{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T19:24:01Z","timestamp":1770578641398,"version":"3.49.0"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2022,8,22]],"date-time":"2022-08-22T00:00:00Z","timestamp":1661126400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,8,22]],"date-time":"2022-08-22T00:00:00Z","timestamp":1661126400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2023,2]]},"DOI":"10.1007\/s11227-022-04680-4","type":"journal-article","created":{"date-parts":[[2022,8,22]],"date-time":"2022-08-22T13:06:12Z","timestamp":1661173572000},"page":"2767-2782","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":29,"title":["Anti-aliasing convolution neural network of finger vein recognition for virtual reality (VR) human\u2013robot equipment of metaverse"],"prefix":"10.1007","volume":"79","author":[{"given":"Nghi C.","family":"Tran","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7396-7042","authenticated-orcid":false,"given":"Jian\u2011Hong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Toan H.","family":"Vu","sequence":"additional","affiliation":[]},{"given":"Tzu-Chiang","family":"Tai","sequence":"additional","affiliation":[]},{"given":"Jia-Ching","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,22]]},"reference":[{"key":"4680_CR1","doi-asserted-by":"publisher","unstructured":"Mozumder MAI, Sheeraz MM, Athar A, Aich S, Kim HC (2022) Overview: technology roadmap of the future trend of metaverse based on IoT, Blockchain, AI Technique, and Medical Domain Metaverse Activity. In: 2022 24th International Conference on Advanced Communication Technology (ICACT), 2022, pp 256\u2013261, doi: https:\/\/doi.org\/10.23919\/ICACT53585.2022.9728808.","DOI":"10.23919\/ICACT53585.2022.9728808"},{"key":"4680_CR2","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1145\/2480741.2480751","volume":"45","author":"JD Dionisio","year":"2013","unstructured":"Dionisio JD, Burns WG, Gilbert R (2013) 3D virtual worlds and the metaverse: current status and future possibilities. ACM Comput Surv 45:341\u20133438","journal-title":"ACM Comput Surv"},{"key":"4680_CR3","doi-asserted-by":"publisher","unstructured":"Han Y, Oh S (2021) Investigation and research on the negotiation space of mental and mental illness based on metaverse. In: 2021 International Conference on Information and Communication Technology Convergence (ICTC), 2021, pp 673\u2013677. doi:https:\/\/doi.org\/10.1109\/ICTC52510.2021.9621118","DOI":"10.1109\/ICTC52510.2021.9621118"},{"key":"4680_CR4","doi-asserted-by":"publisher","first-page":"4209","DOI":"10.1109\/ACCESS.2021.3140175","volume":"10","author":"SM Park","year":"2022","unstructured":"Park SM, Kim YG (2022) A metaverse: taxonomy, components, applications, and open challenges. IEEE Access 10:4209\u20134251. https:\/\/doi.org\/10.1109\/ACCESS.2021.3140175","journal-title":"IEEE Access"},{"key":"4680_CR5","doi-asserted-by":"publisher","unstructured":"Lee SH, Lee YE, Lee SW (2022) Toward imagined speech based smart communication system: potential applications on metaverse conditions. In: 2022 10th International Winter Conference on Brain Computer Interface (BCI), pp 1\u20134, doi:https:\/\/doi.org\/10.1109\/BCI53720.2022.9734827.","DOI":"10.1109\/BCI53720.2022.9734827"},{"key":"4680_CR6","doi-asserted-by":"crossref","unstructured":"Wang K, Kumar A (2022) Human identification in metaverse using egocentric iris recognition","DOI":"10.36227\/techrxiv.19750411.v1"},{"issue":"1","key":"4680_CR7","first-page":"50","volume":"3","author":"Y Tayal","year":"2013","unstructured":"Tayal Y, Kumar Pandey P, Singh DBV (2013) Face recognition using eigenface. Int J Emerg Technol Comput Appl Sci 3(1):50\u201355","journal-title":"Int J Emerg Technol Comput Appl Sci"},{"key":"4680_CR8","doi-asserted-by":"crossref","unstructured":"Daugman J (2009) How iris recognition works. In: The essential guide to image processing, pp 715\u2013739. Elsevier","DOI":"10.1016\/B978-0-12-374457-9.00025-1"},{"issue":"4","key":"4680_CR9","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1007\/s00138-004-0149-2","volume":"15","author":"N Miura","year":"2004","unstructured":"Miura N, Nagasaka A, Miyatake T (2004) Feature extraction of finger-vein patterns based on repeated line tracking and its application to personal identification. Mach Vis Appl 15(4):194\u2013203","journal-title":"Mach Vis Appl"},{"issue":"8","key":"4680_CR10","doi-asserted-by":"publisher","first-page":"1185","DOI":"10.1093\/ietisy\/e90-d.8.1185","volume":"90","author":"N Miura","year":"2007","unstructured":"Miura N, Nagasaka A, Miyatake T (2007) Extraction of finger vein patterns using maximum curvature points in image profiles. IEICE Trans Inf Syst 90(8):1185\u20131194","journal-title":"IEICE Trans Inf Syst"},{"key":"4680_CR11","doi-asserted-by":"crossref","unstructured":"Huang B, Dai Y, Li R, Tang D, Li W (2010) Finger vein authentication based on wide line detector and pattern normalization. In: 2010 20th International Conference on Pattern Recognition. IEEE, 2010, pp 1269\u20131272","DOI":"10.1109\/ICPR.2010.316"},{"key":"4680_CR12","first-page":"70","volume":"1","author":"W Zhang","year":"2002","unstructured":"Zhang W, Wang Y (2002) \u201cCore based structure matching algorithm of Finger Vein verification,\u201d in Object recognition supported by user interaction for service robots. IEEE 1:70\u201374","journal-title":"IEEE"},{"issue":"2","key":"4680_CR13","doi-asserted-by":"publisher","first-page":"604","DOI":"10.1109\/TNNLS.2020.2979670","volume":"32","author":"DW Otter","year":"2020","unstructured":"Nagao M (1983) Methods of image pattern recognition. Corona, San Antonio, TX","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"4680_CR14","doi-asserted-by":"publisher","first-page":"19143","DOI":"10.1109\/ACCESS.2019.2896880","volume":"7","author":"AB Nassif","year":"2019","unstructured":"Otter DW, Medina JR, Kalita JK (2020) A survey of the usages of deep learning for natural language processing. IEEE Trans Ne ural Netw Learn Syst 32(2):604\u2013624","journal-title":"IEEE Access"},{"key":"4680_CR15","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/j.neucom.2020.01.085","volume":"396","author":"X Wu","year":"2020","unstructured":"Nassif AB, Shahin I, Attili I, Azzeh M, Shaalan K (2019) Speech recognition using deep neural networks: a systematic review. I EEE Access 7:19143\u201319165","journal-title":"Neurocomputing"},{"key":"4680_CR16","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/j.neucom.2020.01.085","volume":"396","author":"X Wu","year":"2020","unstructured":"Wu X, Sahoo D, Hoi SCH (2020) Recent advances in deep learning for object detection. Neurocomputing 396:39\u201364","journal-title":"Neurocomputing"},{"key":"4680_CR17","unstructured":"Minaee S, Abdolrashidi A, Su H, Bennamoun M, Zhang D (2019) Biometrics recognition using deep learning: a survey. arXiv:1912.00271"},{"issue":"9","key":"4680_CR18","doi-asserted-by":"publisher","first-page":"2512","DOI":"10.1109\/TIFS.2019.2902819","volume":"14","author":"W Yang","year":"2019","unstructured":"Liu W, Li W, Sun L, Zhang L, Chen P (2017) Finger vein recognition based on deep learning. In: 2017 12th IEEE Conference o n Industrial Electronics and Applications (ICIEA). IEEE, 2017, pp 205\u2013210","journal-title":"IEEE Trans Inf Forens Secur"},{"issue":"6","key":"4680_CR19","doi-asserted-by":"publisher","first-page":"1297","DOI":"10.3390\/s17061297","volume":"17","author":"HG Hong","year":"2017","unstructured":"Hong HG, Lee MB, Park KR (2017) \u201cConvolutional neural network based finger vein recognition using nir image sensors\u201d. Sensors 17(6):1297","journal-title":"Sensors"},{"key":"4680_CR20","doi-asserted-by":"crossref","unstructured":"Yang W, Hui C, Chen Z, Xue J-H, Liao Q (2019) Fvgan: finger vein representation using generative adversarial networks. IEEE Trans Inf Forens Secur 14(9):2512\u20132524","DOI":"10.1109\/TIFS.2019.2902819"},{"key":"4680_CR21","doi-asserted-by":"publisher","first-page":"65402","DOI":"10.1109\/ACCESS.2020.2984711","volume":"8","author":"J Zeng","year":"2020","unstructured":"Zeng J et al., (2020) \u201cFinger vein verification algorithm based on fully convolutional neural network and conditional random field\u201d. IEEE Access 8:65402\u201365419","journal-title":"IEEE Access"},{"issue":"7","key":"4680_CR22","doi-asserted-by":"publisher","first-page":"3367","DOI":"10.1016\/j.eswa.2013.11.033","volume":"41","author":"MSM Asaari","year":"2014","unstructured":"R\u0131dvan Salih Kuzu, Emanuele Maioranay, and Patrizio Campisi, \u201cVein-based biometric verification using transfer learning,\u201d in 2020 43rd International Conferenceon Telecommunications and Signal Processing (TSP). IEEE, 2020, pp. 403\u2013409.","journal-title":"Exp Syst Appl"},{"key":"4680_CR23","unstructured":"Ying Z, Li G, Gao W (2017) A bioinspired multi-exposure fusion framework for low-light image enhancement. arxiv:1711.00591"},{"key":"4680_CR24","unstructured":"Zhang R (2019) Making convolutional networks shift invariant again. In: International Conference on Machine Learning. PML R, pp 7324\u20137334"},{"key":"4680_CR25","doi-asserted-by":"crossref","unstructured":"Deng J, Guo J, Xue N, Zafeiriou S (2019) Arcface: additive angular margin loss for deep face recognition. In: Proceedings of th e IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp 4690\u20134699","DOI":"10.1109\/CVPR.2019.00482"},{"issue":"7","key":"4680_CR26","doi-asserted-by":"publisher","first-page":"3367","DOI":"10.1016\/j.eswa.2013.11.033","volume":"41","author":"MSM Asaari","year":"2014","unstructured":"Asaari MSM, Suandi SA, Rosdi BA (2014) Fusion of band limited phase only correlation and width centroid contour distance fo r finger based biometrics. Exp Syst Appl 41(7):3367\u20133382","journal-title":"Exp Syst Appl"},{"key":"4680_CR27","doi-asserted-by":"crossref","unstructured":"Yang W, Qin C, Liao Q (2014) A database with ROI extraction for studying fusion of finger vein and finger dorsal texture. In: C hinese Conference on Biometric Recognition. Springer, pp 266\u2013270","DOI":"10.1007\/978-3-319-12484-1_30"},{"key":"4680_CR28","doi-asserted-by":"crossref","unstructured":"Yin Y, Liu L, Sun X (2011) SDUMLAHMT: a multimodal biometric database. In: Chinese Conference on Biometric Recognitio n. Springer, pp 260\u2013268","DOI":"10.1007\/978-3-642-25449-9_33"},{"key":"4680_CR29","doi-asserted-by":"crossref","unstructured":"Gao Huang, Zhuang Liu, Laurens Van Der Maaten, and Kilian Q Weinberger (2017) Densely Connected Convolutional Networks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2017, pp. 4700\u20134708.","DOI":"10.1109\/CVPR.2017.243"},{"key":"4680_CR30","doi-asserted-by":"crossref","unstructured":"Jain AK, Flynn P, Ross AA (2007) Handbook of biometrics. Springer Science &amp; Business Media","DOI":"10.1007\/978-0-387-71041-9"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-022-04680-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-022-04680-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-022-04680-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T13:28:51Z","timestamp":1744205331000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-022-04680-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,22]]},"references-count":30,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,2]]}},"alternative-id":["4680"],"URL":"https:\/\/doi.org\/10.1007\/s11227-022-04680-4","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,8,22]]},"assertion":[{"value":"20 June 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 August 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflicts of interest regarding the publication of this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}