{"id":"https://openalex.org/W2941312801","doi":"https://doi.org/10.1515/jisys-2018-0289","title":"Secure Fingerprint Authentication Using Deep Learning and Minutiae Verification","display_name":"Secure Fingerprint Authentication Using Deep Learning and Minutiae Verification","publication_year":2019,"publication_date":"2019-04-10","ids":{"openalex":"https://openalex.org/W2941312801","doi":"https://doi.org/10.1515/jisys-2018-0289","mag":"2941312801"},"language":"en","primary_location":{"id":"doi:10.1515/jisys-2018-0289","is_oa":true,"landing_page_url":"https://doi.org/10.1515/jisys-2018-0289","pdf_url":"https://www.degruyter.com/downloadpdf/journals/jisys/29/1/article-p1379.pdf","source":{"id":"https://openalex.org/S2764846071","display_name":"Journal of Intelligent Systems","issn_l":"0334-1860","issn":["0334-1860","2191-026X"],"is_oa":false,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310315148","host_organization_name":"IlmuKomputer.Com","host_organization_lineage":["https://openalex.org/P4310315148"],"host_organization_lineage_names":["IlmuKomputer.Com"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://www.degruyter.com/downloadpdf/journals/jisys/29/1/article-p1379.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5008592955","display_name":"V.M. Praseetha","orcid":null},"institutions":[{"id":"https://openalex.org/I4210164135","display_name":"Birla Institute of Technology and Science, Pilani - Dubai Campus","ror":"https://ror.org/05jnbme07","country_code":"AE","type":"education","lineage":["https://openalex.org/I4210164135","https://openalex.org/I74796645"]}],"countries":["AE"],"is_corresponding":true,"raw_author_name":"V.M. Praseetha","raw_affiliation_strings":["Birla Institute of Technology and Science Pilani , P.O. Box 345055, Dubai , United Arab Emirates"],"raw_orcid":"https://orcid.org/0000-0003-2892-0004","affiliations":[{"raw_affiliation_string":"Birla Institute of Technology and Science Pilani , P.O. Box 345055, Dubai , United Arab Emirates","institution_ids":["https://openalex.org/I4210164135"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067332384","display_name":"Saad Bayezeed","orcid":null},"institutions":[{"id":"https://openalex.org/I4210164135","display_name":"Birla Institute of Technology and Science, Pilani - Dubai Campus","ror":"https://ror.org/05jnbme07","country_code":"AE","type":"education","lineage":["https://openalex.org/I4210164135","https://openalex.org/I74796645"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Saad Bayezeed","raw_affiliation_strings":["Birla Institute of Technology and Science Pilani , Dubai , United Arab Emirates"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Birla Institute of Technology and Science Pilani , Dubai , United Arab Emirates","institution_ids":["https://openalex.org/I4210164135"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5020299641","display_name":"S. Vadivel","orcid":"https://orcid.org/0000-0002-7969-9162"},"institutions":[{"id":"https://openalex.org/I4210164135","display_name":"Birla Institute of Technology and Science, Pilani - Dubai Campus","ror":"https://ror.org/05jnbme07","country_code":"AE","type":"education","lineage":["https://openalex.org/I4210164135","https://openalex.org/I74796645"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"S. Vadivel","raw_affiliation_strings":["Birla Institute of Technology and Science Pilani , Dubai , United Arab Emirates"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Birla Institute of Technology and Science Pilani , Dubai , United Arab Emirates","institution_ids":["https://openalex.org/I4210164135"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5008592955"],"corresponding_institution_ids":["https://openalex.org/I4210164135"],"apc_list":{"value":1000,"currency":"EUR","value_usd":1078},"apc_paid":{"value":1000,"currency":"EUR","value_usd":1078},"fwci":1.0015,"has_fulltext":true,"cited_by_count":17,"citation_normalized_percentile":{"value":0.75726027,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"29","issue":"1","first_page":"1379","last_page":"1387"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13192","display_name":"Forensic Fingerprint Detection Methods","score":0.9897000193595886,"subfield":{"id":"https://openalex.org/subfields/3311","display_name":"Safety Research"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9789999723434448,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/minutiae","display_name":"Minutiae","score":0.8775964975357056},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8376704454421997},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.7750040292739868},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.6775363087654114},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6749190092086792},{"id":"https://openalex.org/keywords/fingerprint","display_name":"Fingerprint (computing)","score":0.6642525792121887},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6410068273544312},{"id":"https://openalex.org/keywords/fingerprint-recognition","display_name":"Fingerprint recognition","score":0.6061390042304993},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.5960871577262878},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.5782023668289185},{"id":"https://openalex.org/keywords/filter","display_name":"Filter (signal processing)","score":0.4493362307548523},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.44917815923690796},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.44007608294487},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.43953073024749756},{"id":"https://openalex.org/keywords/fingerprint-verification-competition","display_name":"Fingerprint Verification Competition","score":0.43508657813072205},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4162200093269348},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.37069445848464966},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.2976188659667969}],"concepts":[{"id":"https://openalex.org/C67174900","wikidata":"https://www.wikidata.org/wiki/Q178022","display_name":"Minutiae","level":4,"score":0.8775964975357056},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8376704454421997},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.7750040292739868},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.6775363087654114},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6749190092086792},{"id":"https://openalex.org/C2777826928","wikidata":"https://www.wikidata.org/wiki/Q3745713","display_name":"Fingerprint (computing)","level":2,"score":0.6642525792121887},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6410068273544312},{"id":"https://openalex.org/C168406668","wikidata":"https://www.wikidata.org/wiki/Q178022","display_name":"Fingerprint recognition","level":3,"score":0.6061390042304993},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.5960871577262878},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.5782023668289185},{"id":"https://openalex.org/C106131492","wikidata":"https://www.wikidata.org/wiki/Q3072260","display_name":"Filter (signal processing)","level":2,"score":0.4493362307548523},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.44917815923690796},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.44007608294487},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.43953073024749756},{"id":"https://openalex.org/C164995936","wikidata":"https://www.wikidata.org/wiki/Q5450283","display_name":"Fingerprint Verification Competition","level":4,"score":0.43508657813072205},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4162200093269348},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.37069445848464966},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.2976188659667969},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1515/jisys-2018-0289","is_oa":true,"landing_page_url":"https://doi.org/10.1515/jisys-2018-0289","pdf_url":"https://www.degruyter.com/downloadpdf/journals/jisys/29/1/article-p1379.pdf","source":{"id":"https://openalex.org/S2764846071","display_name":"Journal of Intelligent Systems","issn_l":"0334-1860","issn":["0334-1860","2191-026X"],"is_oa":false,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310315148","host_organization_name":"IlmuKomputer.Com","host_organization_lineage":["https://openalex.org/P4310315148"],"host_organization_lineage_names":["IlmuKomputer.Com"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent Systems","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:eb6066fe3f894fc0a989bdec777408dd","is_oa":true,"landing_page_url":"https://doaj.org/article/eb6066fe3f894fc0a989bdec777408dd","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Intelligent Systems, Vol 29, Iss 1, Pp 1379-1387 (2019)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1515/jisys-2018-0289","is_oa":true,"landing_page_url":"https://doi.org/10.1515/jisys-2018-0289","pdf_url":"https://www.degruyter.com/downloadpdf/journals/jisys/29/1/article-p1379.pdf","source":{"id":"https://openalex.org/S2764846071","display_name":"Journal of Intelligent Systems","issn_l":"0334-1860","issn":["0334-1860","2191-026X"],"is_oa":false,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310315148","host_organization_name":"IlmuKomputer.Com","host_organization_lineage":["https://openalex.org/P4310315148"],"host_organization_lineage_names":["IlmuKomputer.Com"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent Systems","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2941312801.pdf","grobid_xml":"https://content.openalex.org/works/W2941312801.grobid-xml"},"referenced_works_count":18,"referenced_works":["https://openalex.org/W1629859264","https://openalex.org/W1639795441","https://openalex.org/W1982793518","https://openalex.org/W2024538372","https://openalex.org/W2097117768","https://openalex.org/W2108598243","https://openalex.org/W2112343618","https://openalex.org/W2137273147","https://openalex.org/W2188896583","https://openalex.org/W2194775991","https://openalex.org/W2402144811","https://openalex.org/W2409050142","https://openalex.org/W2531409750","https://openalex.org/W2584050167","https://openalex.org/W2786242895","https://openalex.org/W4230579564","https://openalex.org/W6633237139","https://openalex.org/W6829887170"],"related_works":["https://openalex.org/W2122988758","https://openalex.org/W2136721862","https://openalex.org/W1540357037","https://openalex.org/W3141678744","https://openalex.org/W2566091814","https://openalex.org/W3169072271","https://openalex.org/W2037502770","https://openalex.org/W2004286807","https://openalex.org/W2592489922","https://openalex.org/W2565799042"],"abstract_inverted_index":{"Abstract":[0],"Nowadays,":[1],"there":[2],"has":[3,26],"been":[4],"an":[5],"increase":[6],"in":[7,20,116],"security":[8,89],"concerns":[9],"regarding":[10],"fingerprint":[11,101,111],"biometrics.":[12],"This":[13,25],"problem":[14],"arises":[15],"due":[16],"to":[17,52,65],"technological":[18],"advancements":[19],"bypassing":[21],"and":[22,71,79,90,133],"hacking":[23],"methodologies.":[24],"sparked":[27],"the":[28,63,84,88,106,144],"need":[29],"for":[30,35,129,140],"a":[31,43,49,98,110,137],"more":[32,67],"secure":[33,100],"platform":[34,103],"identification.":[36],"In":[37],"this":[38,117],"paper,":[39],"we":[40],"have":[41],"used":[42],"deep":[44,60,130],"Convolutional":[45],"Neural":[46],"Network":[47],"as":[48,112],"pre-verification":[50],"filter":[51,53],"out":[54],"bad":[55],"or":[56],"malicious":[57],"fingerprints.":[58],"As":[59],"learning":[61,131],"allows":[62],"system":[64],"be":[66],"accurate":[68],"at":[69],"detecting":[70],"reducing":[72],"false":[73],"identification":[74],"by":[75,92],"training":[76],"itself":[77],"again":[78,80],"with":[81,148],"test":[82],"samples,":[83],"proposed":[85],"method":[86],"improves":[87],"accuracy":[91],"multiple":[93],"folds.":[94],"The":[95,119],"implementation":[96],"of":[97,109],"novel":[99],"verification":[102],"that":[104],"takes":[105],"optical":[107],"image":[108],"input":[113,121],"is":[114,122],"explained":[115],"paper.":[118],"given":[120],"pre-verified":[123],"using":[124],"Google\u2019s":[125],"pre-trained":[126],"inception":[127],"model":[128],"applications,":[132],"then":[134],"passed":[135],"through":[136],"minutia-based":[138],"algorithm":[139],"user":[141],"authentication.":[142],"Then,":[143],"results":[145],"are":[146],"compared":[147],"existing":[149],"models.":[150]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1}],"updated_date":"2025-12-06T23:10:59.065948","created_date":"2019-05-03T00:00:00"}
