{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T18:16:31Z","timestamp":1772302591177,"version":"3.50.1"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,10,8]],"date-time":"2024-10-08T00:00:00Z","timestamp":1728345600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2024,10,8]],"date-time":"2024-10-08T00:00:00Z","timestamp":1728345600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Comput Intell Syst"],"DOI":"10.1007\/s44196-024-00653-y","type":"journal-article","created":{"date-parts":[[2024,10,8]],"date-time":"2024-10-08T12:02:03Z","timestamp":1728388923000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Biometric CNN Model for Verification Based on Blockchain and Hyperparameter Optimization"],"prefix":"10.1007","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0921-5596","authenticated-orcid":false,"given":"Esraa","family":"Asem","sequence":"first","affiliation":[]},{"given":"Lobna M.","family":"Abouelmagd","sequence":"additional","affiliation":[]},{"given":"Ahmed Elsaid","family":"Tolba","sequence":"additional","affiliation":[]},{"given":"Samir","family":"Elmougy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,8]]},"reference":[{"issue":"5","key":"653_CR1","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MSP.2015.2437652","volume":"32","author":"A Hadid","year":"2015","unstructured":"Hadid, A., Evans, N., Marcel, S., Fierrez, J.: Biometrics systems under spoofing attack: an evaluation methodology and lessons learned. IEEE Signal Process. Mag. 32(5), 20\u201330 (2015)","journal-title":"IEEE Signal Process. Mag."},{"issue":"2","key":"653_CR2","first-page":"19","volume":"7","author":"JS Kim","year":"2017","unstructured":"Kim, J.S., Pan, S.B., et al.: A study on EMG-based biometrics. J. Internet Serv. Inf. Secur. 7(2), 19\u201331 (2017)","journal-title":"J. Internet Serv. Inf. Secur."},{"issue":"1","key":"653_CR3","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/TCSVT.2003.818349","volume":"14","author":"AK Jain","year":"2004","unstructured":"Jain, A.K., Ross, A., Prabhakar, S.: An introduction to biometric recognition. IEEE Trans. Circuits Syst. Video Technol. 14(1), 4\u201320 (2004)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"653_CR4","doi-asserted-by":"crossref","unstructured":"Liu, J., Chen, Y., Dong, Y., Wang, Y., Zhao, T., Yao, Y.-D.: Continuous user verification via respiratory biometrics. In: IEEE INFOCOM 2020-IEEE Conference on Computer Communications, pp. 1\u201310. IEEE (2020)","DOI":"10.1109\/INFOCOM41043.2020.9155258"},{"key":"653_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.dss.2017.11.003","volume":"106","author":"O Ogbanufe","year":"2018","unstructured":"Ogbanufe, O., Kim, D.J.: Comparing fingerprint-based biometrics authentication versus traditional authentication methods for e-payment. Decis. Support Syst. 106, 1\u201314 (2018)","journal-title":"Decis. Support Syst."},{"key":"653_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101690","volume":"90","author":"AK Trivedi","year":"2020","unstructured":"Trivedi, A.K., Thounaojam, D.M., Pal, S.: Non-invertible cancellable fingerprint template for fingerprint biometric. Comput. Secur. 90, 101690 (2020)","journal-title":"Comput. Secur."},{"issue":"1","key":"653_CR7","doi-asserted-by":"publisher","first-page":"41","DOI":"10.2478\/jaiscr-2018-0023","volume":"9","author":"GB de Souza","year":"2019","unstructured":"de Souza, G.B., da Silva Santos, D.F., Pires, R.G., Marana, A.N., Papa, J.P.: Deep features extraction for robust fingerprint spoofing attack detection. J. Artif. Intell. Soft Comput. Res. 9(1), 41\u201349 (2019)","journal-title":"J. Artif. Intell. Soft Comput. Res."},{"issue":"10","key":"653_CR8","first-page":"1","volume":"8","author":"K Okereafor","year":"2020","unstructured":"Okereafor, K., Osuagwu, O., Ayegba, S.F., Adelaiye, O.: Randomized multi-biometric liveness detection: prospects and applications for secure authentication. SSRN Electron. J. 8(10), 1\u201325 (2020)","journal-title":"SSRN Electron. J."},{"issue":"3","key":"653_CR9","doi-asserted-by":"publisher","first-page":"3370","DOI":"10.1109\/JSYST.2020.2998791","volume":"15","author":"J Bao","year":"2020","unstructured":"Bao, J., He, D., Luo, M., Choo, K.-K.R.: A survey of blockchain applications in the energy sector. IEEE Syst. J. 15(3), 3370\u20133381 (2020)","journal-title":"IEEE Syst. J."},{"key":"653_CR10","doi-asserted-by":"publisher","first-page":"45360","DOI":"10.1109\/ACCESS.2019.2902501","volume":"7","author":"JA Jaoude","year":"2019","unstructured":"Jaoude, J.A., Saade, R.G.: Blockchain applications-usage in different domains. IEEE Access 7, 45360\u201345381 (2019)","journal-title":"IEEE Access"},{"key":"653_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.compchemeng.2023.108478","volume":"180","author":"M-K Kazi","year":"2024","unstructured":"Kazi, M.-K., Faruque Hasan, M.M.: Optimal and secure peer-to-peer carbon emission trading: a game theory informed framework on blockchain. Comput. Chem. Eng. 180, 108478 (2024)","journal-title":"Comput. Chem. Eng."},{"issue":"4","key":"653_CR12","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1504\/IJWGS.2018.095647","volume":"14","author":"Z Zheng","year":"2018","unstructured":"Zheng, Z., Xie, S., Dai, H.-N., Chen, X., Wang, H.: Blockchain challenges and opportunities: a survey. Int. J. Web Grid Serv. 14(4), 352\u2013375 (2018)","journal-title":"Int. J. Web Grid Serv."},{"key":"653_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.ymssp.2019.106382","volume":"135","author":"I Mistry","year":"2020","unstructured":"Mistry, I., Tanwar, S., Tyagi, S., Kumar, N.: Blockchain for 5G-enabled IoT for industrial automation: a systematic review, solutions, and challenges. Mech. Syst. Signal Process. 135, 106382 (2020)","journal-title":"Mech. Syst. Signal Process."},{"issue":"4\u20132","key":"653_CR14","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.18517\/ijaseit.8.4-2.6838","volume":"8","author":"SY Lim","year":"2018","unstructured":"Lim, S.Y., Fotsing, P.T., Almasri, A., Musa, O., Kiah, M.L.M., Ang, T.F., Ismail, R.: Blockchain technology the identity management and authentication service disruptor: a survey. Int. J. Adv. Sci. Eng. Inf. Technol. 8(4\u20132), 1735\u20131745 (2018)","journal-title":"Int. J. Adv. Sci. Eng. Inf. Technol."},{"key":"653_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.103035","volume":"182","author":"MS Ferdous","year":"2021","unstructured":"Ferdous, M.S., Chowdhury, M.J.M., Hoque, M.A.: A survey of consensus algorithms in public blockchain systems for crypto-currencies. J. Netw. Comput. Appl. 182, 103035 (2021)","journal-title":"J. Netw. Comput. Appl."},{"key":"653_CR16","doi-asserted-by":"publisher","first-page":"87299","DOI":"10.1109\/ACCESS.2021.3086225","volume":"9","author":"A Alharthi","year":"2021","unstructured":"Alharthi, A., Ni, Q., Jiang, R.: A privacy-preservation framework based on biometrics blockchain (BBC) to prevent attacks in VANET. IEEE Access 9, 87299\u201387309 (2021)","journal-title":"IEEE Access"},{"key":"653_CR17","doi-asserted-by":"publisher","first-page":"17","DOI":"10.21522\/TIJAR.2014.SE.19.01.Art003","volume":"3","author":"MK Shrivas","year":"2019","unstructured":"Shrivas, M.K., Yeboah, T.: The disruptive blockchain: types, platforms and applications. Texila Int. J. Acad. Res. 3, 17\u201339 (2019)","journal-title":"Texila Int. J. Acad. Res."},{"key":"653_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2024.110260","volume":"242","author":"Z Yang","year":"2024","unstructured":"Yang, Z., Peng, C., Zhong, C., Long, Y.: Consortium blockchain private key protection scheme based on rational secret sharing and blockchain. Comput. Netw. 242, 110260 (2024)","journal-title":"Comput. Netw."},{"key":"653_CR19","doi-asserted-by":"crossref","unstructured":"Shinde, P.P., Shah, S.: A review of machine learning and deep learning applications. In: 2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA), pp. 1\u20136. IEEE (2018)","DOI":"10.1109\/ICCUBEA.2018.8697857"},{"issue":"3","key":"653_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3190618","volume":"51","author":"K Sundararajan","year":"2018","unstructured":"Sundararajan, K., Woodard, D.L.: Deep learning for biometrics: a survey. ACM Comput. Surv. (CSUR) 51(3), 1\u201334 (2018)","journal-title":"ACM Comput. Surv. (CSUR)"},{"issue":"2","key":"653_CR21","doi-asserted-by":"publisher","first-page":"165","DOI":"10.23884\/ejt.2017.7.2.11","volume":"7","author":"M Co\u015fkun","year":"2017","unstructured":"Co\u015fkun, M., Yildirim, \u00d6., U\u00e7a, A., Demir, Y.: An overview of popular deep learning methods. Eur. J. Tech. (EJT) 7(2), 165\u2013176 (2017)","journal-title":"Eur. J. Tech. (EJT)"},{"key":"653_CR22","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1016\/j.neucom.2020.07.061","volume":"415","author":"L Yang","year":"2020","unstructured":"Yang, L., Shami, A.: On hyperparameter optimization of machine learning algorithms: theory and practice. Neurocomputing 415, 295\u2013316 (2020)","journal-title":"Neurocomputing"},{"key":"653_CR23","unstructured":"Liashchynskyi, P., Liashchynskyi, P.: Grid search, random search, genetic algorithm: a big comparison for NAS. arXiv preprint arXiv:1912.06059 (2019)"},{"key":"653_CR24","doi-asserted-by":"crossref","unstructured":"Alibrahim, A., Ludwig, S.A. Hyperparameter optimization: Comparing genetic algorithm against grid search and Bayesian optimization. In: 2021 IEEE Congress on Evolutionary Computation (CEC), pp. 1551\u20131559. IEEE (2021)","DOI":"10.1109\/CEC45853.2021.9504761"},{"key":"653_CR25","doi-asserted-by":"crossref","unstructured":"Goel, A., Agarwal, A., Vatsa, M., Singh, R., Ratha, N.: Securing CNN model and biometric template using blockchain. In: 2019 IEEE 10th International Conference on Biometrics Theory, Applications and Systems (BTAS), pp. 1\u20137. IEEE (2017)","DOI":"10.1109\/BTAS46853.2019.9185999"},{"issue":"6","key":"653_CR26","doi-asserted-by":"publisher","first-page":"951","DOI":"10.3390\/sym12060951","volume":"12","author":"MA Acquah","year":"2020","unstructured":"Acquah, M.A., Chen, N., Pan, J.-S., Yang, H.-M., Yan, B.: Securing fingerprint template using blockchain and distributed storage system. Symmetry 12(6), 951 (2020)","journal-title":"Symmetry"},{"key":"653_CR27","doi-asserted-by":"crossref","unstructured":"Buchmann, N., Rathgeb, C., Baier, H., Busch, C., Margraf, M.: Enhancing breeder document long-term security using blockchain technology. In: 2017 IEEE 41st Annual Computer Software nd Applications Conference (COMPSAC), Vol. 2. pp. 744\u2013748. IEEE (2017)","DOI":"10.1109\/COMPSAC.2017.119"},{"issue":"5","key":"653_CR28","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1016\/S0969-4765(18)30067-5","volume":"2018","author":"P Garcia","year":"2018","unstructured":"Garcia, P.: Biometrics on the blockchain. Biometr. Technol. Today 2018(5), 5\u20137 (2018)","journal-title":"Biometr. Technol. Today"},{"key":"653_CR29","doi-asserted-by":"crossref","unstructured":"Delgado-Mohatar, O., Fierrez, J., Tolosana, R., Vera-Rodriguez, R.: Blockchain and biometrics: a first look into opportunities and challenges. In: Blockchain and applications: international congress, pp. 169\u2013177. Springer (2020)","DOI":"10.1007\/978-3-030-23813-1_21"},{"key":"653_CR30","doi-asserted-by":"publisher","first-page":"94780","DOI":"10.1109\/ACCESS.2021.3088341","volume":"9","author":"A Sedik","year":"2021","unstructured":"Sedik, A., Hammad, M., Abd, A.A., El-Latif, G.M., El-Banby, A.A.M., Khalaf, F.E., El-Samie, A., Iliyasu, A.M., et al.: Deep learning modalities for biometric alteration detection in 5G networks-based secure smart cities. IEEE Access 9, 94780\u201394788 (2021)","journal-title":"IEEE Access"},{"key":"653_CR31","doi-asserted-by":"crossref","unstructured":"Giudice, O., Litrico, M., Battiato, S.: Single architecture and multiple task deep neural network for altered fingerprint analysis. In: 2020 IEEE International Conference on Image Processing (ICIP), pp. 813\u2013817. IEEE (2020)","DOI":"10.1109\/ICIP40778.2020.9191094"},{"key":"653_CR32","doi-asserted-by":"crossref","unstructured":"Fattahi, J., Mejri, M.: Damaged fingerprint recognition by convolutional long short-term memory networks for forensic purposes. In: 2021 IEEE 5th International Conference on Cryptography, Security and Privacy (CSP), pp. 193\u2013199. IEEE (2021)","DOI":"10.1109\/CSP51677.2021.9357588"},{"key":"653_CR33","doi-asserted-by":"crossref","unstructured":"Singh, T., Bhisikar, S., Kumar, M., et al.: Fingerprint identification using modified capsule network. In: 2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT), pp. 1\u20136. IEEE (2021)","DOI":"10.1109\/ICCCNT51525.2021.9580009"},{"key":"653_CR34","unstructured":"Aloweiwi, A.H.: Fingerprint classification using transfer learning technique (2021)"},{"key":"653_CR35","doi-asserted-by":"crossref","unstructured":"Ganesh, D., Akshitha, D., Gayathri, C., Sujana, S.: Fingerprint image identification for crime detection using convolutional neural networks. In: 2022 3rd International Conference for Emerging Technology (INCET), pp. 1\u20136. IEEE (2022)","DOI":"10.1109\/INCET54531.2022.9824388"},{"key":"653_CR36","unstructured":"Shehu, Y.I. Ruiz-Garcia, A., Palade, V., James, A.: Sokoto coventry fingerprint dataset. arXiv preprint arXiv:1807.10609 (2018)"},{"key":"653_CR37","unstructured":"Zahedi, L., Mohammadi, F.G., Rezapour, S., Ohland, M.W., Amini, M.H.: Search algorithms for automated hyper-parameter tuning. arXiv preprint arXiv:2104.14677 (2021)"},{"key":"653_CR38","doi-asserted-by":"crossref","unstructured":"Patro, S., Sahu, K.K.: Normalization: a preprocessing stage. arXiv preprint arXiv:1503.06462 (2015)","DOI":"10.17148\/IARJSET.2015.2305"},{"key":"653_CR39","doi-asserted-by":"crossref","unstructured":"Yu, D., Wang, H., Chen, P., Wei, Z.: Mixed pooling for convolutional neural networks. In: Rough Sets and Knowledge Technology: 9th International Conference, RSKT 2014, Shanghai, China, October 24\u201326, 2014, Proceedings 9, pp. 364\u2013375. Springer (2014)","DOI":"10.1007\/978-3-319-11740-9_34"},{"key":"653_CR40","doi-asserted-by":"crossref","unstructured":"Chauhan, R., Ghanshala, K.K., Joshi, R.C.: Convolutional neural network (CNN) for image detection and recognition. In: 2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC), pp. 278\u2013282. IEEE (2018)","DOI":"10.1109\/ICSCCC.2018.8703316"},{"key":"653_CR41","unstructured":"Agarap, A.F.: Deep learning using rectified linear units (RELU). arXiv preprint arXiv:1803.08375 (2018)"},{"issue":"9","key":"653_CR42","first-page":"875","volume":"44","author":"DM Belete","year":"2022","unstructured":"Belete, D.M., Huchaiah, M.D.: Grid search in hyperparameter optimization of machine learning models for prediction of HIV\/AIDS test results. Int. J. Comput. Appl. 44(9), 875\u2013886 (2022)","journal-title":"Int. J. Comput. Appl."},{"issue":"6","key":"653_CR43","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/3065386","volume":"60","author":"A Krizhevsky","year":"2017","unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.E.: ImageNet classification with deep convolutional neural networks. Commun. ACM 60(6), 84\u201390 (2017)","journal-title":"Commun. ACM"},{"key":"653_CR44","doi-asserted-by":"crossref","unstructured":"Banerjee, K., Gupta, R.R., Vyas, K., Mishra, B., et\u00a0al.: Exploring alternatives to softmax function. arXiv preprint arXiv:2011.11538 (2020)","DOI":"10.5220\/0010502000002996"},{"issue":"8","key":"653_CR45","doi-asserted-by":"publisher","first-page":"1280","DOI":"10.1049\/iet-ipr.2018.5466","volume":"13","author":"T Zia","year":"2019","unstructured":"Zia, T., Ghafoor, M., Tariq, S.A., Taj, I.A.: Robust fingerprint classification with Bayesian convolutional networks. IET Image Process. 13(8), 1280\u20131288 (2019)","journal-title":"IET Image Process."},{"key":"653_CR46","unstructured":"Feng, J., Jain, A.K., Ross, A.: Fingerprint alteration. Submitted to IEEE TIFS (2009)"},{"key":"653_CR47","doi-asserted-by":"crossref","unstructured":"Bekkar, M., Djemaa, H.K., Alitouche, T.A.: Evaluation measures for models assessment over imbalanced data sets. J. Inf. Eng. Appl. 3(10) (2013)","DOI":"10.5121\/ijdkp.2013.3402"}],"container-title":["International Journal of Computational Intelligence Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44196-024-00653-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s44196-024-00653-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44196-024-00653-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,8]],"date-time":"2024-10-08T12:10:24Z","timestamp":1728389424000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s44196-024-00653-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,8]]},"references-count":47,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,12]]}},"alternative-id":["653"],"URL":"https:\/\/doi.org\/10.1007\/s44196-024-00653-y","relation":{},"ISSN":["1875-6883"],"issn-type":[{"value":"1875-6883","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,10,8]]},"assertion":[{"value":"10 January 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 June 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 October 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"256"}}