{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:59:14Z","timestamp":1773615554050,"version":"3.50.1"},"reference-count":31,"publisher":"Allerton Press","issue":"4","license":[{"start":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T00:00:00Z","timestamp":1754006400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T00:00:00Z","timestamp":1754006400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2025,8]]},"DOI":"10.3103\/s0146411625700658","type":"journal-article","created":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T12:41:44Z","timestamp":1762951304000},"page":"503-515","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Unsupervised Divergence-Based Domain Adaptation for Fingerprint Presentation Attack Detection"],"prefix":"10.3103","volume":"59","author":[{"family":"Atul Kumar Uttam","sequence":"first","affiliation":[]},{"given":"Rohit","family":"Agarwal","sequence":"additional","affiliation":[]},{"given":"Anand Singh","family":"Jalal","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2025,11,12]]},"reference":[{"key":"7854_CR1","doi-asserted-by":"publisher","unstructured":"Maltoni, D., Maio, D., Jain, A.K., and Prabhakar, S., Handbook of Fingerprint Recognition, London: Springer, 2009, 2nd ed. https:\/\/doi.org\/10.1007\/978-1-84882-254-2","DOI":"10.1007\/978-1-84882-254-2"},{"key":"7854_CR2","unstructured":"Long, M., Cao, Y., Wang, J., and Jordan, M., Learning transferable features with deep adaptation networks, International Conference on Machine Learning, PMLR, 2015, pp. 97\u2013105."},{"key":"7854_CR3","doi-asserted-by":"publisher","unstructured":"Sun, B. and Saenko, K., Deep CORAL: Correlation alignment for deep domain adaptation, Computer Vision\u2013ECCV 2016 Workshops, Hua, G. and J\u00e9gou, H., Eds., Lecture Notes in Computer Science, vol. 9915, Cham: Springer, 2016, pp. 443\u2013450. https:\/\/doi.org\/10.1007\/978-3-319-49409-8_35","DOI":"10.1007\/978-3-319-49409-8_35"},{"key":"7854_CR4","doi-asserted-by":"publisher","first-page":"2447","DOI":"10.1109\/tifs.2015.2464772","volume":"10","author":"A. Rattani","year":"2015","unstructured":"Rattani, A., Scheirer, W.J., and Ross, A., Open set fingerprint spoof detection across novel fabrication materials, IEEE Trans. Inf. Forensics Secur., 2015, vol. 10, no. 11, pp. 2447\u20132460. https:\/\/doi.org\/10.1109\/tifs.2015.2464772","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"7854_CR5","doi-asserted-by":"publisher","unstructured":"Ding, Ya. and Ross, A., An ensemble of one-class SVMs for fingerprint spoof detection across different fabrication materials, 2016 IEEE International Workshop on Information Forensics and Security (WIFS), Abu Dhabi, 2016, IEEE, 2016, pp. 1\u20136. https:\/\/doi.org\/10.1109\/wifs.2016.7823572","DOI":"10.1109\/wifs.2016.7823572"},{"key":"7854_CR6","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1109\/tcds.2019.2920364","volume":"12","author":"Ch. Yuan","year":"2019","unstructured":"Yuan, Ch., Xia, Zh., Sun, X., and Wu, Q.M.J., Deep residual network with adaptive learning framework for fingerprint liveness detection, IEEE Trans. Cognit. Dev. Syst., 2019, vol. 12, no. 3, pp. 461\u2013473. https:\/\/doi.org\/10.1109\/tcds.2019.2920364","journal-title":"IEEE Trans. Cognit. Dev. Syst."},{"key":"7854_CR7","doi-asserted-by":"publisher","first-page":"1526","DOI":"10.1109\/tsmc.2018.2874281","volume":"50","author":"Zh. Xia","year":"2018","unstructured":"Xia, Zh., Yuan, Ch., Lv, R., Sun, X., Xiong, N.N., and Shi, Y.-Q., A novel Weber local binary descriptor for fingerprint liveness detection, IEEE Trans. Syst., Man, Cybern.: Syst., 2018, vol. 50, no. 4, pp. 1526\u20131536. https:\/\/doi.org\/10.1109\/tsmc.2018.2874281","journal-title":"IEEE Trans. Syst., Man, Cybern.: Syst."},{"key":"7854_CR8","doi-asserted-by":"publisher","first-page":"22129","DOI":"10.1007\/s11042-021-11254-8","volume":"81","author":"D. Sharma","year":"2022","unstructured":"Sharma, D. and Selwal, A., An intelligent approach for fingerprint presentation attack detection using ensemble learning with improved local image features, Multimedia Tools Appl., 2022, vol. 81, no. 16, pp. 22129\u201322161. https:\/\/doi.org\/10.1007\/s11042-021-11254-8","journal-title":"Multimedia Tools Appl."},{"key":"7854_CR9","doi-asserted-by":"publisher","first-page":"2999","DOI":"10.1007\/s00371-021-02173-8","volume":"38","author":"D. Sharma","year":"2022","unstructured":"Sharma, D. and Selwal, A., HyFiPAD: A hybrid approach for fingerprint presentation attack detection using local and adaptive image features, Visual Comput., 2022, vol. 38, no. 8, pp. 2999\u20133025. https:\/\/doi.org\/10.1007\/s00371-021-02173-8","journal-title":"Visual Comput."},{"key":"7854_CR10","doi-asserted-by":"publisher","first-page":"1206","DOI":"10.1109\/tifs.2016.2520880","volume":"11","author":"R.F. Nogueira","year":"2016","unstructured":"Nogueira, R.F., De Alencar Lotufo, R., and Campos Machado, R., Fingerprint liveness detection using convolutional neural networks, IEEE Trans. Inf. Forensics Secur., 2016, vol. 11, no. 6, pp. 1206\u20131213. https:\/\/doi.org\/10.1109\/tifs.2016.2520880","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"7854_CR11","doi-asserted-by":"publisher","unstructured":"Marasco, E., Wild, P., and Cukic, B., Robust and interoperable fingerprint spoof detection via convolutional neural networks, 2016 IEEE Symposium on Technologies for Homeland Security (HST), Waltham, MA, 2016, IEEE, 2016, pp. 1\u20136. https:\/\/doi.org\/10.1109\/ths.2016.7568925","DOI":"10.1109\/ths.2016.7568925"},{"key":"7854_CR12","doi-asserted-by":"publisher","unstructured":"Park, E., Cui, X., Kim, W., Liu, J., and Kim, H., Patch-based fake fingerprint detection using a fully convolutional neural network with a small number of parameters and an optimal threshold, arXiv Preprint, 2018. https:\/\/doi.org\/10.48550\/arXiv.1803.07817","DOI":"10.48550\/arXiv.1803.07817"},{"key":"7854_CR13","doi-asserted-by":"publisher","unstructured":"Pala, F. and Bhanu, B., Deep triplet embedding representations for liveness detection, Deep Learning for Biometrics, Bhanu, B. and Kumar, A., Eds., Advances in Computer Vision and Pattern Recognition, Cham: Springer, 2017, pp. 287\u2013307. https:\/\/doi.org\/10.1007\/978-3-319-61657-5_12","DOI":"10.1007\/978-3-319-61657-5_12"},{"key":"7854_CR14","doi-asserted-by":"publisher","unstructured":"Chugh, T., Cao, K., and Jain, A.K., Fingerprint spoof detection using minutiae-based local patches, 2017 IEEE International Joint Conference on Biometrics (IJCB), Denver, CO, 2017, IEEE, 2017, pp. 581\u2013589. https:\/\/doi.org\/10.1109\/btas.2017.8272745","DOI":"10.1109\/btas.2017.8272745"},{"key":"7854_CR15","doi-asserted-by":"publisher","first-page":"91476","DOI":"10.1109\/access.2019.2927357","volume":"7","author":"Yo. Zhang","year":"2019","unstructured":"Zhang, Yo., Shi, D., Zhan, X., Cao, D., Zhu, K., and Li, Zh., Slim-ResCNN: A deep residual convolutional neural network for fingerprint liveness detection, IEEE Access, 2019, vol. 7, pp. 91476\u201391487. https:\/\/doi.org\/10.1109\/access.2019.2927357","journal-title":"IEEE Access"},{"key":"7854_CR16","doi-asserted-by":"publisher","first-page":"12315","DOI":"10.1109\/tcyb.2021.3081764","volume":"52","author":"H. Liu","year":"2021","unstructured":"Liu, H., Zhang, W., Liu, F., Wu, H., and Shen, L., Fingerprint presentation attack detector using global-local model, IEEE Trans. Cybern., 2021, vol. 52, no. 11, pp. 12315\u201312328. https:\/\/doi.org\/10.1109\/tcyb.2021.3081764","journal-title":"IEEE Trans. Cybern."},{"key":"7854_CR17","doi-asserted-by":"publisher","first-page":"100210","DOI":"10.1016\/j.mlwa.2021.100210","volume":"7","author":"Sh. Agarwal","year":"2022","unstructured":"Agarwal, Sh., Rattani, A., and Chowdary, C.R., A-iLearn: An adaptive incremental learning model for spoof fingerprint detection, Mach. Learn. Appl., 2022, vol. 7, p. 100210. https:\/\/doi.org\/10.1016\/j.mlwa.2021.100210","journal-title":"Mach. Learn. Appl."},{"key":"7854_CR18","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/tifs.2020.2990789","volume":"16","author":"T. Chugh","year":"2020","unstructured":"Chugh, T. and Jain, A.K., Fingerprint spoof detector generalization, IEEE Trans. Inf. Forensics Secur., 2020, vol. 16, pp. 42\u201355. https:\/\/doi.org\/10.1109\/tifs.2020.2990789","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"7854_CR19","doi-asserted-by":"publisher","unstructured":"Rai, A., Dey, S., Patidar, P., and Rai, P., MoSFPAD: An end-to-end ensemble of mobile net and support vector classifier for fingerprint presentation attack detection, arXiv Preprint, 2023. https:\/\/doi.org\/10.48550\/arXiv.2303.01465","DOI":"10.48550\/arXiv.2303.01465"},{"key":"7854_CR20","doi-asserted-by":"publisher","unstructured":"Rai, A., Tiwari, P.K., Baishya, J., Sharma, R.P., and Dey, S., DyFFPAD: Dynamic fusion of convolutional and handcrafted features for fingerprint presentation attack detection, arXiv Preprint, 2023. https:\/\/doi.org\/10.48550\/arXiv.2308.10015","DOI":"10.48550\/arXiv.2308.10015"},{"key":"7854_CR21","doi-asserted-by":"publisher","unstructured":"He, K., Zhang, X., Ren, Sh., and Sun, J., Deep residual learning for image recognition, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Las Vegas, 2016, IEEE, 2016, pp. 770\u2013778. https:\/\/doi.org\/10.1109\/cvpr.2016.90","DOI":"10.1109\/cvpr.2016.90"},{"key":"7854_CR22","doi-asserted-by":"publisher","unstructured":"Mura, V., Ghiani, L., Marcialis, G.L., Roli, F., Yambay, D.A., and Schuckers, S.A., LivDet 2015 fingerprint liveness detection competition 2015, 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS), Arlington, VA, 2015, IEEE, 2015, pp. 1\u20136. https:\/\/doi.org\/10.1109\/btas.2015.7358776","DOI":"10.1109\/btas.2015.7358776"},{"key":"7854_CR23","doi-asserted-by":"publisher","unstructured":"Mura, V., Orru, G., Casula, R., Sibiriu, A., Loi, G., Tuveri, P., Ghiani, L., and Marcialis, G.L., LivDet 2017 Fingerprint Liveness Detection Competition 2017, 2018 International Conference on Biometrics (ICB), Gold Coast, Australia, 2017, IEEE, 2017, pp. 297\u2013302. https:\/\/doi.org\/10.1109\/icb2018.2018.00052","DOI":"10.1109\/icb2018.2018.00052"},{"key":"7854_CR24","doi-asserted-by":"publisher","unstructured":"Micheletto, M., Orr\u00f9, G., Casula, R., Yambay, D., Marcialis, G.L., and Schuckers, S., Review of the Fingerprint Liveness Detection (LivDet) Competition Series: From 2009 to 2021, Handbook of Biometric Anti-Spoofing, Marcel, S., Fierrez, J., and Evans, N., Eds., Advances in Computer Vision and Pattern Recognition, Singapore: Springer, 2023, pp. 57\u201376. https:\/\/doi.org\/10.1007\/978-981-19-5288-3_3","DOI":"10.1007\/978-981-19-5288-3_3"},{"key":"7854_CR25","unstructured":"ISO\/IEC 30107-3:2023(en) Information Technology. Biometric Presentation Attack Detection. Part 3: Testing and Reporting, 2023. https:\/\/www.iso.org\/standard\/79520.html. Cited December 21, 2023."},{"key":"7854_CR26","doi-asserted-by":"publisher","unstructured":"Chugh, T. and Jain, A.K., Fingerprint presentation attack detection: Generalization and efficiency, 2019 International Conference on Biometrics (ICB), Crete, Greece, 2019, IEEE, 2019, pp. 1\u20138. https:\/\/doi.org\/10.1109\/icb45273.2019.8987374","DOI":"10.1109\/icb45273.2019.8987374"},{"key":"7854_CR27","unstructured":"ISO\/IEC 30107-1:2023(en) Information Technology. Biometric Presentation Attack Detection. Part 1: Framework, 2023. https:\/\/www.iso.org\/standard\/83828.html. Cited December 21, 2023."},{"key":"7854_CR28","doi-asserted-by":"publisher","first-page":"622","DOI":"10.1117\/12.530907","volume":"5306","author":"U. Uludag","year":"2004","unstructured":"Uludag, U. and Jain, A.K., Attacks on biometric systems: A case study in fingerprints, Proc. SPIE, 2004, vol.\u00a05306, pp. 622\u2013633. https:\/\/doi.org\/10.1117\/12.530907","journal-title":"Proc. SPIE"},{"key":"7854_CR29","doi-asserted-by":"publisher","unstructured":"Grosz, S.A., Chugh, T., and Jain, A.K., Fingerprint presentation attack detection: A sensor and material agnostic approach, 2020 IEEE International Joint Conference on Biometrics (IJCB), Houston, TX, 2020, IEEE, 2020, pp. 1\u201310. https:\/\/doi.org\/10.1109\/ijcb48548.2020.9304863","DOI":"10.1109\/ijcb48548.2020.9304863"},{"key":"7854_CR30","doi-asserted-by":"publisher","first-page":"117","DOI":"10.20517\/jsss.2021.07","volume":"2","author":"K. Karampidis","year":"2021","unstructured":"Karampidis, K., Rousouliotis, M., Linardos, E., and Kavallieratou, E., A comprehensive survey of fingerprint presentation attack detection, Journal of Surveillance, \n               Security and Safety, 2021, vol. 2, no. 4, pp. 117\u2013161. https:\/\/doi.org\/10.20517\/jsss.2021.07","journal-title":"Security and Safety"},{"key":"7854_CR31","doi-asserted-by":"publisher","first-page":"9941","DOI":"10.3390\/app12199941","volume":"12","author":"M. Micheletto","year":"2022","unstructured":"Micheletto, M., Orr\u00f9, G., Casula, R., and Marcialis, G.L., Mitigating sensor and acquisition method-dependence of fingerprint presentation attack detection systems by exploiting data from multiple devices, Appl. Sci., 2022, vol. 12, no. 19, p. 9941. https:\/\/doi.org\/10.3390\/app12199941","journal-title":"Appl. Sci."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411625700658.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411625700658","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411625700658.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:01:25Z","timestamp":1773612085000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411625700658"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8]]},"references-count":31,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,8]]}},"alternative-id":["7854"],"URL":"https:\/\/doi.org\/10.3103\/s0146411625700658","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,8]]},"assertion":[{"value":"16 May 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 October 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 October 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 November 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors of this work declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}