{"id":"https://openalex.org/W4416386244","doi":"https://doi.org/10.1007/s10586-025-05829-5","title":"Deep learning based contactless fingerprint identification","display_name":"Deep learning based contactless fingerprint identification","publication_year":2025,"publication_date":"2025-11-19","ids":{"openalex":"https://openalex.org/W4416386244","doi":"https://doi.org/10.1007/s10586-025-05829-5"},"language":"en","primary_location":{"id":"doi:10.1007/s10586-025-05829-5","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10586-025-05829-5","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10586-025-05829-5.pdf","source":{"id":"https://openalex.org/S106148199","display_name":"Cluster Computing","issn_l":"1386-7857","issn":["1386-7857","1573-7543"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cluster Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s10586-025-05829-5.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5059553043","display_name":"Mohammad Alsmirat","orcid":"https://orcid.org/0000-0002-1071-7713"},"institutions":[{"id":"https://openalex.org/I156983542","display_name":"Jordan University of Science and Technology","ror":"https://ror.org/03y8mtb59","country_code":"JO","type":"education","lineage":["https://openalex.org/I156983542"]},{"id":"https://openalex.org/I206651237","display_name":"East Texas A&M University","ror":"https://ror.org/01red3556","country_code":"US","type":"education","lineage":["https://openalex.org/I206651237"]}],"countries":["JO","US"],"is_corresponding":true,"raw_author_name":"Mohammad Alsmirat","raw_affiliation_strings":["Department of Computer Science and Information Systems, East Texas A&M University, Commerce, 75428, TX, USA","Department of Computer Science, Jordan University of Science and Technology, Irbid, 22110, Irbid, Jordan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Information Systems, East Texas A&M University, Commerce, 75428, TX, USA","institution_ids":["https://openalex.org/I206651237"]},{"raw_affiliation_string":"Department of Computer Science, Jordan University of Science and Technology, Irbid, 22110, Irbid, Jordan","institution_ids":["https://openalex.org/I156983542"]}]},{"author_position":"middle","author":{"id":null,"display_name":"M. Moneb Khaled","orcid":null},"institutions":[{"id":"https://openalex.org/I29891158","display_name":"University of Sharjah","ror":"https://ror.org/00engpz63","country_code":"AE","type":"education","lineage":["https://openalex.org/I29891158"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"M. Moneb Khaled","raw_affiliation_strings":["Department of Computer Science, University of Sharjah, Sharjah, UAE"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Sharjah, Sharjah, UAE","institution_ids":["https://openalex.org/I29891158"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5111149012","display_name":"Aghyad AL Sayadi","orcid":null},"institutions":[{"id":"https://openalex.org/I29891158","display_name":"University of Sharjah","ror":"https://ror.org/00engpz63","country_code":"AE","type":"education","lineage":["https://openalex.org/I29891158"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Aghyad A. L. Sayadi","raw_affiliation_strings":["Department of Computer Science, University of Sharjah, Sharjah, UAE"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Sharjah, Sharjah, UAE","institution_ids":["https://openalex.org/I29891158"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5059553043"],"corresponding_institution_ids":["https://openalex.org/I156983542","https://openalex.org/I206651237"],"apc_list":{"value":2190,"currency":"EUR","value_usd":2790},"apc_paid":{"value":2190,"currency":"EUR","value_usd":2790},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.42388519,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"29","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9477999806404114,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9477999806404114,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13192","display_name":"Forensic Fingerprint Detection Methods","score":0.012900000438094139,"subfield":{"id":"https://openalex.org/subfields/3311","display_name":"Safety Research"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.003100000089034438,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.7875000238418579},{"id":"https://openalex.org/keywords/preprocessor","display_name":"Preprocessor","score":0.7156999707221985},{"id":"https://openalex.org/keywords/fingerprint","display_name":"Fingerprint (computing)","score":0.7020999789237976},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.6460000276565552},{"id":"https://openalex.org/keywords/transfer-of-learning","display_name":"Transfer of learning","score":0.6093000173568726},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5947999954223633},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.5231999754905701},{"id":"https://openalex.org/keywords/face","display_name":"Face (sociological concept)","score":0.46219998598098755}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8988000154495239},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.7875000238418579},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.7519999742507935},{"id":"https://openalex.org/C34736171","wikidata":"https://www.wikidata.org/wiki/Q918333","display_name":"Preprocessor","level":2,"score":0.7156999707221985},{"id":"https://openalex.org/C2777826928","wikidata":"https://www.wikidata.org/wiki/Q3745713","display_name":"Fingerprint (computing)","level":2,"score":0.7020999789237976},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.6460000276565552},{"id":"https://openalex.org/C150899416","wikidata":"https://www.wikidata.org/wiki/Q1820378","display_name":"Transfer of learning","level":2,"score":0.6093000173568726},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5947999954223633},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.5231999754905701},{"id":"https://openalex.org/C2779304628","wikidata":"https://www.wikidata.org/wiki/Q3503480","display_name":"Face (sociological concept)","level":2,"score":0.46219998598098755},{"id":"https://openalex.org/C168406668","wikidata":"https://www.wikidata.org/wiki/Q178022","display_name":"Fingerprint recognition","level":3,"score":0.4595000147819519},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.4189000129699707},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.4165000021457672},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.4000999927520752},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3919000029563904},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.3917999863624573},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.32589998841285706},{"id":"https://openalex.org/C101738243","wikidata":"https://www.wikidata.org/wiki/Q786435","display_name":"Autoencoder","level":3,"score":0.31940001249313354},{"id":"https://openalex.org/C31510193","wikidata":"https://www.wikidata.org/wiki/Q1192553","display_name":"Facial recognition system","level":3,"score":0.3142000138759613},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.3050999939441681},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.29899999499320984},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.2953999936580658},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.29010000824928284},{"id":"https://openalex.org/C10551718","wikidata":"https://www.wikidata.org/wiki/Q5227332","display_name":"Data pre-processing","level":2,"score":0.25369998812675476}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s10586-025-05829-5","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10586-025-05829-5","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10586-025-05829-5.pdf","source":{"id":"https://openalex.org/S106148199","display_name":"Cluster Computing","issn_l":"1386-7857","issn":["1386-7857","1573-7543"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cluster Computing","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1007/s10586-025-05829-5","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10586-025-05829-5","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10586-025-05829-5.pdf","source":{"id":"https://openalex.org/S106148199","display_name":"Cluster Computing","issn_l":"1386-7857","issn":["1386-7857","1573-7543"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cluster Computing","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1107323957","display_name":null,"funder_award_id":"2202150230","funder_id":"https://openalex.org/F4320316805","funder_display_name":"University of Sharjah"}],"funders":[{"id":"https://openalex.org/F4320316805","display_name":"University of Sharjah","ror":"https://ror.org/00engpz63"}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4416386244.pdf"},"referenced_works_count":31,"referenced_works":["https://openalex.org/W21325108","https://openalex.org/W100001351","https://openalex.org/W1970405634","https://openalex.org/W1997166496","https://openalex.org/W2137011139","https://openalex.org/W2183341477","https://openalex.org/W2194775991","https://openalex.org/W2210638116","https://openalex.org/W2531409750","https://openalex.org/W2548377017","https://openalex.org/W2563686859","https://openalex.org/W2768503474","https://openalex.org/W2782304390","https://openalex.org/W2786459705","https://openalex.org/W2789876780","https://openalex.org/W2792454374","https://openalex.org/W2798687808","https://openalex.org/W2911634291","https://openalex.org/W2945741063","https://openalex.org/W2964350391","https://openalex.org/W2986379325","https://openalex.org/W3033290794","https://openalex.org/W3090821324","https://openalex.org/W3194264840","https://openalex.org/W3207034137","https://openalex.org/W4200514389","https://openalex.org/W4206338407","https://openalex.org/W4238840608","https://openalex.org/W4296117543","https://openalex.org/W4319336147","https://openalex.org/W4389888460"],"related_works":[],"abstract_inverted_index":{"Abstract":[0],"Biometric":[1],"authentication":[2],"systems,":[3],"particularly":[4],"contactless":[5,26,53],"fingerprint":[6,54,133],"methods,":[7],"offer":[8],"enhanced":[9],"security":[10],"and":[11,21,37,103,137,157],"convenience":[12],"across":[13],"various":[14,83],"domains":[15],"like":[16],"access":[17],"control,":[18],"law":[19],"enforcement,":[20],"finance.":[22],"Despite":[23],"these":[24],"advantages,":[25],"systems":[27],"face":[28],"significant":[29],"challenges":[30],"related":[31],"to":[32,77,151],"image":[33],"quality,":[34],"finger":[35],"orientation,":[36],"environmental":[38],"factors.":[39],"To":[40,106],"address":[41],"this,":[42],"our":[43,147],"paper":[44],"presents":[45],"the":[46,108,128],"first":[47],"extensive":[48],"deep":[49,74],"learning-based":[50],"study":[51],"on":[52,100],"recognition":[55],"using":[56],"a":[57,89,117,141],"large":[58],"dataset":[59],"of":[60,92],"2,143":[61],"images":[62],"from":[63,112,135],"175":[64],"individuals.":[65],"Our":[66],"proposed":[67],"approach":[68],"integrates":[69],"state-of-the-art":[70],"preprocessing":[71],"techniques":[72],"with":[73,132],"learning":[75,85],"models":[76],"boost":[78],"identification":[79],"performance.":[80],"After":[81],"studying":[82],"transfer":[84],"models,":[86],"we":[87,115],"achieved":[88],"high":[90],"accuracy":[91],"93.5%.":[93],"We":[94],"also":[95],"conducted":[96],"two":[97],"further":[98],"studies":[99],"inference":[101,124],"time":[102,111],"spoofing":[104],"resistance.":[105],"mitigate":[107],"prolonged":[109],"processing":[110],"complex":[113],"preprocessing,":[114],"propose":[116],"novel":[118],"YOLOv8-based":[119],"architecture":[120],"that":[121],"significantly":[122],"reduces":[123],"duration.":[125],"For":[126],"spoofing,":[127],"model":[129],"was":[130],"tested":[131],"captures":[134],"screens":[136],"printed":[138],"paper,":[139],"demonstrating":[140],"very":[142],"low":[143],"accuracy.":[144],"This":[145],"proves":[146],"model\u2019s":[148],"robust":[149],"capability":[150],"effectively":[152],"differentiate":[153],"between":[154],"genuine":[155],"fingers":[156],"fake":[158],"replicas.":[159]},"counts_by_year":[],"updated_date":"2026-04-16T08:26:57.006410","created_date":"2025-11-19T00:00:00"}
