{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T17:22:49Z","timestamp":1771003369745,"version":"3.50.1"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,3,10]],"date-time":"2025-03-10T00:00:00Z","timestamp":1741564800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,3,10]],"date-time":"2025-03-10T00:00:00Z","timestamp":1741564800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["EURASIP J. Adv. Signal Process."],"DOI":"10.1186\/s13634-025-01213-y","type":"journal-article","created":{"date-parts":[[2025,3,10]],"date-time":"2025-03-10T05:28:20Z","timestamp":1741584500000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Person identification using novel local triangular binary pattern-based texture descriptor"],"prefix":"10.1186","volume":"2025","author":[{"given":"Arti","family":"Tekade","sequence":"first","affiliation":[]},{"given":"T.","family":"Vijayan","sequence":"additional","affiliation":[]},{"given":"B.","family":"Karthik","sequence":"additional","affiliation":[]},{"given":"Anurag","family":"Mahajan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,10]]},"reference":[{"key":"1213_CR1","doi-asserted-by":"crossref","unstructured":"Y. Kabbara, A. Shahin, A. Nait-Ali, M. Khalil, An automatic algorithm for human identification using hand X-ray images, in 2013 2nd International Conference on Advances in Biomedical Engineering (2013), pp. 167\u20134","DOI":"10.1109\/ICABME.2013.6648874"},{"key":"1213_CR2","doi-asserted-by":"crossref","unstructured":"S. Shunmugam, R. Selvakumar, Electronic transaction authentication\u2014a survey on multimodal biometrics, in Proceedings IEEE International Conference Computational Intelligence and Computing Research (2014), pp. 1\u20134","DOI":"10.1109\/ICCIC.2014.7238509"},{"key":"1213_CR3","doi-asserted-by":"crossref","unstructured":"H. Saevanee, P. Bhattarakosol, Authenticating user using keystroke dynamics and finger pressure, in 6th IEEE Consumer Communications and Networking Conference (2009), pp. 1\u20132","DOI":"10.1109\/CCNC.2009.4784783"},{"key":"1213_CR4","doi-asserted-by":"crossref","unstructured":"S. Keshishzadeh, S. Rashidi, Single lead electrocardiogram feature extraction for the human verification, in 5th International Conference on Computer and Knowledge Engineering (ICCKE) (2015), pp. 118\u20134","DOI":"10.1109\/ICCKE.2015.7365870"},{"key":"1213_CR5","doi-asserted-by":"crossref","unstructured":"X. Qu, T. Wei, C. Peng, P. Du, A fast face recognition system based on deep learning, in 11th International Symposium on Computational Intelligence and Design (2011), pp. 289\u20134","DOI":"10.1109\/ISCID.2018.00072"},{"key":"1213_CR6","doi-asserted-by":"crossref","unstructured":"J. Lin, J.-P. Li, H. Lin, J. Ming, Robust person identification with face and iris by modified PUM method, in International Conference on Apperceiving Computing and Intelligence Analysis (2009), pp. 321\u2013324","DOI":"10.1109\/ICACIA.2009.5361089"},{"key":"1213_CR7","doi-asserted-by":"crossref","unstructured":"I. Awate, B.A. Dixit, Palm print based person identification, in International Conference on Computing Communication Control and Automation (2015), pp. 781\u2013785","DOI":"10.1109\/ICCUBEA.2015.156"},{"key":"1213_CR8","doi-asserted-by":"crossref","unstructured":"R. G. M. M. Jayamaha, M. R. R. Senadheera, T. N. C. Gamage, K. D. P. B. Weerasekara, G. A. Dissanayaka, and G. N. Kodagoda, Voizlock\u2014human voice authentication system using hidden Markov model, in 4th International Conference on Information Automation Sustainability (2008), pp. 330\u2013335","DOI":"10.1109\/ICIAFS.2008.4783977"},{"key":"1213_CR9","doi-asserted-by":"crossref","unstructured":"X. Huang, L. Shen, Y. Feng, A user authentication scheme based on fingerprint and USIM card, in International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Harbin (2008), pp. 1261\u20131264","DOI":"10.1109\/IIH-MSP.2008.113"},{"key":"1213_CR10","first-page":"5994","volume":"7","author":"Z Rui","year":"2019","unstructured":"Z. Rui, Z. Yan, A survey on biometric authentication: toward secure and privacy-preserving identification. J. Mag. 7, 5994\u20136015 (2019)","journal-title":"J. Mag."},{"issue":"2","key":"1213_CR11","doi-asserted-by":"publisher","first-page":"186","DOI":"10.4103\/0970-0358.85339","volume":"44","author":"AK Bhat","year":"2011","unstructured":"A.K. Bhat et al., Radiographic imaging of the wrist. Indian J. Plast. Surg. 44(2), 186\u2013210 (2011)","journal-title":"Indian J. Plast. Surg."},{"key":"1213_CR12","doi-asserted-by":"publisher","first-page":"53040","DOI":"10.1109\/ACCESS.2019.2912200","volume":"7","author":"A Shrestha","year":"2019","unstructured":"A. Shrestha, A. Mahmood, Review of deep learning algorithms and architectures. IEEE Access 7, 53040\u201353125 (2019)","journal-title":"IEEE Access"},{"key":"1213_CR13","doi-asserted-by":"crossref","unstructured":"J. Song, S. Qin, P. Zhang, Chinese text categorization based on deep belief networks, in IEEE\/ACIS 15th International Conference on Computer and Information Science (ICIS) Okayama (2016), pp. 1\u20135.","DOI":"10.1109\/ICIS.2016.7550914"},{"key":"1213_CR14","first-page":"21954","volume":"5","author":"C Yin","year":"2017","unstructured":"C. Yin, Y. Zhu, J. Fei, X. He, A deep learning approach for intrusion detection using recurrent neural networks. J. Mag. 5, 21954\u201321958 (2017)","journal-title":"J. Mag."},{"key":"1213_CR15","doi-asserted-by":"publisher","first-page":"27781","DOI":"10.1109\/ACCESS.2019.2901672","volume":"7","author":"M Alhussein","year":"2019","unstructured":"M. Alhussein, G. Muhammad, M.S. Hossain, EEG pathology detection based on deep learning. IEEE Access 7, 27781\u201327788 (2019)","journal-title":"IEEE Access"},{"key":"1213_CR16","doi-asserted-by":"publisher","first-page":"110416","DOI":"10.1016\/j.forsciint.2020.110416","volume":"314","author":"F Fan","year":"2020","unstructured":"F. Fan, W. Ke, W. Wu, X. Tian, T. Lyu, Y. Liu, P. Liao, X. Dai, H. Chen, Z. Deng, Automatic human identification from panoramic dental radiographs using the convolutional neural network. Forens. Sci. Int. 314, 110416 (2020)","journal-title":"Forens. Sci. Int."},{"issue":"1","key":"1213_CR17","doi-asserted-by":"publisher","first-page":"20210197","DOI":"10.1259\/dmfr.20210197","volume":"51","author":"RH Putra","year":"2022","unstructured":"R.H. Putra, C. Doi, N. Yoda, E.R. Astuti, K. Sasaki, Current applications and development of artificial intelligence for digital dental radiography. Dentomaxillofac. Radiol.. Radiol. 51(1), 20210197 (2022)","journal-title":"Dentomaxillofac. Radiol.. Radiol."},{"issue":"3","key":"1213_CR18","doi-asserted-by":"publisher","first-page":"171","DOI":"10.4103\/sjhs.sjhs_124_23","volume":"12","author":"EH Zain-Alabdeen","year":"2023","unstructured":"E.H. Zain-Alabdeen, D.F. Felemban, Artificial intelligence and skull imaging advancements in forensic identification. Saudi J. Health Sci. 12(3), 171\u2013177 (2023)","journal-title":"Saudi J. Health Sci."},{"issue":"14","key":"1213_CR19","doi-asserted-by":"publisher","first-page":"4703","DOI":"10.3390\/app10144703","volume":"10","author":"P Mesejo","year":"2020","unstructured":"P. Mesejo, R. Martos, \u00d3. Ib\u00e1\u00f1ez, J. Novo, M. Ortega, A survey on artificial intelligence techniques for biomedical image analysis in skeleton-based forensic human identification. Appl. Sci. 10(14), 4703 (2020)","journal-title":"Appl. Sci."},{"key":"1213_CR20","doi-asserted-by":"crossref","unstructured":"Y. Kabbara, A. Na\u00eft-Ali, A. Shahin, M. Khalil. Hidden biometrie identification\/authentication based on phalanx selection from hand X-ray images with safety considerations. in 2015 International Conference on Image Processing Theory, Tools and Applications (IPTA) (IEEE, 2015), pp. 423\u2013428","DOI":"10.1109\/IPTA.2015.7367180"},{"key":"1213_CR21","unstructured":"J.A. Kauffman, C.H. Slump, H.J. Bernelot Moens. Matching hand radiographs, in 16th Workshop on Circuits, Systems and Signal Processing, ProRISC 2005 (STW, 2005) pp. 629\u2013633"},{"key":"1213_CR22","doi-asserted-by":"crossref","unstructured":"S.V. Joshi, R.D. Kanphade, Forensic approach of human identification using dual cross pattern of hand radiographs, in Intelligent Systems Design and Applications: 18th International Conference on Intelligent Systems Design and Applications (ISDA 2018) held in Vellore, India, December 6\u20138, 2018, Volume 2. (Springer, 2020), pp. 1075\u20131084","DOI":"10.1007\/978-3-030-16660-1_105"},{"key":"1213_CR23","doi-asserted-by":"publisher","first-page":"95424","DOI":"10.1109\/ACCESS.2020.2995788","volume":"8","author":"SV Joshi","year":"2020","unstructured":"S.V. Joshi, R.D. Kanphade, Deep learning based person authentication using hand radiographs: a forensic approach. IEEE Access 8, 95424\u201395434 (2020)","journal-title":"IEEE Access"},{"key":"1213_CR24","doi-asserted-by":"crossref","unstructured":"B. Moniga, D. Nandika, P.S. Monica, V. Roopa, Deep learning-based person authentication using convolutional neural architecture hand radiographs: a forensic approach, in 2021 7th International Conference on Advanced Computing and Communication Systems (ICACCS) (Vol. 1, IEEE, 2021), pp. 879\u2013882","DOI":"10.1109\/ICACCS51430.2021.9441695"},{"issue":"3","key":"1213_CR25","doi-asserted-by":"publisher","first-page":"747","DOI":"10.1109\/TSMC.2017.2744669","volume":"50","author":"A Bera","year":"2020","unstructured":"A. Bera, D. Bhattacharjee, Human identification using selected features from finger geometric profiles. IEEE Trans. Syst. Man Cybern. Syst. 50(3), 747\u2013761 (2020). https:\/\/doi.org\/10.1109\/TSMC.2017.2744669","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"key":"1213_CR26","doi-asserted-by":"publisher","first-page":"21451","DOI":"10.1007\/s11042-016-4075-x","volume":"76","author":"A Bera","year":"2017","unstructured":"A. Bera, D. Bhattacharjee, M. Nasipuri, Finger contour profile based hand biometric recognition. Multimedia Tools Appl. 76, 21451\u201321479 (2017)","journal-title":"Multimedia Tools Appl."},{"key":"1213_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.114583","volume":"171","author":"A Bera","year":"2021","unstructured":"A. Bera, D. Bhattacharjee, H.P.H. Shum, Two-stage human verification using HandCAPTCHA and anti-spoofed finger biometrics with feature selection. Expert Syst. Appl. 171, 114583 (2021)","journal-title":"Expert Syst. Appl."},{"key":"1213_CR28","first-page":"145","volume":"555","author":"A Bera","year":"2014","unstructured":"A. Bera, D. Bhattacharjee, M. Nasipuri, Hand biometrics in digital forensics. Comput. Intell. Digital Forens. Forens. Investig. Appl. 555, 145\u2013163 (2014)","journal-title":"Comput. Intell. Digital Forens. Forens. Investig. Appl."},{"key":"1213_CR29","doi-asserted-by":"crossref","unstructured":"A. Bera, D. Bhattacharjee, M. Nasipuri, Deep neural networks fused with textures for image classification, in International Conference on Frontiers in Computing and Systems (Springer, Singapore, 2022), pp. 103\u2013111","DOI":"10.1007\/978-981-99-2680-0_10"},{"issue":"1","key":"1213_CR30","volume":"2014","author":"TH Rassem","year":"2014","unstructured":"T.H. Rassem, B.E. Khoo, Completed local ternary pattern for rotation invariant texture classification. Sci. World J. 2014(1), 373254 (2014)","journal-title":"Sci. World J."},{"key":"1213_CR31","doi-asserted-by":"publisher","first-page":"1035","DOI":"10.1007\/s11760-018-1246-4","volume":"12","author":"S Zhang","year":"2018","unstructured":"S. Zhang, H. Wang, W. Huang, C. Zhang, Combining modified LBP and weighted SRC for palmprint recognition. SIViP 12, 1035\u20131042 (2018)","journal-title":"SIViP"},{"key":"1213_CR32","doi-asserted-by":"crossref","unstructured":"F. Juefei-Xu, V. Naresh Boddeti, M. Savvides, Local binary convolutional neural networks, in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (2017), pp. 19\u201328.","DOI":"10.1109\/CVPR.2017.456"},{"key":"1213_CR33","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2022.110079","volume":"259","author":"E Al-wajih","year":"2023","unstructured":"E. Al-wajih, R. Ghazali, Threshold center-symmetric local binary convolutional neural networks for bilingual handwritten digit recognition. Knowl. Based Syst. 259, 110079 (2023)","journal-title":"Knowl. Based Syst."},{"issue":"6","key":"1213_CR34","doi-asserted-by":"publisher","first-page":"3267","DOI":"10.1080\/03772063.2021.1919222","volume":"69","author":"R Arya","year":"2023","unstructured":"R. Arya, E.R. Vimina, Local triangular coded pattern: a texture descriptor for image classification. IETE J. Res. 69(6), 3267\u20133278 (2023)","journal-title":"IETE J. Res."},{"issue":"3","key":"1213_CR35","doi-asserted-by":"publisher","first-page":"1466","DOI":"10.35940\/ijitee.B8014.019320","volume":"9","author":"KB Bhangale","year":"2020","unstructured":"K.B. Bhangale, K. Mohanaprasad, Content based image retrieval using collaborative color, texture and shape features. Int. J. Innovat. Technol. Explor. Eng. (IJITEE) 9(3), 1466\u20131469 (2020)","journal-title":"Int. J. Innovat. Technol. Explor. Eng. (IJITEE)"},{"key":"1213_CR36","doi-asserted-by":"crossref","unstructured":"O. Sharifi, M. Mokhtarzade, B.A. Beirami, A deep convolutional neural network based on local binary patterns of Gabor features for classification of hyperspectral images, in 2020 International Conference on Machine Vision and Image Processing (MVIP) (IEEE, 2020), pp. 1\u20135","DOI":"10.1109\/MVIP49855.2020.9187486"},{"key":"1213_CR37","doi-asserted-by":"crossref","unstructured":"K. Bhangale, P. Ingle, R. Kanase, D. Desale, Multi-view multi-pose robust face recognition based on VGGNet, in Second International Conference on Image Processing and Capsule Networks: ICIPCN 2021 2 (Springer, 2022), pp. 414\u2013421","DOI":"10.1007\/978-3-030-84760-9_36"},{"issue":"4","key":"1213_CR38","doi-asserted-by":"publisher","first-page":"839","DOI":"10.3390\/electronics12040839","volume":"12","author":"K Bhangale","year":"2023","unstructured":"K. Bhangale, M. Kothandaraman, Speech emotion recognition based on multiple acoustic features and deep convolutional neural network. Electronics 12(4), 839 (2023)","journal-title":"Electronics"},{"issue":"5","key":"1213_CR39","first-page":"673","volume":"8","author":"J Bharadiya","year":"2023","unstructured":"J. Bharadiya, Convolutional neural networks for image classification. Int. J. Innov. Sci. Res. Technol. 8(5), 673\u2013677 (2023)","journal-title":"Int. J. Innov. Sci. Res. Technol."},{"issue":"4","key":"1213_CR40","doi-asserted-by":"publisher","first-page":"2341","DOI":"10.1007\/s00034-023-02562-5","volume":"43","author":"K Bhangale","year":"2024","unstructured":"K. Bhangale, M. Kothandaraman, Speech emotion recognition using generative adversarial network and deep convolutional neural network. Circuits Syst. Signal Process. 43(4), 2341\u20132384 (2024)","journal-title":"Circuits Syst. Signal Process."},{"issue":"12","key":"1213_CR41","doi-asserted-by":"publisher","first-page":"6999","DOI":"10.1109\/TNNLS.2021.3084827","volume":"33","author":"Z Li","year":"2021","unstructured":"Z. Li, F. Liu, W. Yang, S. Peng, J. Zhou, A survey of convolutional neural networks: analysis, applications, and prospects. IEEE Trans. Neural Netw. Learn. Syst. 33(12), 6999\u20137019 (2021)","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."}],"container-title":["EURASIP Journal on Advances in Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13634-025-01213-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13634-025-01213-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13634-025-01213-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,10]],"date-time":"2025-03-10T05:28:34Z","timestamp":1741584514000},"score":1,"resource":{"primary":{"URL":"https:\/\/asp-eurasipjournals.springeropen.com\/articles\/10.1186\/s13634-025-01213-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,10]]},"references-count":41,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["1213"],"URL":"https:\/\/doi.org\/10.1186\/s13634-025-01213-y","relation":{},"ISSN":["1687-6180"],"issn-type":[{"value":"1687-6180","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,3,10]]},"assertion":[{"value":"11 October 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 February 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 March 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"7"}}