{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T16:56:45Z","timestamp":1772989005625,"version":"3.50.1"},"reference-count":44,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2025,2,24]],"date-time":"2025-02-24T00:00:00Z","timestamp":1740355200000},"content-version":"vor","delay-in-days":54,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Applied Computational Intelligence and Soft Computing"],"published-print":{"date-parts":[[2025,1]]},"abstract":"<jats:p>Biometric security systems must be able to detect phony fingerprints to provide reliable authentication. The findings of this study suggest a hybrid approach to the detection of fake fingerprints that uses information on the texture and shape of the fingerprint. The novelty of this approach lies in integrating both traditional fingerprint information and geometric features obtained through wavelet transformation, which has not been extensively explored in previous studies. The proposed procedure uses the traditional fingerprint information and the geometric features that may be collected by wavelet modification. This allows it to take advantage of the complementary capabilities that these two types of capabilities offer. In addition, the hybrid feature set improves the system\u2019s robustness and accuracy by leveraging each feature type\u2019s unique strengths. To achieve this goal, the standard fingerprint information and the geometric aspects of the fingerprint are combined. It is possible to efficiently identify authentic and forged fingerprints by using these hybrid features and training a gradient boosting classifier. The findings of the studies demonstrate that the suggested technique achieves an accuracy of 96% on medium spoofing photos from the SOCOFing dataset, 97% on hard spoofing images, and 98% on mixed spoofing images. This high level of accuracy, especially on mixed spoofing images, showcases the effectiveness of the novel hybrid approach in diverse and challenging scenarios. This places it in the position of being the most accurate way currently accessible among the existing state\u2010of\u2010the\u2010art methods. Furthermore, the proposed method\u2019s scalability and adaptability make it suitable for real\u2010world applications, potentially setting a new standard in biometric security. There is a great deal of optimism that the technique that has been described can increase the reliability and safety of biometric systems when used in situations representative of the actual world.<\/jats:p>","DOI":"10.1155\/acis\/8442143","type":"journal-article","created":{"date-parts":[[2025,2,26]],"date-time":"2025-02-26T19:49:35Z","timestamp":1740599375000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Fake Fingerprint Classification Using Hybrid Features Learning With Gradient Boosting"],"prefix":"10.1155","volume":"2025","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3645-3303","authenticated-orcid":false,"given":"Muhammad Salman","family":"Ali","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9424-1697","authenticated-orcid":false,"given":"Arslan","family":"Akram","sequence":"additional","affiliation":[]},{"given":"Javed","family":"Rashid","sequence":"additional","affiliation":[]},{"given":"Muhammad Arfan","family":"Jaffar","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2701-6646","authenticated-orcid":false,"given":"Dilawar","family":"Shah","sequence":"additional","affiliation":[]},{"given":"Shujaat","family":"Ali","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0826-7346","authenticated-orcid":false,"given":"Muhammad","family":"Tahir","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2025,2,24]]},"reference":[{"key":"e_1_2_10_1_2","article-title":"A Novel Multi-Biometric Technique for Verification of Secure E-Document","volume":"14","author":"Ali A. M.","year":"2024","journal-title":"International Journal of Electrical and Computer Engineering"},{"key":"e_1_2_10_2_2","first-page":"1","article-title":"Methodology for Partial Fingerprint Enrollment and Authentication on Mobile Devices","author":"Mathur S.","year":"2016","journal-title":"International Conference on Biometrics (ICB)"},{"key":"e_1_2_10_3_2","article-title":"Designing a Biometric Strategy (Fingerprint) Measure for Enhancing ATM Security in Indian E-Banking System","volume":"1","author":"Das S.","year":"2011","journal-title":"International Journal of Information and Communication Technology Research"},{"key":"e_1_2_10_4_2","doi-asserted-by":"publisher","DOI":"10.1145\/2933241"},{"key":"e_1_2_10_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/982507.982516"},{"key":"e_1_2_10_6_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-83624-5"},{"key":"e_1_2_10_7_2","volume-title":"Handbook of Multibiometrics","author":"Ross A. A.","year":"2006"},{"key":"e_1_2_10_8_2","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2023.032005"},{"key":"e_1_2_10_9_2","doi-asserted-by":"publisher","DOI":"10.3390\/app12115714"},{"key":"e_1_2_10_10_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-85729-748-8"},{"key":"e_1_2_10_11_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11760-022-02270-8"},{"key":"e_1_2_10_12_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2022.109050"},{"key":"e_1_2_10_13_2","doi-asserted-by":"publisher","DOI":"10.1108\/WJE-09-2020-0456"},{"key":"e_1_2_10_14_2","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2023.035287"},{"key":"e_1_2_10_15_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-16776-x"},{"key":"e_1_2_10_16_2","first-page":"1","article-title":"Fingerprint Classification Using Deep Learning","author":"Ahmad S.","year":"2022","journal-title":"2022 First International Conference on Artificial Intelligence Trends and Pattern Recognition (ICAITPR)"},{"key":"e_1_2_10_17_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-14054-9_31"},{"key":"e_1_2_10_18_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-09314-6"},{"key":"e_1_2_10_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2011.161"},{"key":"e_1_2_10_20_2","doi-asserted-by":"publisher","DOI":"10.21123\/bsj.2022.6550"},{"key":"e_1_2_10_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2018.00187"},{"key":"e_1_2_10_22_2","unstructured":"ShehuY. I. Ruiz-GarciaA. PaladeV. andJamesA. Sokoto Coventry Fingerprint Datase 2018."},{"key":"e_1_2_10_23_2","article-title":"Left or Right Hand Classification From Fingerprint Images Using a Deep Neural Network","volume":"63","author":"Kim J.","year":"2020","journal-title":"Computers, Materials and Continua"},{"key":"e_1_2_10_24_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00371-021-02173-8"},{"key":"e_1_2_10_25_2","doi-asserted-by":"crossref","unstructured":"Al-WajihY. HamanahW. AbidoM. Al-SunniF. andAlwajihF. Finger Type Classification With Deep Convolution Neural Networks 2022.","DOI":"10.5220\/0011327100003271"},{"key":"e_1_2_10_26_2","first-page":"1084","article-title":"Local Binary Pattern With Hyperparameter Tuned Support Vector Machine for Fingerprint Classification","author":"Chougule A.","year":"2019","journal-title":"2019 International Conference on Intelligent Computing and Control Systems (ICCS)"},{"key":"e_1_2_10_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/ASPCON49795.2020.9276660"},{"key":"e_1_2_10_28_2","first-page":"1521","article-title":"Fingerprint Classification Using Deep Neural Network Model Resnet50","volume":"5","author":"Nahar P.","year":"2018","journal-title":"International Journal of Research and Analytical Reviews"},{"key":"e_1_2_10_29_2","first-page":"1703","article-title":"Fingerprint Pattern Classification Using Deep Transfer Learning and Data Augmentation","volume":"39","author":"Ametefe D. S.","year":"2023","journal-title":"The Visual Computer"},{"key":"e_1_2_10_30_2","article-title":"Fingerprint Liveness Detection Based on Fine-Grained Feature Fusion for Intelligent Devices","volume":"8","author":"Li X.","year":"2020","journal-title":"Mathematics"},{"key":"e_1_2_10_31_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-019-04499-w"},{"key":"e_1_2_10_32_2","first-page":"41","article-title":"A Deep Learning Approach in Detailed Fingerprint Identification","volume":"4","author":"Ahmed M.","year":"2023","journal-title":"Computer Vision and Image Analysis for Industry"},{"key":"e_1_2_10_33_2","doi-asserted-by":"publisher","DOI":"10.3390\/sym13050750"},{"key":"e_1_2_10_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2021.3081764"},{"key":"e_1_2_10_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3047723"},{"key":"e_1_2_10_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2990909"},{"key":"e_1_2_10_37_2","doi-asserted-by":"publisher","DOI":"10.14500\/aro.10975"},{"key":"e_1_2_10_38_2","article-title":"Extracting Regions of Interest From Images","author":"B D.","year":"2020","journal-title":"The Medium"},{"key":"e_1_2_10_39_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.net.2020.03.022"},{"key":"e_1_2_10_40_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04070-2_21"},{"key":"e_1_2_10_41_2","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2023.041074"},{"key":"e_1_2_10_42_2","article-title":"Recognizing Facial Expressions Across Cultures Using Gradient Features","volume":"3","author":"Akram A.","year":"2023","journal-title":"Journal of Innovative Computing and Emerging Technologies"},{"key":"e_1_2_10_43_2","doi-asserted-by":"publisher","DOI":"10.56536\/jicet.v3i1.55"},{"key":"e_1_2_10_44_2","doi-asserted-by":"publisher","DOI":"10.3390\/jimaging9080158"}],"container-title":["Applied Computational Intelligence and Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/acis\/8442143","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1155\/acis\/8442143","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/acis\/8442143","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T11:45:30Z","timestamp":1772970330000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/acis\/8442143"}},"subtitle":[],"editor":[{"given":"Ridha","family":"Ejbali","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2025,1]]},"references-count":44,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"alternative-id":["10.1155\/acis\/8442143"],"URL":"https:\/\/doi.org\/10.1155\/acis\/8442143","archive":["Portico"],"relation":{},"ISSN":["1687-9724","1687-9732"],"issn-type":[{"value":"1687-9724","type":"print"},{"value":"1687-9732","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1]]},"assertion":[{"value":"2024-03-09","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-01-23","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-02-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"8442143"}}