{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T07:21:56Z","timestamp":1768548116754,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,12,15]],"date-time":"2023-12-15T00:00:00Z","timestamp":1702598400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,12,15]]},"DOI":"10.1145\/3627631.3627651","type":"proceedings-article","created":{"date-parts":[[2024,1,31]],"date-time":"2024-01-31T12:08:32Z","timestamp":1706702912000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["A Novel Framework for Robust Fingerprint Representations using Deep Convolution Network with Attention Mechanism"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-4203-1643","authenticated-orcid":false,"given":"Alka","family":"Ranjan","sequence":"first","affiliation":[{"name":"Computer Science and Engineering Department, Indian Institute of Technology Kharagpur, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1503-5754","authenticated-orcid":false,"given":"Nishkal","family":"Prakash","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering Department, Indian Institute of Technology Kharagpur, India"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-7732-6637","authenticated-orcid":false,"given":"Santhoshkumar","family":"Peddi","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering Department, Indian Institute of Technology Kharagpur, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6104-3771","authenticated-orcid":false,"given":"Debasis","family":"Samanta","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering Department, Indian Institute of Technology Kharagpur, India"}]}],"member":"320","published-online":{"date-parts":[[2024,1,31]]},"reference":[{"key":"e_1_3_2_1_1_1","article-title":"Unconstrained ear recognition using transformers","volume":"7","author":"Alejo B","year":"2021","unstructured":"Marwin\u00a0B Alejo. 2021. Unconstrained ear recognition using transformers. Jordanian Journal of Computers and Information Technology 7, 4 (2021).","journal-title":"Jordanian Journal of Computers and Information Technology"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-021-00444-8"},{"key":"e_1_3_2_1_3_1","volume-title":"Neural machine translation by jointly learning to align and translate. arXiv preprint arXiv:1409.0473","author":"Bahdanau Dzmitry","year":"2014","unstructured":"Dzmitry Bahdanau, Kyunghyun Cho, and Yoshua Bengio. 2014. Neural machine translation by jointly learning to align and translate. arXiv preprint arXiv:1409.0473 (2014)."},{"key":"e_1_3_2_1_4_1","volume-title":"The 5th Asian Conference on Computer Vision","author":"Bernard Sylvain","year":"2002","unstructured":"Sylvain Bernard, Nozha Boujemaa, David Vitale, and Claude Bricot. 2002. Fingerprint segmentation using the phase of multiscale gabor wavelets. In The 5th Asian Conference on Computer Vision, Melbourne, Australia. Citeseer."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0969-4765(07)70140-6"},{"key":"e_1_3_2_1_6_1","volume-title":"Deeplab: Semantic image segmentation with deep convolutional nets, atrous convolution, and fully connected crfs","author":"Chen Liang-Chieh","year":"2017","unstructured":"Liang-Chieh Chen, George Papandreou, Iasonas Kokkinos, Kevin Murphy, and Alan\u00a0L Yuille. 2017. Deeplab: Semantic image segmentation with deep convolutional nets, atrous convolution, and fully connected crfs. IEEE transactions on pattern analysis and machine intelligence 40, 4 (2017), 834\u2013848."},{"key":"e_1_3_2_1_7_1","volume-title":"Exploring transformers for behavioural biometrics: A case study in gait recognition. Pattern Recognition","author":"Delgado-Santos Paula","year":"2023","unstructured":"Paula Delgado-Santos, Ruben Tolosana, Richard Guest, Farzin Deravi, and Ruben Vera-Rodriguez. 2023. Exploring transformers for behavioural biometrics: A case study in gait recognition. Pattern Recognition (2023), 109798."},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition. 11963\u201311975","author":"Ding Xiaohan","year":"2022","unstructured":"Xiaohan Ding, Xiangyu Zhang, Jungong Han, and Guiguang Ding. 2022. Scaling up your kernels to 31x31: Revisiting large kernel design in cnns. In Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition. 11963\u201311975."},{"key":"e_1_3_2_1_9_1","volume-title":"Learning a fixed-length fingerprint representation","author":"Engelsma J","year":"2019","unstructured":"Joshua\u00a0J Engelsma, Kai Cao, and Anil\u00a0K Jain. 2019. Learning a fixed-length fingerprint representation. IEEE transactions on pattern analysis and machine intelligence 43, 6 (2019), 1981\u20131997."},{"key":"e_1_3_2_1_10_1","first-page":"6111","article-title":"PrintsGAN: Synthetic fingerprint generator","volume":"45","author":"Engelsma Joshua\u00a0James","year":"2022","unstructured":"Joshua\u00a0James Engelsma, Steven Grosz, and Anil\u00a0K Jain. 2022. PrintsGAN: Synthetic fingerprint generator. IEEE Transactions on Pattern Analysis and Machine Intelligence 45, 5 (2022), 6111\u20136124.","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3251862"},{"key":"e_1_3_2_1_12_1","volume-title":"Minutiae-guided fingerprint embeddings via vision transformers. arXiv preprint arXiv:2210.13994","author":"Grosz A","year":"2022","unstructured":"Steven\u00a0A Grosz, Joshua\u00a0J Engelsma, Rajeev Ranjan, Naveen Ramakrishnan, Manoj Aggarwal, Gerard\u00a0G Medioni, and Anil\u00a0K Jain. 2022. Minutiae-guided fingerprint embeddings via vision transformers. arXiv preprint arXiv:2210.13994 (2022)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3154296"},{"key":"e_1_3_2_1_14_1","volume-title":"Attention mechanisms in computer vision: A survey. Computational visual media 8, 3","author":"Guo Meng-Hao","year":"2022","unstructured":"Meng-Hao Guo, Tian-Xing Xu, Jiang-Jiang Liu, Zheng-Ning Liu, Peng-Tao Jiang, Tai-Jiang Mu, Song-Hai Zhang, Ralph\u00a0R Martin, Ming-Ming Cheng, and Shi-Min Hu. 2022. Attention mechanisms in computer vision: A survey. Computational visual media 8, 3 (2022), 331\u2013368."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.123"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_17_1","volume-title":"Gaussian error linear units (gelus). arXiv preprint arXiv:1606.08415","author":"Hendrycks Dan","year":"2016","unstructured":"Dan Hendrycks and Kevin Gimpel. 2016. Gaussian error linear units (gelus). arXiv preprint arXiv:1606.08415 (2016)."},{"key":"e_1_3_2_1_18_1","volume-title":"Improving neural networks by preventing co-adaptation of feature detectors. arXiv preprint arXiv:1207.0580","author":"Hinton E","year":"2012","unstructured":"Geoffrey\u00a0E Hinton, Nitish Srivastava, Alex Krizhevsky, Ilya Sutskever, and Ruslan\u00a0R Salakhutdinov. 2012. Improving neural networks by preventing co-adaptation of feature detectors. arXiv preprint arXiv:1207.0580 (2012)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00745"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS53200.2021.9648393"},{"key":"e_1_3_2_1_21_1","volume-title":"Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980","author":"Kingma P","year":"2014","unstructured":"Diederik\u00a0P Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014)."},{"key":"e_1_3_2_1_22_1","volume-title":"The Hungarian method for the assignment problem. Naval research logistics quarterly 2, 1-2","author":"Kuhn W","year":"1955","unstructured":"Harold\u00a0W Kuhn. 1955. The Hungarian method for the assignment problem. Naval research logistics quarterly 2, 1-2 (1955), 83\u201397."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICB45273.2019.8987387"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-020-67529-x"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2854765"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3197058"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Haojie Ma Wenzhong Li Xiao Zhang Songcheng Gao and Sanglu Lu. 2019. AttnSense: Multi-level attention mechanism for multimodal human activity recognition.. In IJCAI. 3109\u20133115.","DOI":"10.24963\/ijcai.2019\/431"},{"key":"e_1_3_2_1_28_1","volume-title":"Fingernet: Pushing the limits of fingerprint recognition using convolutional neural network. arXiv preprint arXiv:1907.12956","author":"Minaee Shervin","year":"2019","unstructured":"Shervin Minaee, Elham Azimi, and Amirali Abdolrashidi. 2019. Fingernet: Pushing the limits of fingerprint recognition using convolutional neural network. arXiv preprint arXiv:1907.12956 (2019)."},{"key":"e_1_3_2_1_29_1","volume-title":"Retrieved","year":"2023","unstructured":"Neurotechnology. 2023. VeriFinger SDK. Retrieved August 07, 2023 from https:\/\/www.neurotechnology.com\/verifinger.html"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICB2018.2018.00013"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW56347.2022.00169"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-021-10560-5"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11760-021-02006-0"},{"key":"e_1_3_2_1_34_1","volume-title":"Handbook of Biometric Anti-Spoofing: Presentation Attack Detection and Vulnerability Assessment","author":"Popli Additya","unstructured":"Additya Popli, Saraansh Tandon, Joshua\u00a0J Engelsma, and Anoop Namboodiri. 2023. A unified model for fingerprint authentication and presentation attack detection. In Handbook of Biometric Anti-Spoofing: Presentation Attack Detection and Vulnerability Assessment. Springer, 77\u201399."},{"key":"e_1_3_2_1_35_1","volume-title":"Fingerprint Feature Extraction Using CNN with Multiple Attention Mechanisms. In 2022 IEEE International Joint Conference on Biometrics (IJCB). IEEE, 1\u20138.","author":"Sasuga Nagisa","year":"2022","unstructured":"Nagisa Sasuga, Koichi Ito, and Takafumi Aoki. 2022. Fingerprint Feature Extraction Using CNN with Multiple Attention Mechanisms. In 2022 IEEE International Joint Conference on Biometrics (IJCB). IEEE, 1\u20138."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2018.11.018"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/FG57933.2023.10042710"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.308"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB48548.2020.9304861"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3076307"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR56361.2022.9956435"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2017.8272688"},{"key":"e_1_3_2_1_43_1","volume-title":"Deep learning for computer vision: A brief review. Computational intelligence and neuroscience 2018","author":"Voulodimos Athanasios","year":"2018","unstructured":"Athanasios Voulodimos, Nikolaos Doulamis, Anastasios Doulamis, Eftychios Protopapadakis, 2018. Deep learning for computer vision: A brief review. Computational intelligence and neuroscience 2018 (2018)."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01234-2_1"},{"key":"e_1_3_2_1_45_1","volume-title":"Minutiae-awarely Learning Fingerprint Representation for Fingerprint Indexing. In 2022 IEEE International Joint Conference on Biometrics (IJCB). IEEE, 1\u20138.","author":"Wu Song","year":"2022","unstructured":"Song Wu, Bing Liu, Zheng Wang, Zexi Jia, and Jufu Feng. 2022. Minutiae-awarely Learning Fingerprint Representation for Fingerprint Indexing. In 2022 IEEE International Joint Conference on Biometrics (IJCB). IEEE, 1\u20138."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01649"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/WACV56688.2023.00103"},{"key":"e_1_3_2_1_48_1","volume-title":"Face transformer for recognition. arXiv preprint arXiv:2103.14803","author":"Zhong Yaoyao","year":"2021","unstructured":"Yaoyao Zhong and Weihong Deng. 2021. Face transformer for recognition. arXiv preprint arXiv:2103.14803 (2021)."}],"event":{"name":"ICVGIP '23: Indian Conference on Computer Vision, Graphics and Image Processing","location":"Rupnagar India","acronym":"ICVGIP '23"},"container-title":["Proceedings of the Fourteenth Indian Conference on Computer Vision, Graphics and Image Processing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3627631.3627651","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3627631.3627651","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T19:50:31Z","timestamp":1755892231000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3627631.3627651"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,15]]},"references-count":48,"alternative-id":["10.1145\/3627631.3627651","10.1145\/3627631"],"URL":"https:\/\/doi.org\/10.1145\/3627631.3627651","relation":{},"subject":[],"published":{"date-parts":[[2023,12,15]]},"assertion":[{"value":"2024-01-31","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}