{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T14:33:07Z","timestamp":1761921187795},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,10,24]],"date-time":"2023-10-24T00:00:00Z","timestamp":1698105600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,10,24]],"date-time":"2023-10-24T00:00:00Z","timestamp":1698105600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SIViP"],"published-print":{"date-parts":[[2024,2]]},"DOI":"10.1007\/s11760-023-02787-6","type":"journal-article","created":{"date-parts":[[2023,10,24]],"date-time":"2023-10-24T14:02:22Z","timestamp":1698156142000},"page":"961-973","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Human identification using palm print images based on deep learning methods and gray wolf optimization algorithm"],"prefix":"10.1007","volume":"18","author":[{"given":"Firas","family":"Alshakree","sequence":"first","affiliation":[]},{"given":"Ayhan","family":"Akbas","sequence":"additional","affiliation":[]},{"given":"Javad","family":"Rahebi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,10,24]]},"reference":[{"key":"2787_CR1","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-5225-0273-9","volume-title":"Cryptographic Solutions for Secure Online Banking and Commerce","author":"K Balasubramanian","year":"2016","unstructured":"Balasubramanian, K.: Cryptographic Solutions for Secure Online Banking and Commerce. IGI Global, Pennsylvania (2016)"},{"key":"2787_CR2","doi-asserted-by":"crossref","unstructured":"Adhinagara, Y., Agung, B.W.T., Novi, D.R.: Implementation of multimodal biometrics recognition system combined palm print and palm geometry features. In: Proceedings of the 2011 International Conference on Electrical Engineering and Informatics, pp. 1\u20135 (2011)","DOI":"10.1109\/ICEEI.2011.6021546"},{"key":"2787_CR3","first-page":"739","volume":"49","author":"JK Winn","year":"1997","unstructured":"Winn, J.K.: Couriers without luggage: Negotiable instruments and digital signatures. SCL Rev. 49, 739 (1997)","journal-title":"SCL Rev."},{"key":"2787_CR4","unstructured":"Matheswaran, P., Navaneethan, C., Meenatchi, S., Ananthi, S., Janaki, K., Manjunathan, A., \u201cImage Privacy in Social Network Using Invisible Watermarking Techniques,\u201d Ann. Rom. Soc. Cell Biol., pp. 319\u2013327, 2021."},{"key":"2787_CR5","doi-asserted-by":"crossref","unstructured":"Raut, S.D., Humbe, V.T., Mane, A.V.: Development of biometrie palm vein trait based person recognition system: Palm vein biometrics system. In 2017 1st international conference on intelligent systems and information management (ICISIM), pp. 18\u201321 (2017)","DOI":"10.1109\/ICISIM.2017.8122140"},{"issue":"1","key":"2787_CR6","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/45.913204","volume":"20","author":"R Venkateswaran","year":"2001","unstructured":"Venkateswaran, R.: Virtual private networks. IEEE Potentials 20(1), 11\u201315 (2001)","journal-title":"IEEE Potentials"},{"key":"2787_CR7","doi-asserted-by":"crossref","unstructured":"Sato, T., Aoyama, S., Sakai, S., Yusa, S., Ito, K., Aoki, T.: A contactless palm recognition system using simple active 3D measurement with diffraction grating laser. In: 2013 2nd IAPR Asian conference on pattern recognition, pp. 542\u2013546 (2013)","DOI":"10.1109\/ACPR.2013.105"},{"issue":"14","key":"2787_CR8","doi-asserted-by":"publisher","first-page":"12119","DOI":"10.1007\/s00521-022-07098-4","volume":"34","author":"S Trabelsi","year":"2022","unstructured":"Trabelsi, S., Samai, D., Dornaika, F., Benlamoudi, A., Bensid, K., Taleb-Ahmed, A.: Efficient palmprint biometric identification systems using deep learning and feature selection methods. Neural Comput. Appl. 34(14), 12119\u201312141 (2022)","journal-title":"Neural Comput. Appl."},{"key":"2787_CR9","doi-asserted-by":"crossref","unstructured":"T\u00fcrk, \u00d6., \u00c7al\u0131\u015fkan, A., Acar, E., Ergen, B.: Palmprint recognition system based on deep region of interest features with the aid of hybrid approach. Signal, Image Video Process 17, 1\u20139 (2023)","DOI":"10.1007\/s11760-023-02612-0"},{"key":"2787_CR10","doi-asserted-by":"crossref","unstructured":"Zhou, Q., Jia, W., Yu, Y.: Multi-stream convolutional neural networks fusion for palmprint recognition. In: Chinese Conference on Biometric Recognition pp. 72\u201381 (2022)","DOI":"10.1007\/978-3-031-20233-9_8"},{"issue":"4","key":"2787_CR11","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/s43657-022-00063-0","volume":"2","author":"Y Fan","year":"2022","unstructured":"Fan, Y., Li, J., Song, S., Zhang, H., Wang, S., Zhai, G.: Palmprint phenotype feature extraction and classification based on deep learning. Phenomics 2(4), 219\u2013229 (2022)","journal-title":"Phenomics"},{"key":"2787_CR12","doi-asserted-by":"crossref","unstructured":"Ahmed, S., Frikha, M., Hussein, T.D.H., Rahebi, J.: Harris Hawks optimization method based on convolutional neural network for face recognition systems. In: 2022 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), pp. 1\u20136 (2022)","DOI":"10.1109\/HORA55278.2022.9799955"},{"key":"2787_CR13","doi-asserted-by":"crossref","unstructured":"Ahmed, S., Frikha, M., Hussein, T.D.H., Rahebi, J.: Face recognition system using histograms of oriented gradients and convolutional neural network based on with particle swarm optimization. In: 2021 International Conference on Electrical, Communication, and Computer Engineering (ICECCE), pp. 1\u20135 (2021)","DOI":"10.1109\/ICECCE52056.2021.9514139"},{"key":"2787_CR14","doi-asserted-by":"crossref","unstructured":"Abdoun, N., El Assad, S., Assaf, R., D\u00e9forges, O., Khalil, M., Belghith, S.: Design and implementation of robust Keyed Hash functions based on Chaotic Neural Network (2018)","DOI":"10.1007\/s12652-019-01244-y"},{"issue":"1","key":"2787_CR15","first-page":"1929","volume":"15","author":"N Srivastava","year":"2014","unstructured":"Srivastava, N., Hinton, G., Krizhevsky, A., Sutskever, I., Salakhutdinov, R.: Dropout: a simple way to prevent neural networks from overfitting. J. Mach. Learn. Res. 15(1), 1929\u20131958 (2014)","journal-title":"J. Mach. Learn. Res."},{"key":"2787_CR16","unstructured":"Kingma, D.P., Ba, J.: Adam: A Method for Stochastic Optimization. arXiv Prepr. arXiv1412.6980 (2014)"},{"key":"2787_CR17","unstructured":"Glorot, X., Bengio, Y.: Understanding the difficulty of training deep feedforward neural networks. In: Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics, pp. 249\u2013256 (2010)."},{"issue":"6","key":"2787_CR18","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/3065386","volume":"60","author":"A Krizhevsky","year":"2017","unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.E.: ImageNet classification with deep convolutional neural networks. Commun. ACM 60(6), 84\u201390 (2017)","journal-title":"Commun. ACM"},{"issue":"5","key":"2787_CR19","doi-asserted-by":"publisher","first-page":"1285","DOI":"10.1109\/TMI.2016.2528162","volume":"35","author":"H-C Shin","year":"2016","unstructured":"Shin, H.-C., et al.: Deep convolutional neural networks for computer-aided detection: CNN architectures, dataset characteristics and transfer learning. IEEE Trans. Med. Imaging 35(5), 1285\u20131298 (2016)","journal-title":"IEEE Trans. Med. Imaging"},{"key":"2787_CR20","doi-asserted-by":"crossref","unstructured":"Szegedy, C., Vanhoucke, V., Ioffe, S., Shlens, J., Wojna, Z.: Rethinking the inception architecture for computer vision. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 2818\u20132826 (2016)","DOI":"10.1109\/CVPR.2016.308"},{"key":"2787_CR21","volume-title":"Unsupervised Relational Feature Learning for Vision","author":"KR Konda","year":"2016","unstructured":"Konda, K.R.: Unsupervised Relational Feature Learning for Vision. Univ.-Bibliothek, Frankfurt am Main (2016)"},{"key":"2787_CR22","volume-title":"Artificial Neural Networks and Statistical Pattern Recognition: Old and New Connections","author":"IK Sethi","year":"2014","unstructured":"Sethi, I.K., Jain, A.K.: Artificial Neural Networks and Statistical Pattern Recognition: Old and New Connections. Elsevier, Amsterdam (2014)"},{"key":"2787_CR23","doi-asserted-by":"crossref","unstructured":"Hecht-Nielsen, R.: Theory of the backpropagation neural network. In: Neural Networks for Perception, Elsevier, Amsterdam, pp. 65\u201393 (1992)","DOI":"10.1016\/B978-0-12-741252-8.50010-8"},{"key":"2787_CR24","doi-asserted-by":"crossref","unstructured":"Miikkulainen, R., et al.: Evolving deep neural networks. In: Artificial Intelligence in the Age of Neural Networks and Brain Computing. Elsevier, Amsterdam, pp. 293\u2013312 (2019)","DOI":"10.1016\/B978-0-12-815480-9.00015-3"},{"key":"2787_CR25","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/j.neunet.2014.09.003","volume":"61","author":"J Schmidhuber","year":"2015","unstructured":"Schmidhuber, J.: Deep learning in neural networks: an overview. Neural Netw. 61, 85\u2013117 (2015)","journal-title":"Neural Netw."},{"key":"2787_CR26","doi-asserted-by":"crossref","unstructured":"Torrey, L., Shavlik, J.: Transfer learning. In: Handbook of Research on Machine Learning Applications and Trends: Algorithms, Methods, and Techniques. IGI Global, pp. 242\u2013264 (2010)","DOI":"10.4018\/978-1-60566-766-9.ch011"},{"key":"2787_CR27","doi-asserted-by":"crossref","unstructured":"Tan, C., Sun, F., Kong, T., Zhang, W., Yang, C., Liu, C.: A survey on deep transfer learning. In: International Conference on Artificial Neural Networks, pp. 270\u2013279 (2018)","DOI":"10.1007\/978-3-030-01424-7_27"},{"key":"2787_CR28","doi-asserted-by":"crossref","unstructured":"Ravishankar, H., et al.: Understanding the mechanisms of deep transfer learning for medical images. In: Deep Learning and Data Labeling for Medical Applications. Springer, Berlin, pp. 188\u2013196 (2016)","DOI":"10.1007\/978-3-319-46976-8_20"},{"key":"2787_CR29","doi-asserted-by":"crossref","unstructured":"Yin, X., Yu, X., Sohn, K., Liu, X., Chandraker, M.: Feature transfer learning for face recognition with under-represented data. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 5704\u20135713 (2019)","DOI":"10.1109\/CVPR.2019.00585"},{"key":"2787_CR30","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1016\/j.conbuildmat.2017.09.110","volume":"157","author":"K Gopalakrishnan","year":"2017","unstructured":"Gopalakrishnan, K., Khaitan, S.K., Choudhary, A., Agrawal, A.: Deep convolutional neural networks with transfer learning for computer vision-based data-driven pavement distress detection. Constr. Build. Mater. 157, 322\u2013330 (2017)","journal-title":"Constr. Build. Mater."},{"issue":"3","key":"2787_CR31","doi-asserted-by":"publisher","first-page":"91","DOI":"10.3390\/info8030091","volume":"8","author":"Y Yu","year":"2017","unstructured":"Yu, Y., Lin, H., Meng, J., Wei, X., Guo, H., Zhao, Z.: Deep transfer learning for modality classification of medical images. Information 8(3), 91 (2017)","journal-title":"Information"},{"key":"2787_CR32","unstructured":"Xin, Z.D.P., Xin, P., Xiaoling, L., Xiaojing, G.: Palmprint recognition based on deep learning (2015)"},{"key":"2787_CR33","unstructured":"Alom, M.Z., et al.: The history began from alexnet: a comprehensive survey on deep learning approaches. arXiv Prepr. arXiv1803.01164 (2018)"},{"key":"2787_CR34","doi-asserted-by":"publisher","unstructured":"Koonce, B.: \u201cSqueezeNet\u201d In Convolutional Neural Networks with Swift for Tensorflow, Springer, Amsterdam, pp. 73\u201385 (2021). https:\/\/doi.org\/10.1049\/cp.2015.0942","DOI":"10.1049\/cp.2015.0942"},{"key":"2787_CR35","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.advengsoft.2013.12.007","volume":"69","author":"S Mirjalili","year":"2014","unstructured":"Mirjalili, S., Mirjalili, S.M., Lewis, A.: Grey wolf optimizer. Adv. Eng. Softw. 69, 46\u201361 (2014)","journal-title":"Adv. Eng. Softw."},{"key":"2787_CR36","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1016\/j.patcog.2017.04.016","volume":"69","author":"L Zhang","year":"2017","unstructured":"Zhang, L., Li, L., Yang, A., Shen, Y., Yang, M.: Towards contactless palmprint recognition: a novel device, a new benchmark, and a collaborative representation based identification approach. Pattern Recognit. 69, 199\u2013212 (2017)","journal-title":"Pattern Recognit."},{"issue":"4","key":"2787_CR37","doi-asserted-by":"publisher","first-page":"391","DOI":"10.18517\/ijaseit.1.4.81","volume":"1","author":"A Jamshidnezhad","year":"2011","unstructured":"Jamshidnezhad, A., Nordin, M.J.: A classifier model based on the features quantitative analysis for facial expression recognition. Int. J. Adv. Sci. Eng. Inf. Technol. 1(4), 391\u2013394 (2011)","journal-title":"Int. J. Adv. Sci. Eng. Inf. Technol."},{"issue":"11","key":"2787_CR38","doi-asserted-by":"publisher","first-page":"1940","DOI":"10.1109\/TPAMI.2010.50","volume":"32","author":"S Koelstra","year":"2010","unstructured":"Koelstra, S., Pantic, M., Patras, I.: A dynamic texture-based approach to recognition of facial actions and their temporal models. IEEE Trans. Pattern Anal. Mach. Intell. 32(11), 1940\u20131954 (2010)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"2","key":"2787_CR39","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1016\/j.patrec.2008.03.014","volume":"30","author":"P Yang","year":"2009","unstructured":"Yang, P., Liu, Q., Metaxas, D.N.: Boosting encoded dynamic features for facial expression recognition. Pattern Recognit. Lett. 30(2), 132\u2013139 (2009)","journal-title":"Pattern Recognit. Lett."},{"key":"2787_CR40","doi-asserted-by":"crossref","unstructured":"Thai, L.H., Nguyen, N.D.T., Hai, T.S.: A facial expression classification system integrating canny, principal component analysis and artificial neural network. arXiv Prepr arXiv1111.4052 (2011)","DOI":"10.7763\/IJMLC.2011.V1.57"},{"key":"2787_CR41","first-page":"363","volume":"4","author":"G Singh","year":"2011","unstructured":"Singh, G., Singh, B.: Feature based method for human facial emotion detection using optical flow based analysis. Int. J. Eng. Sci. 4, 363\u2013372 (2011)","journal-title":"Int. J. Eng. Sci."},{"key":"2787_CR42","unstructured":"PolyU palmprint database. http:\/\/www4.comp.polyu.edu.hk\/~biometrics\/. Accessed in June 2017"}],"container-title":["Signal, Image and Video Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-023-02787-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11760-023-02787-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-023-02787-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,25]],"date-time":"2024-01-25T15:50:19Z","timestamp":1706197819000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11760-023-02787-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,24]]},"references-count":42,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,2]]}},"alternative-id":["2787"],"URL":"https:\/\/doi.org\/10.1007\/s11760-023-02787-6","relation":{},"ISSN":["1863-1703","1863-1711"],"issn-type":[{"value":"1863-1703","type":"print"},{"value":"1863-1711","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,10,24]]},"assertion":[{"value":"13 July 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 August 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 September 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 October 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no relevant financial or non-financial interests to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interests"}},{"value":"This research does not require ethics approval.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"This research uses publicly available anonymous data.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"This research does not contain any individual\u2019s data.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}]}}