Please wait a minute...
Frontiers of Computer Science

ISSN 2095-2228

ISSN 2095-2236(Online)

CN 10-1014/TP

Postal Subscription Code 80-970

2018 Impact Factor: 1.129

Front. Comput. Sci.    2021, Vol. 15 Issue (1) : 151310    https://doi.org/10.1007/s11704-020-9236-4
REVIEW ARTICLE
Fingerprint matching, spoof and liveness detection: classification and literature review
Syed Farooq ALI1(), Muhammad Aamir KHAN2, Ahmed Sohail ASLAM3
1. Department of Software Engineering, University of Management and Technology, Lahore 54770, Pakistan
2. Department of Informatics and Systems, University of Management and Technology, Lahore 54770, Pakistan
3. Department of Computer Science, University of Management and Technology, Lahore 54770, Pakistan
 Download: PDF(1146 KB)  
 Export: BibTeX | EndNote | Reference Manager | ProCite | RefWorks
Abstract

Fingerprint matching, spoof mitigation and liveness detection are the trendiest biometric techniques, mostly because of their stability through life, uniqueness and their least risk of invasion. In recent decade, several techniques are presented to address these challenges over well-known data-sets. This study provides a comprehensive review on the fingerprint algorithms and techniques which have been published in the last few decades. It divides the research on fingerprint into nine different approaches including feature based, fuzzy logic, holistic, image enhancement, latent, conventional machine learning, deep learning, template matching and miscellaneous techniques. Among these, deep learning approach has outperformed other approaches and gained significant attention for future research. By reviewing fingerprint literature, it is historically divided into four eras based on 106 referred papers and their cumulative citations.

Keywords computer society      template matching      fingerprint recognition      survey      deep learning      machine learning     
Corresponding Author(s): Syed Farooq ALI   
Just Accepted Date: 09 March 2020   Issue Date: 10 October 2020
 Cite this article:   
Syed Farooq ALI,Muhammad Aamir KHAN,Ahmed Sohail ASLAM. Fingerprint matching, spoof and liveness detection: classification and literature review[J]. Front. Comput. Sci., 2021, 15(1): 151310.
 URL:  
https://academic.hep.com.cn/fcs/EN/10.1007/s11704-020-9236-4
https://academic.hep.com.cn/fcs/EN/Y2021/V15/I1/151310
1 M Kucken, A C Newell. Fingerprint formation. Journal of Theoretical Biology, 2005, 235(1): 71–83
https://doi.org/10.1016/j.jtbi.2004.12.020
2 S Sengupta, T Sengupta. Iris texture analysis, finger printing and signature verification for automatic data retrieval system using biometric pattern recognition system. International Journal of Advances in Computing and Management, 2013, 2(1): 6–10
3 D H McMahon, G L Johnson, S L Teeter, C G Whitney. A hybrid optical computer processing technique for fingerprint identification. IEEE Transactions on Computers, 1975, 100(4): 358–369
https://doi.org/10.1109/T-C.1975.224229
4 A K Jain, S Prabhakar, S Pankanti. On the similarity of identical twin fingerprints. Pattern Recognition, 2002, 35(11): 2653–2663
https://doi.org/10.1016/S0031-3203(01)00218-7
5 D Maltoni, D Maio, A K Jain, S Prabhakar. Handbook of Fingerprint Recognition. Springer Science & Business Media, 2009
https://doi.org/10.1007/978-1-84882-254-2
6 S A Cole. Is fingerprint identification valid? rhetorics of reliability in fingerprint proponents discourse. Law & Policy, 2006, 28(1): 109–135
https://doi.org/10.1111/j.1467-9930.2005.00219.x
7 S A Cole. Suspect Identities: A History of Fingerprinting and Criminal Identification. Harvard University Press, 2009
8 C N Wang, JW Wang, M H Lin, Y L Chang, C M Kuo. Optical methods in fingerprint imaging for medical and personality applications. Journal of Sensors, 2017, 17(10): 2418
https://doi.org/10.3390/s17102418
9 A K Jain, A A Ross, K Nandakumar. Introduction to Biometrics. Springer Science & Business Media, 2011
https://doi.org/10.1007/978-0-387-77326-1
10 J Wayman, A Jain, D Maltoni, D Maio. An Introduction to Biometric Authentication Systems. Springer Biometric Systems, 2005
https://doi.org/10.1007/b138151
11 M A Medina-Pérez, M García-Borroto, A E Gutierrez-Rodrguez, L Altamirano-Robles. Improving fingerprint verification using minutiae triplets. Journal of Sensors, 2012, 12(3): 3418–3437
https://doi.org/10.3390/s120303418
12 M Sahasrabudhe, A M Namboodiri. Fingerprint enhancement using unsupervised hierarchical feature learning. In: Proceedings of the ACM Indian Conference on Computer Vision Graphics and Image Processing. 2014, 14–17
https://doi.org/10.1145/2683483.2683485
13 T Y Jea, V Govindaraju. A minutia-based partial fingerprint recognition system. Pattern Recognition, 2005, 38(10): 1672–1684
https://doi.org/10.1016/j.patcog.2005.03.016
14 I S Msiza, B Leke-Betechuoh, F V Nelwamondo, N Msimang. A fingerprint pattern classification approach based on the coordinate geometry of singularities. In: Proceedings of IEEE International Conference on Systems, Man and Cybernetics. 2009, 510–517
https://doi.org/10.1109/ICSMC.2009.5346860
15 X Jiang, W Ser. Online fingerprint template improvement. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2002, 24(8): 1121–1126
https://doi.org/10.1109/TPAMI.2002.1023807
16 M Selvi, A George. Fbfet: fuzzy based fingerprint enhancement technique based on adaptive thresholding. In: Proceedings of the 4th International Conference on Computing, Communications and Networking Technologies. 2013, 1–5
https://doi.org/10.1109/ICCCNT.2013.6726776
17 J Kim, A B J Teoh. One-factor cancellable biometrics based on indexingfirst- order hashing for fingerprint authentication. In: Proceedings of the 24th International Conference on Pattern Recognition. 2018, 3108–3113
https://doi.org/10.1109/ICPR.2018.8545565
18 P Li, X Yang, K Cao, X Tao, R Wang, J Tian. An alignment free fingerprint cryptosystem based on fuzzy vault scheme. Journal of Network and Computer Applications, 2010, 33(3): 207–220
https://doi.org/10.1016/j.jnca.2009.12.003
19 E Liu, H Zhao, J Liang, L Pang, M Xie, H Chen, Y Li, P Li, J Tian. A key binding system based on n-nearest minutiae structure of fingerprint. Pattern Recognition Letters, 2011, 32(5): 666–675
https://doi.org/10.1016/j.patrec.2010.12.015
20 M Ferrara, D Maltoni, R Cappelli. Noninvertible minutia cylinder-code representation. IEEE Transactions on Information Forensics and Security, 2012, 7(6): 1727–1737
https://doi.org/10.1109/TIFS.2012.2215326
21 Z Chen, C Kuo. A topology-based matching algorithm for fingerprint authentication. In: Proceedings of IEEE International Carnahan Conference on Security Technology. 1991, 84–87
22 B Bhanu, X Tan. Fingerprint indexing based on novel features of minutiae triplets. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2003, 25(5): 616–622
https://doi.org/10.1109/TPAMI.2003.1195995
23 R Singh, M Vatsa, A Noore. Fingerprint indexing using minutiae and pore features. In: Proceedings of International Conference on Image Processing. 2009, 870–875
24 F Afsar, M Arif, M Hussain. Fingerprint identification and verification system using minutiae matching. In: Proceedings of National Conference on Emerging Technologies. 2004, 141–146
25 J M Jaam, M L Rebaiaia, A Hasnah. A fingerprint minutiae recognition system based on genetic algorithms. International Arab Journal of Information Technology, 2006, 3(3): 242–248
26 Q Zhao, L Zhang, D Zhang, N Luo. Direct pore matching for fingerprint recognition. In: Proceedings of International Conference on Biometrics. 2009, 597–606
https://doi.org/10.1007/978-3-642-01793-3_61
27 Q Zhao, D Zhang, L Zhang, N Luo. High resolution partial fingerprint alignment using pore-valley descriptors. Pattern Recognition, 2010, 43(3): 1050–1061
https://doi.org/10.1016/j.patcog.2009.08.004
28 S A Sudiro, R T Yuwono. Adaptable fingerprint minutiae extraction algorithm based on crossing number method for hardware implementation using fpga device. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), 2012, 2(3): 1–30
https://doi.org/10.5121/ijcseit.2012.2301
29 M S Sadi, M N Uddin, A Ahad, A Haque. An efficient approach to recognize fingerprints. Journal of Multimedia, 2012, 7(5): 327–331
https://doi.org/10.4304/jmm.7.5.327-331
30 R M Madhuri, R Mishra, Fingerprint recognition using robust local features. International Journal of Advanced Research in Computer Science and Software Engineering, 2012, 2(6): 1–5
31 A Ackerman, R Ostrovsky. Fingerprint recognition. Technical Report, UCLA Computer Science Department, 2012
32 A Nagar, K Nandakumar, A K Jain. A hybrid biometric cryptosystem for securing fingerprint minutiae templates. Pattern Recognition Letters, 2010, 31(8): 733–741
https://doi.org/10.1016/j.patrec.2009.07.003
33 J Feng, A K Jain, Fingerprint reconstruction: from minutiae to phase. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2011, 33(2): 209–223
https://doi.org/10.1109/TPAMI.2010.77
34 S Yoon, J Feng, A J Jain. Altered fingerprints: analysis and detection. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2012, 34(3): 451–464
https://doi.org/10.1109/TPAMI.2011.161
35 T Chugh, K Cao, A K Jain. Fingerprint spoof buster: use of minutiaecentered patches. IEEE Transactions on Information Forensics and Security, 2018, 13(9): 2190–2202
https://doi.org/10.1109/TIFS.2018.2812193
36 J J Engelsma, K Cao, A K Jain, Raspireader: open source fingerprint reader. IEEE Transactions on Pattern Analysis andMachine Intelligence, 2018, 41(10): 2511–2524
https://doi.org/10.1109/TPAMI.2018.2858764
37 C Gottschlich, E Marasco, A Y Yang, B Cukic. Fingerprint liveness detection based on histograms of invariant gradients. In: Proceedings of IEEE International Joint Conference on Biometrics. 2014, 1–7
https://doi.org/10.1109/BTAS.2014.6996224
38 A Rattani, Z Akhtar, G Foresti. A preliminary study on identifying fabrication material from fake fingerprint images. In: Proceedings of IEEE Symposium Series on Computational Intelligence. 2015, 362–366
https://doi.org/10.1109/SSCI.2015.61
39 R Raghavendra, M Avinash, S Marcel, C Busch. Finger vein liveness detection using motion magnification. In: Proceedings of the 7th IEEE International Conference on Biometrics Theory, Applications and Systems. 2015, 1–7
https://doi.org/10.1109/BTAS.2015.7358762
40 H Ding. Anti-spoofing a finger vascular recognition device with pulse detection. In: Proceedings of the 24th Twente Student Conference on IT. 2016
41 S C Newton, S Pemmaraju, S Mitra. Adaptive fuzzy leader clustering of complex data sets in pattern recognition. IEEE Transactions on Neural Networks, 1992, 3(5): 794–800
https://doi.org/10.1109/72.159068
42 R Velamuri. Fingerprint recognition using fuzzy inferencing techniques. Technical Report, Fuzzy Logic and Engineering, University of Texas El Paso, 2006
43 M T Yildirim, A Basturk, M E Yuksel. A detail preserving type-2 fuzzy logic filter for impulse noise removal from digital images. In: Proceedings of IEEE International Conference on Fuzzy Systems. 2007, 1–6
https://doi.org/10.1109/FUZZY.2007.4295460
44 A Majumdar, R Ward. Fingerprint recognition with curvelet features and fuzzy KNN classifier. In: Proceedings of the 10th IASTED International Conference. 2008, 31–36
45 A K Jain, S Prabhakar, L Hong, S Pankanti. Filterbank-based fingerprint matching. IEEE Transactions on Image Processing, 2000, 9(5): 846–859
https://doi.org/10.1109/83.841531
46 C I Watson, P J Grother, D P Casasent. Distortion-tolerant filter for elastic-distorted fingerprint matching. In: Proceedings of SPIE, Optical Pattern Recognition XI. 2000, 166–174
https://doi.org/10.1117/12.381591
47 W H Jung. Fast fingerprint recognition using spiral. Technical Report, Department of Electrical and Computer Engineering, Carnegie Mellon University, 2005
48 H Xu, R N Veldhuis, A M Bazen, T A Kevenaar, T A Akkermans, B Gokberk. Fingerprint verification using spectral minutiae representations. IEEE Transactions on Information Forensics and Security, 2009, 4(3): 397–409
https://doi.org/10.1109/TIFS.2009.2021692
49 A A Aburas, S A Rehiel. Fingerprint patterns recognition system using huffman coding. In: Proceedings of theWorld Congress on Engineering. 2008, 1794–1796
50 F Chen, J Feng, A K Jain, J Zhou, J Zhang. Separating overlapped fingerprints. IEEE Transactions on Information Forensics and Security, 2011, 6(2): 346–359
https://doi.org/10.1109/TIFS.2011.2114345
51 B G Sherlock, D Monro, K Millard. Fingerprint enhancement by directional fourier filtering. IEE Proceedings Vision, Image and Signal Processing, 1994, 147(2): 87–94
https://doi.org/10.1049/ip-vis:19949924
52 L Hong, Y Wan, A K Jain. Fingerprint image enhancement: algorithm and performance evaluation. IEEE Transactions on Pattern Analysis and Machine Intelligence, 1998, 20(8): 777–789
https://doi.org/10.1109/34.709565
53 R Bansal, P Arora, M Gaur, P Sehgal, P Bedi. Fingerprint image enhancement using type-2 fuzzy sets. In: Proceedings of the 6th IEEE International Conference on Fuzzy Systems and Knowledge Discovery. 2009, 412–417
https://doi.org/10.1109/FSKD.2009.396
54 V Chawla, C Kant. Addressing sensor interoperability problem using fingerprint segmentation. International Journal of Advanced Research in Computer Science, 2016, 7(3): 125–131
55 J Feng, J Zhou, A K Jain. Orientation field estimation for latent fingerprint enhancement. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2013, 35(4): 925–940
https://doi.org/10.1109/TPAMI.2012.155
56 K Cao, E Liu, A K Jain. Segmentation and enhancement of latent fingerprints: a coarse to fine ridge structure dictionary. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2014, 36(9): 1847–1859
https://doi.org/10.1109/TPAMI.2014.2302450
57 K Ito, A Morita, T Aoki, T Higuchi, H Nakajima, K Kobayashi. A fingerprint recognition algorithm using phase-based image matching for low- quality fingerprints. In: Proceedings of IEEE International Conference on Image Processing. 2005, 33–36
https://doi.org/10.1109/ICIP.2005.1529984
58 S Mil’Shtein, S Pillai, A Shendye, C Liessner, M Baier. Fingerprint recognition algorithms for partial and full fingerprints. In: Proceedings of IEEE Conference on Technologies for Homeland Security. 2008, 449–452
https://doi.org/10.1109/THS.2008.4534494
59 A K Jain, J Feng. Latent fingerprint matching. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2011, 33(1): 88–100
https://doi.org/10.1109/TPAMI.2010.59
60 M Vatsa, R Singh, A Noore, K Morris. Simultaneous latent fingerprint recognition. Journal of Applied Soft Computing, 2011, 11(7): 4260–4266
https://doi.org/10.1016/j.asoc.2011.02.005
61 A Nagar, H Choi, A K Jain. Evidential value of automated latent fingerprint comparison: an empirical approach. IEEE Transactions on Information Forensics and Security, 2012, 7(6): 1752–1765
https://doi.org/10.1109/TIFS.2012.2210216
62 Q Zhao, A K Jain. Model based separation of overlapping latent fingerprints. IEEE Transactions on Information Forensics and Security, 2012, 7(3): 904–918
https://doi.org/10.1109/TIFS.2012.2187281
63 A A Paulino, J Feng, A K Jain. Latent fingerprint matching using descriptor-based hough transform. IEEE Transactions on Information Forensics and Security, 2012, 8(1): 31–45
https://doi.org/10.1109/TIFS.2012.2223678
64 S S Arora, E Liu, K Cao, A K Jain. Latent fingerprint matching: performance gain via feedback from exemplar prints. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2014, 36(12): 2452–2465
https://doi.org/10.1109/TPAMI.2014.2330609
65 T Chugh, K Cao, J Zhou, E Tabassi, A K Jain. Latent fingerprint value prediction: crowd-based learning. IEEE Transactions on Information Forensics and Security, 2018, 13(1): 20–34
https://doi.org/10.1109/TIFS.2017.2721099
66 M T Leung, W Engeler, P Frank. Fingerprint image processing using neural networks. In: Proceedings of IEEE Region 10 Conference on Computer and Communication Systems. 1990, 582–586
67 C L Wilson, G T Candela, C I Watson. Neural network fingerprint classification. Journal of Artificial Neural Networks, 1994, 1(2): 203–228
68 A K Jain, S Prabhakar, L Hong. A multichannel approach to fingerprint classification. IEEE Transactions on Pattern Analysis and Machine Intelligence, 1999, 21(4): 348–359
https://doi.org/10.1109/34.761265
69 B Tan, A Lewicke, D Yambay, S Schuckers. The effect of environmental conditions and novel spoofing methods on fingerprint anti-spoofing algorithms. In: Proceedings of IEEE International Workshop on Information Forensics and Security. 2010, 1–6
https://doi.org/10.1109/WIFS.2010.5711436
70 A Rattani, A Ross. Automatic adaptation of fingerprint liveness detector to new spoof materials. In: Proceedings of IEEE International Joint Conference on Biometrics. 2014, 1–8
https://doi.org/10.1109/BTAS.2014.6996254
71 Y Ding, A Rattani, A Ross. Bayesian belief models for integrating match scores with liveness and quality measures in a fingerprint verification system. In: Proceedings of IEEE International Conference on Biometrics. 2016, 1–8
https://doi.org/10.1109/ICB.2016.7550095
72 E Liu, H Zhao, F Guo, J Liang, J Tian. Fingerprint segmentation based on an adaboost classifier. Frontiers of Computer Science, 2011, 5(2): 148–157
https://doi.org/10.1007/s11704-011-9134-x
73 T Kristensen. Two different regimes of fingerprint identification-a comparison. American Journal of Computational and Applied Mathematics, 2012, 2(2): 1–9
https://doi.org/10.5923/j.ajcam.20120202.01
74 S Minaee, Y Wang. Fingerprint recognition using translation invariant scattering network. In: Proceedings of IEEE Symposium on Signal Processing in Medicine and Biology. 2015, 1–6
https://doi.org/10.1109/SPMB.2015.7405471
75 D Menotti, G Chiachia, A Pinto, W R Schwartz, H Pedrini, A X Falcao, A Rocha. Deep representations for iris, face, and fingerprint spoofing detection. IEEE Transactions on Information Forensics and Security, 2015, 10(4): 864–879
https://doi.org/10.1109/TIFS.2015.2398817
76 C Ryu, H Kim, A K Jain. Template adaptation based fingerprint verification. In: Proceedings of the 18th International Conference on Pattern Recognition. 2006, 582–585
77 R Cappelli, A Lumini, D Maio, D Maltoni. Evaluating minutiae template vulnerability to masquerade attack. In: Proceedings of IEEE Workshop on Automatic Identification Advanced Technologies. 2007, 174–179
https://doi.org/10.1109/AUTOID.2007.380615
78 R Cappelli, D Maio, A Lumini, D Maltoni. Fingerprint image reconstruction from standard templates. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2007, 29(9): 1489–1503
https://doi.org/10.1109/TPAMI.2007.1087
79 L H Thai, H N Tam. Fingerprint recognition using standardized fingerprint model. International Journal of Computer Science, 2010, 7(7): 1694–1700.
80 Q Gao. Fingerprint based authentication with randomly selected minutiae sub-templates. International Journal of Research and Reviews in Information Security and Privacy (IJRRISP), 2012, 2(1): 55–62
81 P Jiang, Q Wen, W Li, Z Jin, H Zhang. An anonymous and efficient remote biometrics user authentication scheme in a multi server environment. Frontiers of Computer Science, 2015, 9(1): 142–156
https://doi.org/10.1007/s11704-014-3125-7
82 N K Ratha, J H Connell, R M Bolle. An analysis of minutiae matching strength. In: Proceedings of International Conference on Audio and Video Based Biometric Person Authentication. 2001, 223–228
https://doi.org/10.1007/3-540-45344-X_32
83 M Vatsa, R Singh, A Noore, M M Houck, K Morris. Robust biometric image watermarking for fingerprint and face template protection. IEICE Electronics Express, 2006, 3(2): 23–28
https://doi.org/10.1587/elex.3.23
84 J Fierrez-Aguilar, Y Chen, J Ortega-Garcia, A K Jain. Incorporating image quality in multi-algorithm fingerprint verification. In: Proceedings of International Conference on Biometrics. 2006, 213–220
https://doi.org/10.1007/11608288_29
85 M He, H Zhao. A identity authentication based on fingerprint identification. In: Proceedings of the International Symposium on Web Information Systems and Applications. 2009, 261–263
86 P J Kellman, J L Mnookin, G Erlikhman, P Garrigan, T Ghose, E Mettler, D Charlton, I E Dror. Forensic comparison and matching of fingerprints using quantitative image measures for estimating error rates through understanding and predicting difficulty. PloS One, 2014, 9(5): e94617.
https://doi.org/10.1371/journal.pone.0094617
87 S Yoon, A K Jain. Longitudinal study of fingerprint recognition. Proceedings of the National Academy of Sciences, 2015, 112(28): 8555–8560
https://doi.org/10.1073/pnas.1410272112
88 A K Jain, S S Arora, K Cao, L Best-Rowden, A Bhatnagar. Fingerprint recognition of young children. IEEE Transactions on Information Forensics and Security, 2017, 12(7): 1501–1514
https://doi.org/10.1109/TIFS.2016.2639346
89 X Li, Y Yin, Y Ning, G Yang, L Pan. A hybrid biometric identification framework for high security applications. Frontiers of Computer Science, 2015, 9(3): 392–401
https://doi.org/10.1007/s11704-014-4070-1
90 W Engeler, P Frank, M Leung. Fingerprint image processing using neural network. In: Proceedings of IEEE Conference on Computer and Communication Systems. 1990, 582–586
91 A Jain, S Pankanti. Automated fingerprint identification and imaging systems. Advances in Fingerprint Technology, 2001, 275–340
https://doi.org/10.1201/9781420041347.ch8
92 J Gu, J Zhou, C Yang. Fingerprint recognition by combining global structure and local cues. IEEE Transactions on Image Processing, 2006, 15(7): 1952–1964
https://doi.org/10.1109/TIP.2006.873443
93 R Cappelli, D Maio, D Maltoni, J L Wayman, A K Jain. Performance evaluation of fingerprint verification systems. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2006, 28(1): 3–18
https://doi.org/10.1109/TPAMI.2006.20
94 H Kekre, V Bharadi. Fingerprint core point detection algorithm using orientation field based multiple features. International Journal of Computer Applications, 2010, 1(15): 106–112
https://doi.org/10.5120/314-482
95 A K Jain, J Feng, K Nandakumar. Fingerprint matching. Journal of Computer, 2010, 43(2): 36–44
https://doi.org/10.1109/MC.2010.38
96 S Bana, D D Kaur. Fingerprint recognition using image segmentation. International Journal of Advanced Engineering Sciences and Technologies, 2011, 5(1): 012–023
97 R Mishra, R Mishra. Fingerprint recognition using robust local features. International Journal of Advanced Research in Computer Science and Software Engineering, 2012, 2(6): 1–5
98 R Subban, D P Mankame. A study of biometric approach using finger print recognition. Lecture Notes on Software Engineering, 2013, 1(2): 209–213
https://doi.org/10.7763/LNSE.2013.V1.47
99 J Galbally, S Marcel, J Fierrez. Image quality assessment for fake biometric detection: application to iris, fingerprint, and face recognition. IEEE Transactions on Image Processing, 2014, 23(2): 710–724
https://doi.org/10.1109/TIP.2013.2292332
100 A Sankaran, M Vatsa, R Singh. Latent fingerprint matching: a survey. IEEE Access, 2014, 2(1): 982–1004
https://doi.org/10.1109/ACCESS.2014.2349879
101 K Tiwari, V D Kaushik, P Gupta. An efficient fingerprint matching using continuous minutiae template learning. In: Bhatia S, Tiwari S, Mishra K, Trivedi M, eds. Advances in Computer Communication and Computational Sciences. Springer, Singapore, 2019, 289–298
https://doi.org/10.1007/978-981-13-0344-9_25
102 A K Jain, K Nandakumar, A Ross. 50 years of biometric research: accomplishments, challenges, and opportunities. Pattern Recognition Letters, 2016, 79: 80–105
https://doi.org/10.1016/j.patrec.2015.12.013
103 L Ghiani, D A Yambay, V Mura, G L Marcialis, F Roli, S A Schuckers. Review of the fingerprint liveness detection (livdet) competition series: 2009 to 2015. Image and Vision Computing, 2017, 58: 110–128
https://doi.org/10.1016/j.imavis.2016.07.002
104 A Manickam, E Devarasan, G Manogaran, M K Priyan, R Varatharajan, C H Hsu, R Krishnamoorthi. Score level based latent fingerprint enhancement and matching using sift feature. Multimedia Tools and Applications, 2019, 78(3): 3065–3085
https://doi.org/10.1007/s11042-018-5633-1
105 K Khongkraphan. An efficient fingerprint matching by multiple reference points. Journal of Information Processing Systems, 2019, 15(1): 22–33
106 D Maio, D Maltoni, R Cappelli, J L Wayman, A K Jain. Fvc2000: fingerprint verification competition. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2002, 24(3): 402–412
https://doi.org/10.1109/34.990140
107 A J Mansfield, J L Wayman. Best practices in testing and reporting performance of biometric devices. National Physical Labrotary Report, 2002, 1–32
108 D Maio, D Maltoni, R Cappelli, J L Wayman, A K Jain. FVC2002: second fingerprint verification competition. In: Proceedings of IEEE Object Recognition Supported by User Interaction for Service Robots, 2002, 811–814
109 J Fierrez, J Ortega-Garcia, D T Toledano, J Gonzalez-Rodriguez. Biosec baseline corpus: a multimodal biometric database. Pattern Recognition, 2007, 40(4): 1389–1392
https://doi.org/10.1016/j.patcog.2006.10.014
[1] Article highlights Download
[1] Xia-an BI, Yiming XIE, Hao WU, Luyun XU. Identification of differential brain regions in MCI progression via clustering-evolutionary weighted SVM ensemble algorithm[J]. Front. Comput. Sci., 2021, 15(6): 156903-.
[2] Yan-Ping SUN, Min-Ling ZHANG. Compositional metric learning for multi-label classification[J]. Front. Comput. Sci., 2021, 15(5): 155320-.
[3] Huiyan XU, Zhongqing WANG, Yifei ZHANG, Xiaolan WENG, Zhijian WANG, Guodong ZHOU. Document structure model for survey generation using neural network[J]. Front. Comput. Sci., 2021, 15(4): 154325-.
[4] Miao CAI, Hao HUANG. A survey of operating system support for persistent memory[J]. Front. Comput. Sci., 2021, 15(4): 154207-.
[5] Dongjie CHEN, Yanyan JIANG, Chang XU, Xiaoxing MA. On interleaving space exploration of multi-threaded programs[J]. Front. Comput. Sci., 2021, 15(4): 154206-.
[6] Huiying ZHANG, Yu ZHANG, Xin GENG. Practical age estimation using deep label distribution learning[J]. Front. Comput. Sci., 2021, 15(3): 153318-.
[7] Jian SUN, Pu-Feng DU. Predicting protein subchloroplast locations: the 10th anniversary[J]. Front. Comput. Sci., 2021, 15(2): 152901-.
[8] Panthadeep BHATTACHARJEE, Pinaki MITRA. A survey of density based clustering algorithms[J]. Front. Comput. Sci., 2021, 15(1): 151308-.
[9] Chune LI, Yongyi MAO, Richong ZHANG, Jinpeng HUAI. A revisit to MacKay algorithm and its application to deep network compression[J]. Front. Comput. Sci., 2020, 14(4): 144304-.
[10] Guijuan ZHANG, Yang LIU, Xiaoning JIN. A survey of autoencoder-based recommender systems[J]. Front. Comput. Sci., 2020, 14(2): 430-450.
[11] Xu-Ying LIU, Sheng-Tao WANG, Min-Ling ZHANG. Transfer synthetic over-sampling for class-imbalance learning with limited minority class data[J]. Front. Comput. Sci., 2019, 13(5): 996-1009.
[12] Yu-Feng LI, De-Ming LIANG. Safe semi-supervised learning: a brief introduction[J]. Front. Comput. Sci., 2019, 13(4): 669-676.
[13] Wenhao ZHENG, Hongyu ZHOU, Ming LI, Jianxin WU. CodeAttention: translating source code to comments by exploiting the code constructs[J]. Front. Comput. Sci., 2019, 13(3): 565-578.
[14] Hao SHAO. Query by diverse committee in transfer active learning[J]. Front. Comput. Sci., 2019, 13(2): 280-291.
[15] Qingying SUN, Zhongqing WANG, Shoushan LI, Qiaoming ZHU, Guodong ZHOU. Stance detection via sentiment information and neural network model[J]. Front. Comput. Sci., 2019, 13(1): 127-138.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed