{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T12:41:32Z","timestamp":1776084092221,"version":"3.50.1"},"reference-count":84,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2019,1,28]],"date-time":"2019-01-28T00:00:00Z","timestamp":1548633600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>Biometric systems are increasingly replacing traditional password- and token-based authentication systems. Security and recognition accuracy are the two most important aspects to consider in designing a biometric system. In this paper, a comprehensive review is presented to shed light on the latest developments in the study of fingerprint-based biometrics covering these two aspects with a view to improving system security and recognition accuracy. Based on a thorough analysis and discussion, limitations of existing research work are outlined and suggestions for future work are provided. It is shown in the paper that researchers continue to face challenges in tackling the two most critical attacks to biometric systems, namely, attacks to the user interface and template databases. How to design proper countermeasures to thwart these attacks, thereby providing strong security and yet at the same time maintaining high recognition accuracy, is a hot research topic currently, as well as in the foreseeable future. Moreover, recognition accuracy under non-ideal conditions is more likely to be unsatisfactory and thus needs particular attention in biometric system design. Related challenges and current research trends are also outlined in this paper.<\/jats:p>","DOI":"10.3390\/sym11020141","type":"journal-article","created":{"date-parts":[[2019,1,29]],"date-time":"2019-01-29T03:40:55Z","timestamp":1548733255000},"page":"141","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":188,"title":["Security and Accuracy of Fingerprint-Based Biometrics: A Review"],"prefix":"10.3390","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7800-2215","authenticated-orcid":false,"given":"Wencheng","family":"Yang","sequence":"first","affiliation":[{"name":"Security Research Institute, Edith Cowan University, Joondalup, WA 6207, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0239-7991","authenticated-orcid":false,"given":"Song","family":"Wang","sequence":"additional","affiliation":[{"name":"Department of Engineering, La Trobe University, Victoria 3083, Australia"}]},{"given":"Jiankun","family":"Hu","sequence":"additional","affiliation":[{"name":"School of Engineering and Information Technology, University of New South Wales, Canberra, ACT 2600, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2307-9562","authenticated-orcid":false,"given":"Guanglou","family":"Zheng","sequence":"additional","affiliation":[{"name":"Security Research Institute, Edith Cowan University, Joondalup, WA 6207, Australia"}]},{"given":"Craig","family":"Valli","sequence":"additional","affiliation":[{"name":"Security Research Institute, Edith Cowan University, Joondalup, WA 6207, Australia"}]}],"member":"1968","published-online":{"date-parts":[[2019,1,28]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Jain, A.K., Flynn, P., and Ross, A.A. (2007). Handbook of Biometrics, Springer.","DOI":"10.1007\/978-0-387-71041-9"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1108\/SR-07-2017-0131","article-title":"Biometric template security: An overview","volume":"38","author":"Riaz","year":"2017","journal-title":"Sensor Rev."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1109\/MSECP.2003.1193209","article-title":"Biometric recognition: Security and privacy concerns","volume":"1","author":"Prabhakar","year":"2003","journal-title":"IEEE Secur. Priv."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Awad, A.I., and Hassanien, A.E. (2014). Impact of Some Biometric Modalities on Forensic Science. Computational Intelligence in Digital Forensics: Forensic Investigation and Applications, Springer.","DOI":"10.1007\/978-3-319-05885-6_3"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"562","DOI":"10.1109\/JSEN.2016.2633973","article-title":"Ideas and challenges for securing wireless implantable medical devices: A review","volume":"17","author":"Zheng","year":"2016","journal-title":"IEEE Sens. J."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"655","DOI":"10.1109\/JBHI.2016.2546300","article-title":"Multiple ECG fiducial points-based random binary sequence generation for securing wireless body area networks","volume":"21","author":"Zheng","year":"2017","journal-title":"IEEE J. Biomed. Health Inf."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"825","DOI":"10.1109\/ACCESS.2015.2445336","article-title":"Encryption for implantable medical devices using modified one-time pads","volume":"3","author":"Zheng","year":"2015","journal-title":"IEEE Access"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Awad, A.I., Hassanien, A.E., and Zawbaa, H.M. (2013). A Cattle Identification Approach Using Live Captured Muzzle Print Images. Advances in Security of Information and Communication Networks, Springer.","DOI":"10.1007\/978-3-642-40597-6_12"},{"key":"ref_9","unstructured":"(2018, November 27). The FBI Now Has the Largest Biometric Database in the World. Will It Lead to More Surveillance?. Available online: http:\/\/www.ibtimes.com\/fbi-now-has-largest-biometric-database-world-will-it-lead-more-surveillance-2345062."},{"key":"ref_10","unstructured":"(2018, November 27). U.S. Security Officials Will Begin Scanning All 10 Fingerprints of Most Non-Americans Traveling to the United States, Available online: https:\/\/travel.state.gov\/content\/visas\/en\/news\/u-s--security-officials-will-begin-scanning-all-10-fingerprints-.html."},{"key":"ref_11","unstructured":"(2018, November 27). Australia Wants to Streamline Its Border Control Using Biometrics. Available online: http:\/\/www.smithsonianmag.com\/innovation\/australia-wants-to-streamline-its-border-control-using-biometrics-180962052\/."},{"key":"ref_12","unstructured":"(2018, November 27). How Biometrics on Smartphones is Changing our Lives. Available online: http:\/\/www.m2sys.com\/blog\/biometric-resources\/biometrics-on-smartphones\/."},{"key":"ref_13","unstructured":"(2018, November 27). Biometrics for Finance Applications. Available online: https:\/\/www.tractica.com\/research\/biometrics-for-finance-applications\/."},{"key":"ref_14","unstructured":"(2018, November 27). MasterCard Trials Biometric Bankcard with Embedded Fingerprint Reader. Available online: https:\/\/techcrunch.com\/2017\/04\/20\/mastercard-trials-biometric-bankcard-with-embedded-fingerprint-reader\/."},{"key":"ref_15","unstructured":"Maio, D., Maltoni, D., Capelli, R., Franco, A., Ferrara, M., and Turroni, F. (2019, January 25). FVC-onGoing: On-Line Evaluation of Fingerprint Recognition Algorithms. Available online: https:\/\/biolab.csr.unibo.it\/fvcongoing\/UI\/Form\/Home.aspx."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1109\/TCSVT.2003.818349","article-title":"An introduction to biometric recognition","volume":"14","author":"Jain","year":"2004","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_17","first-page":"482","article-title":"iOS security and privacy: Authentication methods, permissions, and potential pitfalls with touch id","volume":"3","author":"Tipton","year":"2014","journal-title":"Int. J. Comput. Inf. Technol."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Ratha, N.K., Connell, J.H., and Bolle, R.M. (2001, January 6\u20138). An analysis of minutiae matching strength. Proceedings of the 3rd International Conference on Audio-and Video-Based Biometric Person Authentication, Halmstad, Sweden.","DOI":"10.1007\/3-540-45344-X_32"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2008\/579416","article-title":"Biometric template security","volume":"2008","author":"Jain","year":"2008","journal-title":"EURASIP J. Adv. Signal Process."},{"key":"ref_20","unstructured":"El-Abed, M., Lacharme, P., and Rosenberger, C. (2015). Privacy and Security Assessment of Biometric Systems, Cambridge Scholar Publishing."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Kang, H., Lee, B., Kim, H., Shin, D., and Kim, J. (2003, January 3\u20135). A study on performance evaluation of the liveness detection for various fingerprint sensor modules. Proceedings of the International Conference on Knowledge-Based and Intelligent Information and Engineering Systems, Oxford, UK.","DOI":"10.1007\/978-3-540-45226-3_169"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1016\/S1363-4127(02)00407-7","article-title":"Spoofing and anti-spoofing measures","volume":"7","author":"Schuckers","year":"2002","journal-title":"Inf. Secur. Tech. Rep."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Yang, W., Hu, J., Fernandes, C., Sivaraman, V., and Wu, Q. (2016, January 12\u201314). Vulnerability analysis of iPhone 6. Proceedings of the 14th Annual Conference on Privacy, Security and Trust (PST), Auckland, New Zealand.","DOI":"10.1109\/PST.2016.7907000"},{"key":"ref_24","unstructured":"Tan, B., and Schuckers, S. (2006, January 17\u201322). Liveness detection for fingerprint scanners based on the statistics of wavelet signal processing. Proceedings of the Conference on Computer Vision and Pattern Recognition Workshop (CVPRW\u201906), New York, NY, USA."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"495","DOI":"10.1142\/S0219467808003209","article-title":"Fingerprint silicon replicas: Static and dynamic features for vitality detection using an optical capture device","volume":"8","author":"Coli","year":"2008","journal-title":"Int. J. Image Graphics"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1016\/j.future.2010.11.024","article-title":"A high performance fingerprint liveness detection method based on quality related features","volume":"28","author":"Galbally","year":"2012","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1109\/LSP.2016.2636158","article-title":"Fingerprint liveness detection using local coherence patterns","volume":"24","author":"Kim","year":"2017","journal-title":"IEEE Signal Process. Lett."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"564","DOI":"10.1049\/el.2018.0621","article-title":"Fingerprint liveness map construction using convolutional neural network","volume":"54","author":"Jung","year":"2018","journal-title":"Electron. Lett."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Kundargi, J., and Karandikar, R. (2017, January 9\u201312). Fingerprint liveness detection using wavelet-based completed LBP descriptor. Proceedings of the 2nd International Conference on Computer Vision and Image Processing, Roorkee, India.","DOI":"10.1007\/978-981-10-7895-8_15"},{"key":"ref_30","unstructured":"Xia, Z., Yuan, C., Lv, R., Sun, X., Xiong, N.N., and Shi, Y.-Q. (2018). A novel weber local binary descriptor for fingerprint liveness detection. IEEE Trans. Syst. Man Cybern. Syst."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Yuan, C., Sun, X., and Wu, Q.J. (2018). Difference co-occurrence matrix using BP neural network for fingerprint liveness detection. Soft Comput., 1\u201313.","DOI":"10.1007\/s00500-018-3182-1"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"614","DOI":"10.1147\/sj.403.0614","article-title":"Enhancing security and privacy in biometrics-based authentication systems","volume":"40","author":"Ratha","year":"2001","journal-title":"IBM Syst. J."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"561","DOI":"10.1109\/TPAMI.2007.1004","article-title":"Generating cancelable fingerprint templates","volume":"29","author":"Ratha","year":"2007","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"2245","DOI":"10.1016\/j.patcog.2004.04.011","article-title":"Biohashing: Two factor authentication featuring fingerprint data and tokenised random number","volume":"37","author":"Jin","year":"2004","journal-title":"Pattern Recogn."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"980","DOI":"10.1109\/TSMCB.2007.896999","article-title":"Alignment-free cancelable fingerprint templates based on local minutiae information","volume":"37","author":"Lee","year":"2007","journal-title":"IEEE Trans. Syst. Man Cybern. Part B Cybern."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Ahn, D., Kong, S.G., Chung, Y.-S., and Moon, K.Y. (2008, January 27\u201330). Matching with secure fingerprint templates using non-invertible transform. Proceedings of the Congress on Image and Signal Processing (CISP\u201908), Sanya, China.","DOI":"10.1109\/CISP.2008.742"},{"key":"ref_37","unstructured":"Yang, H., Jiang, X., and Kot, A.C. (2009, January 8\u201311). Generating secure cancelable fingerprint templates using local and global features. Proceedings of the 2nd IEEE International Conference on Computer Science and Information Technology (ICCSIT 2009), Beijing, China."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Ahmad, T., and Hu, J. (2010, January 7\u201310). Generating cancelable biometrie templates using a projection line. Proceedings of the 11th International Conference on Control Automation Robotics and Vision (ICARCV), Singapore.","DOI":"10.1109\/ICARCV.2010.5707945"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"447","DOI":"10.1016\/j.patcog.2016.08.017","article-title":"A partial Hadamard transform approach to the design of cancelable fingerprint templates containing binary biometric representations","volume":"61","author":"Wang","year":"2017","journal-title":"Pattern Recogn."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"4129","DOI":"10.1016\/j.patcog.2012.05.004","article-title":"Alignment-free cancellable fingerprint template design: A densely infinite-to-one mapping (DITOM) approach","volume":"45","author":"Wang","year":"2012","journal-title":"Pattern Recogn."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"1321","DOI":"10.1016\/j.patcog.2013.10.003","article-title":"Design of alignment-free cancelable fingerprint templates via curtailed circular convolution","volume":"47","author":"Wang","year":"2014","journal-title":"Pattern Recogn."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1016\/j.patcog.2016.01.001","article-title":"A blind system identification approach to cancelable fingerprint templates","volume":"54","author":"Wang","year":"2016","journal-title":"Pattern Recogn."},{"key":"ref_43","unstructured":"Zhang, N., Yang, X., Zang, Y., Jia, X., and Tian, J. (October, January 29). Generating registration-free cancelable fingerprint templates based on Minutia Cylinder-Code representation. Proceedings of the IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS), Arlington, VA, USA."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"2128","DOI":"10.1109\/TPAMI.2010.52","article-title":"Minutia cylinder-code: A new representation and matching technique for fingerprint recognition","volume":"32","author":"Cappelli","year":"2010","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"1727","DOI":"10.1109\/TIFS.2012.2215326","article-title":"Non-invertible minutia cylinder-code representation","volume":"7","author":"Ferrara","year":"2012","journal-title":"IEEE Trans. Inf. Foren. Sec."},{"key":"ref_46","unstructured":"Ferrara, M., Maltoni, D., and Cappelli, R. (2014, January 10\u201312). A two-factor protection scheme for MCC fingerprint templates. Proceedings of the 2014 International Conference of the Biometrics Special Interest Group (BIOSIG), Darmstadt, Germany."},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Arjona, R., Prada-Delgado, M.A., Baturone, I., and Ross, A. (2018, January 20\u201323). Securing minutia cylinder codes for fingerprints through physically unclonable functions: An exploratory study. Proceedings of the 2018 International Conference on Biometrics (ICB), Gold Coast, Australia.","DOI":"10.1109\/ICB2018.2018.00019"},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1155\/2018\/7107295","article-title":"Biometrics based Privacy-Preserving Authentication and Mobile Template Protection","volume":"2018","author":"Yang","year":"2018","journal-title":"Wirel. Commun. Mobile Comput."},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1049\/iet-bmt.2016.0008","article-title":"Securing fingerprint templates using fused structures","volume":"6","author":"Sandhya","year":"2017","journal-title":"IET Biom."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"242","DOI":"10.1016\/j.patcog.2018.01.026","article-title":"A fingerprint and finger-vein based cancelable multi-biometric system","volume":"78","author":"Yang","year":"2018","journal-title":"Pattern Recogn."},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Dwivedi, R., and Dey, S. (arXiv, 2018). A novel hybrid score level and decision level fusion scheme for cancelable multi-biometric verification, arXiv.","DOI":"10.1007\/s10489-018-1311-2"},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Juels, A., and Wattenberg, M. (1999, January 1\u20134). A fuzzy commitment scheme. Proceedings of the 6th ACM Conference on Computer and Communications Security, Singapore.","DOI":"10.1145\/319709.319714"},{"key":"ref_53","unstructured":"Uludag, U., and Jain, A.K. (2004, January 22\u201327). Fuzzy fingerprint vault. Proceedings of the Workshop Proceedings\u2014Biometrics: Challenges Arising from Theory to Practice, Cambridge, UK."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1007\/s10623-005-6343-z","article-title":"A fuzzy vault scheme","volume":"38","author":"Juels","year":"2006","journal-title":"Des. Codes Cryptogr."},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Dodis, Y., Reyzin, L., and Smith, A. (2004, January 2\u20136). Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. Proceedings of the Advances in Cryptology-Eurocrypt 2004, Interlaken, Switzerland.","DOI":"10.1007\/978-3-540-24676-3_31"},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"724","DOI":"10.1587\/elex.4.724","article-title":"Secure biometric template protection in fuzzy commitment scheme","volume":"4","author":"Teoh","year":"2007","journal-title":"IEICE Electron. Exp."},{"key":"ref_57","doi-asserted-by":"crossref","unstructured":"Uludag, U., Pankanti, S., and Jain, A.K. (2005, January 20\u201322). Fuzzy vault for fingerprints. Proceedings of the 5th International Conference on Audio-and Video-Based Biometric Person Authentication, Hilton Rye Town, NY, USA.","DOI":"10.1007\/11527923_32"},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"744","DOI":"10.1109\/TIFS.2007.908165","article-title":"Fingerprint-based fuzzy vault: Implementation and performance","volume":"2","author":"Nandakumar","year":"2007","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1016\/j.cose.2011.02.003","article-title":"A pitfall in fingerprint bio-cryptographic key generation","volume":"30","author":"Zhang","year":"2011","journal-title":"Comput. Secur."},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1016\/j.jnca.2009.12.003","article-title":"An alignment-free fingerprint cryptosystem based on fuzzy vault scheme","volume":"33","author":"Li","year":"2010","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_61","unstructured":"Arakala, A., Jeffers, J., and Horadam, K. (2007, January 27\u201329). Fuzzy extractors for minutiae-based fingerprint authentication. Proceedings of the 2007 International Conference on Advances in Biometrics, Seoul, Korea."},{"key":"ref_62","doi-asserted-by":"crossref","unstructured":"Xi, K., Hu, J., and Han, F. (2011, January 21\u201323). An alignment free fingerprint fuzzy extractor using near-equivalent Dual Layer Structure Check (NeDLSC) algorithm. Proceedings of the 6th IEEE Conference on Industrial Electronics and Applications (ICIEA), Beijing, China.","DOI":"10.1109\/ICIEA.2011.5975740"},{"key":"ref_63","first-page":"381","article-title":"Hybrid multimodal template protection technique using fuzzy extractor and random projection","volume":"2","author":"Karthi","year":"2013","journal-title":"IJRCCT"},{"key":"ref_64","doi-asserted-by":"crossref","unstructured":"Yang, W., Hu, J., and Wang, S. (2012, January 25\u201327). A Delaunay Triangle-Based Fuzzy Extractor for Fingerprint Authentication. Proceedings of the 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Liverpool, UK.","DOI":"10.1109\/TrustCom.2012.23"},{"key":"ref_65","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/j.neucom.2016.06.083","article-title":"Encrypted domain matching of fingerprint minutia cylinder-code (MCC) with I1 minimization","volume":"259","author":"Liu","year":"2017","journal-title":"Neurocomputing"},{"key":"ref_66","doi-asserted-by":"crossref","unstructured":"Yang, W., Hu, J., and Wang, S. (2013, January 16\u201318). A Delaunay triangle group based fuzzy vault with cancellability. Proceedings of the 2013 6th International Congress on Image and Signal Processing (CISP), Hangzhou, China.","DOI":"10.1109\/CISP.2013.6743946"},{"key":"ref_67","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1016\/j.jnca.2018.04.013","article-title":"An alignment-free cancelable fingerprint template for bio-cryptosystems","volume":"115","author":"Alam","year":"2018","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_68","doi-asserted-by":"crossref","unstructured":"Sarkar, A., and Singh, B.K. (2018, January 15\u201317). Cryptographic key generation from cancelable fingerprint templates. Proceedings of the 2018 4th International Conference on Recent Advances in Information Technology (RAIT), Dhanbad, India.","DOI":"10.1109\/RAIT.2018.8389007"},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1038\/nature14539","article-title":"Deep learning","volume":"521","author":"LeCun","year":"2015","journal-title":"Nature"},{"key":"ref_70","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1109\/TPAMI.2006.20","article-title":"Performance evaluation of fingerprint verification systems","volume":"28","author":"Cappelli","year":"2006","journal-title":"IEEE Trans. Pattern Anal. Mach. Intel."},{"key":"ref_71","doi-asserted-by":"crossref","unstructured":"Yoon, S., Cao, K., Liu, E., and Jain, A.K. (October, January 29). LFIQ: Latent fingerprint image quality. Proceedings of the 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS), Arlington, VA, USA.","DOI":"10.1109\/BTAS.2013.6712750"},{"key":"ref_72","doi-asserted-by":"crossref","first-page":"1847","DOI":"10.1109\/TPAMI.2014.2302450","article-title":"Segmentation and enhancement of latent fingerprints: A coarse to fine ridgestructure dictionary","volume":"36","author":"Cao","year":"2014","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"ref_73","doi-asserted-by":"crossref","first-page":"2452","DOI":"10.1109\/TPAMI.2014.2330609","article-title":"Latent fingerprint matching: Performance gain via feedback from exemplar prints","volume":"36","author":"Arora","year":"2014","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"ref_74","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1109\/MSP.2015.2427849","article-title":"Biometric template protection: Bridging the performance gap between theory and practice","volume":"32","author":"Nandakumar","year":"2015","journal-title":"IEEE Signal Process. Mag."},{"key":"ref_75","doi-asserted-by":"crossref","first-page":"4893","DOI":"10.1007\/s11227-018-2266-0","article-title":"ECB4CI: An enhanced cancelable biometric system for securing critical infrastructures","volume":"74","author":"Yang","year":"2018","journal-title":"J. Supercomput."},{"key":"ref_76","doi-asserted-by":"crossref","first-page":"666","DOI":"10.1016\/j.patrec.2010.12.015","article-title":"A key binding system based on n-nearest minutiae structure of fingerprint","volume":"32","author":"Liu","year":"2011","journal-title":"Pattern Recogn. Lett."},{"key":"ref_77","doi-asserted-by":"crossref","first-page":"1309","DOI":"10.1016\/j.patcog.2013.10.001","article-title":"An Alignment-free fingerprint bio-cryptosystem based on modified voronoi neighbor structures","volume":"47","author":"Yang","year":"2014","journal-title":"Pattern Recogn."},{"key":"ref_78","doi-asserted-by":"crossref","first-page":"864","DOI":"10.1109\/TIFS.2015.2398817","article-title":"Deep representations for iris, face, and fingerprint spoofing detection","volume":"10","author":"Menotti","year":"2015","journal-title":"IEEE Trans. Inf. Foren. Sec."},{"key":"ref_79","unstructured":"Goodfellow, I., Bengio, Y., and Courville, A. (2016). Deep Learning, MIT press."},{"key":"ref_80","doi-asserted-by":"crossref","unstructured":"Pandya, B., Cosma, G., Alani, A.A., Taherkhani, A., Bharadi, V., and McGinnity, T.M. (2018, January 25\u201327). Fingerprint classification using a deep convolutional neural network. Proceedings of the 2018 4th International Conference on Information Management (ICIM), Oxford, UK.","DOI":"10.1109\/INFOMAN.2018.8392815"},{"key":"ref_81","doi-asserted-by":"crossref","unstructured":"Yang, W., Hu, J., Yang, J., Wang, S., and Lu, L. (2013, January 16\u201318). Biometrics for securing mobile payments: Benefits, challenges and solutions. Proceedings of the 2013 6th International Congress on Image and Signal Processing (CISP), Hangzhou, China.","DOI":"10.1109\/CISP.2013.6743950"},{"key":"ref_82","first-page":"87","article-title":"Biometric authentication methods on smartphones: A survey","volume":"14","author":"Spolaor","year":"2016","journal-title":"PsychNology J."},{"key":"ref_83","doi-asserted-by":"crossref","first-page":"173","DOI":"10.17512\/jamcm.2017.2.14","article-title":"The overview of trends and challenges in mobile biometrics","volume":"16","author":"Wojciechowska","year":"2017","journal-title":"J. Appl. Mathem. Comput. Mech."},{"key":"ref_84","doi-asserted-by":"crossref","first-page":"423","DOI":"10.1049\/iet-bmt.2017.0171","article-title":"Convolutional neural networks for gender prediction from smartphone-based ocular images","volume":"7","author":"Rattani","year":"2018","journal-title":"IET Biom."}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/11\/2\/141\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T12:29:03Z","timestamp":1760185743000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/11\/2\/141"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,28]]},"references-count":84,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2019,2]]}},"alternative-id":["sym11020141"],"URL":"https:\/\/doi.org\/10.3390\/sym11020141","relation":{},"ISSN":["2073-8994"],"issn-type":[{"value":"2073-8994","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,1,28]]}}}