Recogn 43(3):1050\u20131061. https:\/\/doi.org\/10.1016\/j.patcog.2009.08.004","journal-title":"Pattern Recogn"},{"key":"15337_CR65","unstructured":"Zhou Y, Liang X, Gu Y, Yin Y, Yao L (2020) Multi-classifier interactive learning for ambiguous speech emotion recognition. arXiv:2012.05429"},{"key":"15337_CR66","doi-asserted-by":"publisher","unstructured":"Zoph B, Vasudevan V, Shlens J, Le Q V (2018) Learning transferable architectures for scalable image recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 8697\u20138710. https:\/\/doi.org\/10.1109\/CVPR.2018.00907","DOI":"10.1109\/CVPR.2018.00907"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-15337-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-15337-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-15337-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,6]],"date-time":"2024-01-06T05:27:05Z","timestamp":1704518825000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-15337-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,26]]},"references-count":66,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,1]]}},"alternative-id":["15337"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-15337-6","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,5,26]]},"assertion":[{"value":"30 November 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 March 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 April 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 May 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of Interests"}}]}}