{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T17:51:56Z","timestamp":1772905916029,"version":"3.50.1"},"reference-count":39,"publisher":"Informa UK Limited","issue":"1","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Information Security Journal: A Global Perspective"],"published-print":{"date-parts":[[2026,1,2]]},"DOI":"10.1080\/19393555.2024.2374247","type":"journal-article","created":{"date-parts":[[2024,7,2]],"date-time":"2024-07-02T15:10:37Z","timestamp":1719933037000},"page":"40-52","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":4,"title":["A deep learning-driven fingerprint verification model for enhancing exam integrity in Moroccan higher education"],"prefix":"10.1080","volume":"35","author":[{"given":"Siham","family":"Essahraui","sequence":"first","affiliation":[{"name":"Mohammed Premier University","place":["Oujda, Morocco"]}]},{"given":"Ibrahim","family":"Ouahbi","sequence":"additional","affiliation":[{"name":"Mohammed Premier University","place":["Oujda, Morocco"]}]},{"given":"Khalid El","family":"Makkaoui","sequence":"additional","affiliation":[{"name":"Mohammed Premier University","place":["Oujda, Morocco"]}]},{"given":"Mouncef","family":"Filali Bouami","sequence":"additional","affiliation":[{"name":"Mohammed Premier University","place":["Oujda, Morocco"]}]}],"member":"301","published-online":{"date-parts":[[2024,7,2]]},"reference":[{"key":"e_1_3_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIRCA51532.2021.9544872"},{"key":"e_1_3_2_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-99-0835-6_37"},{"key":"e_1_3_2_4_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218001493000339"},{"key":"e_1_3_2_5_1","doi-asserted-by":"publisher","DOI":"10.3368\/jhr.0620-10947R1"},{"key":"e_1_3_2_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-0716-0826-5_3"},{"key":"e_1_3_2_7_1","doi-asserted-by":"publisher","DOI":"10.1080\/02602938.2020.1719975"},{"key":"e_1_3_2_8_1","doi-asserted-by":"publisher","DOI":"10.1080\/14703297.2023.2190148"},{"key":"e_1_3_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/CommNet56067.2022.9993953"},{"key":"e_1_3_2_10_1","doi-asserted-by":"publisher","DOI":"10.1126\/sciadv.adi0329"},{"key":"e_1_3_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAFFC.2021.3077248"},{"issue":"2","key":"e_1_3_2_12_1","first-page":"503","article-title":"Web-based university classroom attendance system based on deep learning face recognition","volume":"16","author":"Ismail N. A.","year":"2022","unstructured":"Ismail, N. A., Chai, C. W., Samma, H., Salam, M. S., Hasan, L., Wahab, N. H. A., & Rohani, M. F. (2022). Web-based university classroom attendance system based on deep learning face recognition. KSII Transactions on Internet and Information Systems (TIIS), 16(2), 503\u2013523.","journal-title":"KSII Transactions on Internet and Information Systems (TIIS)"},{"key":"e_1_3_2_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2023.08.006"},{"key":"e_1_3_2_14_1","doi-asserted-by":"publisher","DOI":"10.1063\/5.0150724"},{"key":"e_1_3_2_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-020-07224-2"},{"key":"e_1_3_2_16_1","unstructured":"Li H. & Ramachandra R. (2023). Deep learning based fingerprint presentation attack detection: A comprehensive Survey\u201d arXiv preprint arXiv:2305.17522."},{"key":"e_1_3_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAI.2022.3207112"},{"key":"e_1_3_2_18_1","doi-asserted-by":"publisher","DOI":"10.1515\/jisys-2022-0055"},{"key":"e_1_3_2_19_1","doi-asserted-by":"publisher","DOI":"10.32604\/iasc.2023.031692"},{"key":"e_1_3_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2016.7899663"},{"key":"e_1_3_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/NICS54270.2021.9700991"},{"key":"e_1_3_2_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s40305-020-00332-7"},{"key":"e_1_3_2_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s40860-022-00190-5"},{"key":"e_1_3_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICoICT58202.2023.10262652"},{"key":"e_1_3_2_25_1","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6639429"},{"key":"e_1_3_2_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s40860-022-00188-z"},{"key":"e_1_3_2_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.measen.2024.101082"},{"key":"e_1_3_2_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-09314-6"},{"key":"e_1_3_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3253024"},{"issue":"1","key":"e_1_3_2_30_1","first-page":"407","article-title":"Examining effective factors, inhibitory factors and the most common methods of cheating in students: A systematic review","volume":"3","author":"Saeidi M.","year":"2022","unstructured":"Saeidi, M., Noori, M., Jajarmi Khayyat, H., Ashraf Azimi, M., Bolourian, M., & Mirzaei, M. (2022). Examining effective factors, inhibitory factors and the most common methods of cheating in students: A systematic review. Medical Education Bulletin, 3(1), 407\u2013416.","journal-title":"Medical Education Bulletin"},{"issue":"1","key":"e_1_3_2_31_1","first-page":"15","article-title":"Machine learning algorithm to detect impersonation in an essay-based e-exam","volume":"23","author":"Samuel J. K.","year":"2023","unstructured":"Samuel, J. K., Ochieng, P., & Mwanjele, S. (2023). Machine learning algorithm to detect impersonation in an essay-based e-exam. Global Journal of Computer Science and Technology, 23(D1), 15\u201326.","journal-title":"Global Journal of Computer Science and Technology"},{"key":"e_1_3_2_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-023-08610-0"},{"key":"e_1_3_2_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2023.107569"},{"key":"e_1_3_2_34_1","unstructured":"Shehu Y. I. Ruiz-Garcia A. Palade V. & James A. 2018. Sokoto coventry fingerprint dataset \u201d arXiv preprint arXiv:1807.10609."},{"key":"e_1_3_2_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2023.100821"},{"key":"e_1_3_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMTMA.2019.00142"},{"key":"e_1_3_2_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10639-023-12421-0"},{"key":"e_1_3_2_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jecp.2024.105888"},{"key":"e_1_3_2_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.heliyon.2023.e20052"},{"key":"e_1_3_2_40_1","first-page":"595","volume-title":"The International Conference on Artificial Intelligence and Applied Mathematics in Engineering","author":"\u04aaok\u04abetn B.","year":"2022","unstructured":"\u04aaok\u04abetn, B., Kandaz, D., & U\u04abar, M. K. (2022, May). Machine learning-based biometric authentication with photoplethysmography signal. The International Conference on Artificial Intelligence and Applied Mathematics in Engineering, Cham (pp. 595\u2013606). Springer International Publishing."}],"container-title":["Information Security Journal: A Global Perspective"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/19393555.2024.2374247","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T14:45:06Z","timestamp":1766501106000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/19393555.2024.2374247"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,2]]},"references-count":39,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,1,2]]}},"alternative-id":["10.1080\/19393555.2024.2374247"],"URL":"https:\/\/doi.org\/10.1080\/19393555.2024.2374247","relation":{},"ISSN":["1939-3555","1939-3547"],"issn-type":[{"value":"1939-3555","type":"print"},{"value":"1939-3547","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,7,2]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uiss20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uiss20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2024-07-02","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}