{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:24:08Z","timestamp":1740122648615,"version":"3.37.3"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2022,7,12]],"date-time":"2022-07-12T00:00:00Z","timestamp":1657584000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,7,12]],"date-time":"2022-07-12T00:00:00Z","timestamp":1657584000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1007\/s11277-022-09921-6","type":"journal-article","created":{"date-parts":[[2022,7,12]],"date-time":"2022-07-12T13:10:57Z","timestamp":1657631457000},"page":"3347-3361","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Presentation Attack Detection Using Referential Quality Metrics and Minutiae Count"],"prefix":"10.1007","volume":"127","author":[{"given":"Akhilesh","family":"Verma","sequence":"first","affiliation":[]},{"given":"Anshdha","family":"Gupta","sequence":"additional","affiliation":[]},{"given":"Mohammad","family":"Akbar","sequence":"additional","affiliation":[]},{"given":"Arun Kumar","family":"Yadav","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6051-479X","authenticated-orcid":false,"given":"Divakar","family":"Yadav","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,12]]},"reference":[{"key":"9921_CR1","doi-asserted-by":"crossref","unstructured":"Guennouni, S., Mansouri, A. & Ahaitouf, A. (2020). Biometric systems and their applications. In Visual impairment and blindness - what we know and what we have to know, IntechOpen.","DOI":"10.5772\/intechopen.84845"},{"key":"9921_CR2","first-page":"1023","volume":"2020","author":"V Rai","year":"2020","unstructured":"Rai, V., Mehta, K., Jatin, J., Tiwari, D., & Chaurasia, R. (2020). Automated biometric personal identification-techniques and applications. Proceedings of the International Conference on Intelligent Computing and Control Systems, ICICCS, 2020, 1023\u20131030.","journal-title":"Proceedings of the International Conference on Intelligent Computing and Control Systems, ICICCS"},{"key":"9921_CR3","doi-asserted-by":"crossref","unstructured":"Galbally-Herrero, J., Fierrez-Aguilar, J., Rodriguez-Gonzalez, J. D., Alonso-Fernandez, F., Ortega-Garcia, J. & Tapiador, M. (2014). On the vulnerability of fingerprint verification systems to fake fingerprints attacks. In Proceedings - international carnahan conference on security technology, 2006 (pp. 130\u2013136).","DOI":"10.1109\/CCST.2006.313441"},{"key":"9921_CR4","doi-asserted-by":"crossref","unstructured":"Chugh, T., Cao, K. & Jain, A. K. (2017). Fingerprint spoof buster. arXiv (pp. 1\u201313).","DOI":"10.1109\/TIFS.2017.2721099"},{"key":"9921_CR5","doi-asserted-by":"crossref","unstructured":"Verma, A., Gupta, V. K. & Goel, S. (2020). Fingerprint presentation attack detection in open-set scenario using transient liveness factor. Recent Advances in Computer Science and Communications (vol. 13).","DOI":"10.2174\/2666255813999200423123033"},{"key":"9921_CR6","unstructured":"Ghiani, L., Marcialis, G. L. & Roli, F. (2012). Fingerprint liveness detection by local phase quantization. In Proceedings - international conference on pattern recognition (pp. 537\u2013540)."},{"key":"9921_CR7","doi-asserted-by":"crossref","unstructured":"Ahmad, A. S., Hassan, R. & Othman, R. M. (2017). An investigation of fake fingerprint detection approaches. In AIP conference proceedings (vol. 1891).","DOI":"10.1063\/1.5005353"},{"key":"9921_CR8","doi-asserted-by":"crossref","unstructured":"Chugh, T., Cao, K. & Jain, A. K. (2018). Fingerprint spoof detection using minutiae-based local patches. In IEEE international joint conference on biometrics, IJCB 2017, 2018, vol. 2018-Janua (pp. 581\u2013589).","DOI":"10.1109\/BTAS.2017.8272745"},{"issue":"6","key":"9921_CR9","doi-asserted-by":"publisher","first-page":"1206","DOI":"10.1109\/TIFS.2016.2520880","volume":"11","author":"RF Nogueira","year":"2016","unstructured":"Nogueira, R. F., DeAlencarLotufo, R., & CamposMacHado, R. (2016). Fingerprint liveness detection using convolutional neural networks. IEEE Transactions on Information Forensics and Security, 11(6), 1206\u20131213.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"11","key":"9921_CR10","doi-asserted-by":"publisher","first-page":"2447","DOI":"10.1109\/TIFS.2015.2464772","volume":"10","author":"A Rattani","year":"2015","unstructured":"Rattani, A., Scheirer, W. J., & Ross, A. (2015). Open set fingerprint spoof detection across novel fabrication materials. IEEE Transactions on Information Forensics and Security, 10(11), 2447\u20132460.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"9921_CR11","doi-asserted-by":"crossref","unstructured":"Y. Ding and A. Ross, \u201cAn ensemble of one-class SVMs for fingerprint spoof detection across different fabrication materials,\u201d in 8th IEEE International Workshop on Information Forensics and Security, WIFS 2016, 2017, no. December.","DOI":"10.1109\/WIFS.2016.7823572"},{"key":"9921_CR12","first-page":"8","volume":"2","author":"K KrishnaPrasad","year":"2017","unstructured":"KrishnaPrasad, K., & Aithal, P. S. (2017). Literature review on fingerprint level 1 and level 2 features enhancement to improve quality of image. International Journal of Management, Technology, and Social Sciences, 2, 8\u201319.","journal-title":"International Journal of Management, Technology, and Social Sciences"},{"issue":"4","key":"9921_CR13","first-page":"357","volume":"53","author":"C Yuan","year":"2017","unstructured":"Yuan, C., Li, X., Wu, Q. M. J., Li, J., & Sun, X. (2017). Fingerprint liveness detection from different fingerprint materials using convolutional neural network and principal component analysis. Computers, Materials and Continua, 53(4), 357\u2013371.","journal-title":"Computers, Materials and Continua"},{"key":"9921_CR14","unstructured":"Park, E., Cui, X., Kim, W., Liu, J. & Kim, H. (2018) Patch-based fake fingerprint detection using a fully convolutional neural network with a small number of parameters and an optimal threshold. arXiv (pp. 1\u201312)."},{"key":"9921_CR15","doi-asserted-by":"crossref","unstructured":"Gajawada, R, Popli, A., Chugh, T., Namboodiri, A. & Jain, A. K. (2019) Universal material translator: Towards spoof fingerprint generalization. arXiv. (pp. 1\u20138)","DOI":"10.1109\/ICB45273.2019.8987320"},{"issue":"2","key":"9921_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2617756","volume":"47","author":"E Marasco","year":"2014","unstructured":"Marasco, E., & Ross, A. (2014). \u201cA survey on antispoofing schemes for fingerprint recognition systems. ACM Computing Surveys., 47(2), 1\u201336.","journal-title":"ACM Computing Surveys."},{"key":"9921_CR17","doi-asserted-by":"crossref","unstructured":"Tan, B. (2008). Novel methods for fingerprints image analysis detect fake fingers. SPIE Newsroom.","DOI":"10.1117\/2.1200705.1171"},{"key":"9921_CR18","doi-asserted-by":"crossref","unstructured":"Gragnaniello, D., Poggi, G., Sansone, C. & Verdoliva, L. (2013). Fingerprint liveness detection based on weber local image descriptor. In 2013 IEEE workshop on biometric measurements and systems for security and medical applications, BioMS 2013 - Proceedings, 2013, no. September (pp. 46\u201350).","DOI":"10.1109\/BIOMS.2013.6656148"},{"issue":"4","key":"9921_CR19","doi-asserted-by":"publisher","first-page":"1050","DOI":"10.1016\/j.patcog.2014.05.021","volume":"48","author":"D Gragnaniello","year":"2015","unstructured":"Gragnaniello, D., Poggi, G., Sansone, C., & Verdoliva, L. (2015). Local contrast phase descriptor for fingerprint liveness detection. Pattern Recognition, 48(4), 1050\u20131058.","journal-title":"Pattern Recognition"},{"key":"9921_CR20","doi-asserted-by":"crossref","unstructured":"Yang, J., Yang, J., Sun, Z., Shan, S., Zheng, W. & Feng, J. (2015). Biometric recognition: 10th Chinese conference, CCBR 2015 Tianjin, China, november 13\u201315, 2015 proceedings. In Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics) (vol. 9428, pp. 241\u2013249).","DOI":"10.1007\/978-3-319-25417-3"},{"issue":"10","key":"9921_CR21","doi-asserted-by":"publisher","first-page":"83","DOI":"10.14257\/ijsia.2015.9.10.07","volume":"9","author":"G Arunalatha","year":"2015","unstructured":"Arunalatha, G., & Ezhilarasan, M. (2015). Fingerprint spoof detection using quality features. International Journal of Security and Its Applications, 9(10), 83\u201394.","journal-title":"International Journal of Security and Its Applications"},{"issue":"2","key":"9921_CR22","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1007\/s11760-016-0936-z","volume":"11","author":"Z Xia","year":"2017","unstructured":"Xia, Z., Lv, R., Zhu, Y., Ji, P., Sun, H., & Shi, Y. Q. (2017). Fingerprint liveness detection using gradient-based texture features. Signal, Image and Video Processing, 11(2), 381\u2013388.","journal-title":"Signal, Image and Video Processing"},{"key":"9921_CR23","doi-asserted-by":"crossref","unstructured":"Park, E., Kim, W., Li, Q., Kim, H. & Kim, J. (2016). Fingerprint liveness detection using CNN features of random sample patches: Liveness detection using CNN features. In Lecture notes in informatics (LNI), proceedings - series of the gesellschaft fur informatik (GI) (vol P-260).","DOI":"10.1109\/BIOSIG.2016.7736923"},{"issue":"3","key":"9921_CR24","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1049\/iet-bmt.2016.0007","volume":"6","author":"L Ghiani","year":"2017","unstructured":"Ghiani, L., Hadid, A., Marcialis, G. L., & Roli, F. (2017). Fingerprint liveness detection using local texture features. IET Biometrics, 6(3), 224\u2013231.","journal-title":"IET Biometrics"},{"key":"9921_CR25","doi-asserted-by":"crossref","unstructured":"Toosi, A., Cumani, S. & Bottino, A. (2017). CNN patch-based voting for fingerprint liveness detection. In IJCCI 2017 - proceedings of the 9th international joint conference on computational intelligence (pp. 158\u2013165).","DOI":"10.5220\/0006582101580165"},{"key":"9921_CR26","unstructured":"Bartunek, J. S. (2005). Minutiae extraction from fingerprint with neural network and minutiae based fingerprint verification Josef Str. om Bart \u02da ek,\u201d Master\u2019s Thesis MEE."}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-022-09921-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-022-09921-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-022-09921-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,9]],"date-time":"2022-12-09T09:15:13Z","timestamp":1670577313000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-022-09921-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,12]]},"references-count":26,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["9921"],"URL":"https:\/\/doi.org\/10.1007\/s11277-022-09921-6","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2022,7,12]]},"assertion":[{"value":"18 June 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 July 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"We declare that none of the authors has any conflicts of interest involved.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}},{"value":"We declare that none of the authors\u2019 violated any ethical principle.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics Approval"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to Participate"}},{"value":"We provide our consent to the journal for the publication.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for Publication"}}]}}