{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T02:19:06Z","timestamp":1771294746457,"version":"3.50.1"},"reference-count":39,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Fime SAS"},{"name":"French National Association for Research and Technology (ANRT) as part of doctoral research between Fime SAS and the GREYC Laboratory"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Biom. Behav. Identity Sci."],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1109\/tbiom.2025.3545308","type":"journal-article","created":{"date-parts":[[2025,2,24]],"date-time":"2025-02-24T18:45:54Z","timestamp":1740422754000},"page":"512-523","source":"Crossref","is-referenced-by-count":2,"title":["Fingerprint Spoof Generation Using Style Transfer"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1414-8068","authenticated-orcid":false,"given":"Abdarahmane","family":"Wone","sequence":"first","affiliation":[{"name":"Biometric Lab, FIME EMEA, Caen, France"}]},{"given":"Jo\u00ebl Di","family":"Manno","sequence":"additional","affiliation":[{"name":"Biometric Lab, FIME EMEA, Caen, France"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-6427-2694","authenticated-orcid":false,"given":"Christophe","family":"Charrier","sequence":"additional","affiliation":[{"name":"ENSICAEN, CNRS, GREYC UMR 6072, Universit&#x00E9; Caen Normandie, Caen, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2042-9029","authenticated-orcid":false,"given":"Christophe","family":"Rosenberger","sequence":"additional","affiliation":[{"name":"ENSICAEN, CNRS, GREYC UMR 6072, Universit&#x00E9; Caen Normandie, Caen, France"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Information Technology\u2014Biometric Presentation Attack Detection\u2014Part 1: Framework","year":"2023"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.20517\/jsss.2021.07"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.2106.12423"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.5220\/0010251603450352"},{"key":"ref5","article-title":"Synthesis and reconstruction of fingerprints using generative adversarial networks","author":"Bouzaglo","year":"2022","journal-title":"arXiv:2201.06164"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.632"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CW55638.2022.00057"},{"key":"ref8","article-title":"MeLNet: A generative model for audio in the frequency domain","author":"Vasquez","year":"2019","journal-title":"arXiv:1906.01083"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00453"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00813"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB52358.2021.9484363"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.244"},{"key":"ref13","first-page":"700","article-title":"Unsupervised image-to-image translation networks","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"30","author":"Liu"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.5555\/3305381"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00515"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/9341907"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58548-8_2"},{"key":"ref18","first-page":"1","article-title":"Multi-marginal Wasserstein GAN","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Cao"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2013.6613027"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00916"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2019.2916751"},{"key":"ref22","first-page":"1","article-title":"A unified feature disentangler for multi-domain image translation and manipulation","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"31","author":"Liu"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-019-01284-z"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00821"},{"key":"ref25","article-title":"GMM-UNIT: Unsupervised multi-domain and multi-modal image-to-image translation via attribute Gaussian mixture modeling","author":"Liu","year":"2020","journal-title":"arXiv:2003.06788"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2021.3109419"},{"key":"ref27","article-title":"Universal fingerprint generation: Controllable diffusion model with multimodal conditions","author":"Grosz","year":"2024","journal-title":"arXiv:2404.13791"},{"key":"ref28","first-page":"6840","article-title":"Denoising diffusion probabilistic models","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"33","author":"Ho"},{"key":"ref29","first-page":"2672","article-title":"Generative adversarial nets","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Goodfellow"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICARCV.2010.5707958"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3065386"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84882-254-2_6"},{"issue":"11","key":"ref33","first-page":"2579","article-title":"Visualizing data using t-SNE","volume":"9","author":"Van der Maaten","year":"2008","journal-title":"J. Mach. Learn. Res."},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/PST52912.2021.9647754"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICB45273.2019.8987320"},{"key":"ref37","article-title":"Fingerprint spoof generalization","author":"Chugh","year":"2019","journal-title":"arXiv:1912.02710"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB48548.2020.9304863"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2022.3227762"}],"container-title":["IEEE Transactions on Biometrics, Behavior, and Identity Science"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8423754\/11052638\/10902012.pdf?arnumber=10902012","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,28]],"date-time":"2025-06-28T06:00:40Z","timestamp":1751090440000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10902012\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7]]},"references-count":39,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tbiom.2025.3545308","relation":{},"ISSN":["2637-6407"],"issn-type":[{"value":"2637-6407","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7]]}}}