Startseite A novel fingerprint recognition method based on a Siamese neural network
Artikel Open Access

A novel fingerprint recognition method based on a Siamese neural network

  • Zihao Li , Yizhi Wang EMAIL logo , Zhong Yang , Xiaomin Tian , Lixin Zhai , Xiao Wu , Jianpeng Yu , Shanshan Gu , Lingyi Huang EMAIL logo und Yang Zhang
Veröffentlicht/Copyright: 13. Juni 2022
Veröffentlichen auch Sie bei De Gruyter Brill

Abstract

Fingerprint recognition is the most widely used identification method at present. However, it still falls short in terms of cross-platform and algorithmic complexity, which exerts a certain effect on the migration of fingerprint data and the development of the system. The conventional image recognition methods require offline standard databases constructed in advance for image access efficiency. The database can provide a pre-processed image via a specific method that probably is compatible merely with the specific recognition algorithm. Then, the specific recognition algorithm starts the process of retrieving these specific pre-proessing images for recognition and inevitably will be blocked from other datasets. The proposed method in this research designed an embedded image processing algorithm based on a Siamese neural network in the recognition method that allows the proposed method to recognize images from any source without constructing a database for image storage in advance. In this research, the proposed method was applied to fingerprint recognition and evaluation of the proposed method was evaluated. The results showed that the accuracy of the proposed algorithm was up to 92%, and its F1 score was up to 0.87. Compared with the conventional fingerprint matching methods, its significant advantage in the FRR, FAR, and CR jointly indicated the remarkable correct recognition rate of the proposed method.

1 Introduction

1.1 Background

Fingerprints are patterns made up of rough lines on the pad of human fingers. Being only a small part of the skin, the information fingerprints contains is very instrumental. Among the biometric recognition technologies, fingerprint recognition boasts the highest reliability [1,2]. Fingerprint recognition has now come to everyone’s side. Mobile phone fingerprint unlocking, fingerprint payment, fingerprint punch-in, and other ways have already become part of human life [3].

Extracting Galton minutiae points is the core of traditional fingerprint recognition [4]. In addition to preprocessing, binarization, and thinning, minutiae are extracted by skeletonization [5]. A matching algorithm is another barycenter of fingerprint recognition. It uses classical algorithms such as the number and angle of the minutiae matching method, multiple reference point matching method, and vector triangle matching method [6]. Referring to the weakness of fingerprints recognition technology, on the one hand, conventional fingerprint recognition mainly adopts image processing and other fixed algorithms and usually requires manual supervision and parameter debugging [7]. It is time-consuming and can hardly adapt to the massive fingerprint databases. On the other hand, the fingerprint image matching method varies from system to system, including coordinates, directions, and accuracy of minutiae [8]. Given different coordinates, one fingerprint image is stored in different “formats” in many databases and cannot be recognized mutually, which is redundant and difficult for image immigration.

To this end, a novel fingerprint recognition method is proposed and realized in this study, which uses the Siamese neural network to compare two fingerprint images and complete the task of fingerprint recognition. After the test, the proposed technique works best in mobile phone fingerprint recognition, electronic locks, and other fingerprint devices. The contributions of this study are as follows:

  1. Compared with conventional recognition methods, the proposed method saves the step of feature extraction and can make fingerprint recognition faster and easy to develop.

  2. The fingerprint images stored in the proposed database can be directly input into other fingerprint recognition systems for use, which greatly enhances the compatibility of fingerprint system data.

  3. The proposed method returns stronger robustness, and the algorithm is human-free.

  4. Compared with other neural-network-based methods, steps of fingerprint database construction with fingerprint images are reduced via the proposed method, as it provides a comparison between two fingerprint images in real time.

1.2 Literature review

The most widely accepted method in image processing as well as other data processing such as sound recognition [9], is convolutional neural network (CNN) [10], and as an extensive method of CNN, the Siamese neural network is a coupling framework established between two artificial neural networks [11]. The Siamese network includes two CNNs that share the weight. After two images enter CNN and the comparative network with loss function, the relevancy between the images is output. As early as 2002, there were studies combining neural networks with fingerprint recognition [12]. Its recent applications are mainly associated with image processing, such as image forensics [13], diagnosis from CXR images for Covid-19 patients [14], and geographic anomalies [15], and the applications are limited to comparing the difference of collected images.

Although the fingerprint recognition algorithm based on improved CNN [16] investigated by Li has gotten somewhere with respect to speed and accuracy, minutiae still needed to be extracted and the compatibility was poor. The method based on the back-propagation (BP) neural network realized by Sung mainly applied the BP network to the matching algorithm of minutiae [17]. Fingerprint minutiae extraction was a difficult step in debugging and developing conventional methods. Yuan et al. adopted FPN (feature pyramid networks)–SE (squeeze and excitation)–Capsule (capsule networks) to realize fingerprint recognition [18]. Although the accuracy of the algorithm was enhanced, the complexity of fingerprint recognition was also increased. In addition, the recognition method was to input the fingerprints into a pre-trained network and the network would directly give the recognition result. This indicated that each time a new fingerprint was added, the network shall be retrained, and it was time-consuming to input fingerprints. What’s more, the data information was stored inside the network, so the compatibility and scalability were low, and the role that it played in real-time fingerprint recognition applications was limited. Deshpande’s team [19] employed a CNN model based on residual learning to enhance and extract minutiae. Ma et al. brought forward a deep convolutional neural network and used it to match fingerprint minutiae in parallel [20]. Both of them adopted neural networks to extract fingerprint minutiae from images. These kinds of recognition methods did promote the recognition degree of unclear fingerprint images. However, they were not compatible with other recognition systems. By contrast, the method presented in this study can directly use the images to match the results. Still, fingerprint recognition can be achieved in other systems by extracting minutiae from data images based on this study or other methods. Therefore, the discussion leads to the following two research questions:

  1. How should the complexity of the algorithm in fingerprint recognition be simplified?

  2. How should the same fingerprint database be compatible with multiple fingerprint systems?

2 Methodologies

As mentioned above, the conventional fingerprint recognition system relied on the comparison of minutiae. In this study, however, the step of minutia point extraction was omitted, and two binary fingerprint images were input into the Siamese neural network to obtain the similarity between two fingerprints and get the fingerprint recognition result. The whole system needed to complete such steps as the standardization of fingerprint image, image enhancement, binarization, input into the Siamese network, and output of the matching result. It can be divided into two parts: “fingerprint image preprocessing” and “fingerprint image matching based on Siamese network,” as shown in Figure 1.

Figure 1 
               Flowchart of fingerprint image processing.
Figure 1

Flowchart of fingerprint image processing.

The method proposed in this study can compare fingerprint images in a direct way, so it was more flexible in practical applications. The application method is shown in Figure 2, that is, to store the binarized image into the database and compare it with the input fingerprint, in order to control the subsequent programs.

Figure 2 
               Flowchart of application.
Figure 2

Flowchart of application.

2.1 Fingerprint image preprocessing

The fingerprint images obtained in fingerprint collection had the following four defects: (1) different pressing forces and directions of fingers can cause the fingerprint image to vary in shade; (2) different dryness and wetness levels of fingers can make the fingerprint images too dry or too wet and lack corresponding features; (3) the fingerprint image was intermittent due to wrinkles and scars on the fingers; and (4) there was irregular noise or stains in the image collected. Fingerprint image preprocessing is a technology that can improve the quality of fingerprint images, and fingerprint images processed with this technology can be better processed later.

The fingerprint image processing method applied in this study was divided into three steps: (1) standardization, (2) fingerprint enhancement, and (3) fingerprint binarization.

2.2 Fingerprint image matching based on Siamese network

The structure diagram of the Siamese networks is shown in Figure 3. It was composed of three networks, of which two networks (network 1 and network 2) were a pair of convolutional neural networks with share weight. The function of this pair of networks was to generate a pair of minutia vectors by extracting image features. After the vectors went through the fully connected network (network 3), they attained the final output.

Figure 3 
                  Structure diagram of Siamese network.
Figure 3

Structure diagram of Siamese network.

There were many options for the master neural network model, such as the AlexNet model that dramatically broke the recognition accuracy record of the convolutional network in the ImageNet Challenge in 2012 [21], GoogLeNet, a more outstanding model on the ImageNet platform in 2014 [22] that applied the multi-scale convolution feature fusion technology, and the more excellent VGGNet, a deep residual network model ResNet designed by He et al. [23]. Nowadays, the recognition accuracy of convolutional neural networks is even higher than that of human beings, the network layers are increasingly deep, and the technology is also increasingly sophisticated.

This study employed an improved version of the VGG16 network model, which was a convolutional network model presented by Simonyan and Zisserman [24]. This network performed very well in the ImageNet platform Challenge in 2014. The applications of face recognition and object classification in the field of image recognition have been verified and achieved outstanding results. However, this method has not yet been applied in the research of fingerprint recognition. In this study, we applied this method to fingerprint images and expanded its application scope.

The part of fingerprint image matching fulfilled the function of outputting matching degrees. Two pre-processed fingerprint images were input. Through network calculations, the matching degree m was figured out. If m was biased to 1, two fingerprints were similar and came from the same finger. If m was biased to 0, two fingerprints were different and came from different fingers.

2.3 Obtaining matching results

After comparison based on the Siamese network, a threshold result d in (0,1) was used for classification. If m was greater than d, then the fingerprints were the same. If m was less than d, then the fingerprints were different. The threshold value adopted in this study was d = 0.9.

3 Pre-processing methods of fingerprint images

3.1 Standardization of images

Fingerprint images were standardized to eliminate the problems of inconsistent clarity, gray scale, and the number of channels between different fingerprint images. The steps were as follows:

  1. Grayed the images and turned colorful images into gray images.

  2. Equalization. Due to the influence of the collection device or the pressing force of the finger, the gray value of the effective part of fingerprint image fluctuated greatly. In this case, it was a requisite to equalize the gray value of the image, so that the mean, variance, and contrast of the gray feature of the image could be kept in a small range.

Assuming that the gray value at (x, y) of the original image was gray (x, y) and the image size was M × N, the gray mean (mean) and gray variance (var) can be obtained. The calculation method is as follows:

(1) mean = i = 0 M 1 j = 0 N 1 gray ( i + x × M , j + y × N ) M × N ,

(2) var = i = 0 M 1 j = 0 N 1 [ gray ( i + x × M , j + y × N ) mean ] 2 M × N ,

(3) GRAY ( x , y ) = mean 0 + var 0 × [ gray ( x , y ) mean ( x , y ) ] 2 var , gray > mean, mean 0 var 0 × [ gray ( x , y ) mean ] 2 var ,

where var0 is the expected variance, mean0 is the expected mean, and GRAY(x, y) is the gray value that was output. In this study, the empirical values of mean0 = 80 and var0 = 200 are used, and the equalized result is shown in Figure 4.

  1. Normalization. For ease of further processing and calculation, the image needed to be normalized. Individual pixels shall be expressed by values in [0, 1]. After normalization, the gray values of individual pixels were

    (4) y = x min max min .

  2. Low-pass filtering smoothing. The image noise generated during fingerprint collection was removed and the fingerprint images were smoothed. Fast Fourier transform (FFT) was applied to the images. After the high-frequency part was eliminated, low-pass filtered images were acquired through inverse Fourier transform.

Figure 4 
                  Left: original image. Right: equalized image.
Figure 4

Left: original image. Right: equalized image.

In this study, an ideal low-pass filter H(x, y) was adopted:

(5) H ( x , y ) = 1 , D ( u , v ) D 0 0 , D ( u , v ) > D 0

where D 0 stands for the radius of the passband. D 0 = 60 was used in this study. D(u, v) is the Euclidean distance from a point in the spectrum to the center of the spectrum:

(6) D ( u , v ) = ( u M / 2 ) 2 + ( v N / 2 ) 2 .

Filtered results are shown in Figure 5.

Figure 5 
                  Left: equalized image. Right: filtered image.
Figure 5

Left: equalized image. Right: filtered image.

3.2 Fingerprint image enhancement

To remove contiguity, disconnection and other defects of fingerprints, it was a must to enhance the fingerprints. Because the orientation of fingerprint lines was very conspicuous, the orientation field of the fingerprint can be built according to fingerprint lines. Our study drew on the fingerprint enhancement solution based on the orientation field and ridge frequency proposed by Hong et al. [25]. This algorithm can adaptively improve the clarity of ridge and valley structures of input fingerprint images according to the estimated local ridge orientation and frequency.

First, gradients x (u, v) and y (u, v) of two orientations of each pixel were calculated, and then, the local orientation was figured out:

(7) v x ( i , j ) = u = i w 2 i + w 2 v = j w w j + w 2 2 x ( u , v ) y ( u , v ) ,

(8) v y ( i , j ) = u = i w 2 i + w 2 v = j w w j + w 2 2 [ x 2 ( u , v ) y 2 ( u , v ) ] ,

(9) θ ( i , j ) = 1 2 tan 1 v y ( i , j ) v x ( i , j ) ,

where θ(i, j) is the least-squares estimations of the local ridge orientation at the block. It stood for the orientation orthogonal to the principal direction of the Fourier spectrum of the corresponding window. A discrete sine waveform composed of fingerprint lines can be obtained on a line orthogonal to θ in each local window. The valley and ridge frequency can be estimated according to this feature.

When the local orientation and valley and ridge frequency of fingerprints were obtained, the Gabor filter can be adapted to filter the local window. The Gabor filter was featured by frequency selectivity and orientation selectivity, and it had the best resolution ratio in both spatial and frequency domains. On this account, it was very suitable to take the Gabor filter as a band-pass filter to enhance fingerprint images. After filtration, the local windows were spliced to get enhanced fingerprint images.

The Gabor operator is calculated using the following equation, and the result is shown in Figure 6:

(10) g ( x , y , λ , θ , ψ , σ , γ ) = exp x 2 + γ 2 y 2 2 σ 2 exp i 2 π x λ + ψ .

Figure 6 
                  Left: filtered image. Right: enhanced fingerprint image.
Figure 6

Left: filtered image. Right: enhanced fingerprint image.

3.3 Binarization

In this study, an iterative method was employed to perform binary segmentation on the enhanced image:

  1. An initial threshold T was selected;

  2. The image was divided into two parts, R1 and R2 by using T;

  3. Means m1 and m2 of R1 and R2 were calculated;

  4. A new threshold T was selected. Let T = (m1 + m2)/2;

  5. Steps 1–4 were repeated until the difference between T values obtained in two times was less than a preset value.

Figure 7 shows the result after binarization of the fingerprint image.

Figure 7 
                  Left: enhanced fingerprint image. Right: binarized fingerprint image.
Figure 7

Left: enhanced fingerprint image. Right: binarized fingerprint image.

4 Building and training of the Siamese network

4.1 Network building

In this study, the PyTorch platform was used to build the main network, and the input layer channel was set to 128 × 128 × 3. Fingerprint images with a size of 128 × 128 were used as input. The main network was structured as follows (Table 1):

Table 1

Structure of main network

S/N Layer type Kernel size Features Max pooling size Output size
1 Input 128 × 128 × 3
2 Two convolution 3 × 3 64 2 × 2 64 × 64 × 64
3 Two convolution 3 × 3 128 2 × 2 32 × 32 × 64
4 Three convolution 3 × 3 256 2 × 2 16 × 16 × 256
5 Three convolution 3 × 3 512 2 × 2 8 × 8 × 512
6 Three convolution 3 × 3 512 2 × 2 4 × 4 × 512
7 Fully connected 1 × 1 × 4,096
8 Fully connected layer was simulated by convolution 1 × 1 × 1,000

See Figure 3 for the structure diagram of the comparative network. The two main networks were exported to the loss function. The loss function used in this study was contrastive loss [26]. This kind of loss function was effective in handling the relationship between the outputs of two main networks in the Siamese network.

Its minimum loss distance is

(11) 1 2 N n = 1 N y d 2 + ( 1 y ) max ( margin d , 0 ) 2 .

The vector distance L that was output was fully connected twice after the calculation of the loss function, and the output layer adopted the sigmoid function to normalize the values obtained. The network in this segment was a comparative network (Figure 8). If the relevancy between two images was high, then the output was biased to 1. Otherwise, the output was biased to 0.

(12) Sigmoid ( z ) = 1 1 + e z .

Figure 8 
                  Structure diagram of the comparative network.
Figure 8

Structure diagram of the comparative network.

4.2 Training method

In this study, we trained the above Siamese network with 63 different fingerprints and used fingerprint images with a size of 128 × 128. The fingerprint images of the same finger in the training set were stored in the same folder. For the main network VGG, the pre-trained VGG16 network weights were used for the following network training in this study.

There are 66 kinds of fingerprint images belonging to different fingers in the training set, collected by an AS60x fingerprint collector. For each of the different fingerprints in the training set, 10 images were sampled on average. All images in the training set underwent fingerprint preprocessing as described above. For the purpose of increasing the adaptability of the training set and training, each fingerprint image was rotated five times and a total of six images (Figure 9) were achieved. Through this kind of operation training, the number of images of each fingerprint increased to about 60 on average.

Figure 9 
                  Binarized fingerprint image database.
Figure 9

Binarized fingerprint image database.

Regarding the training of the comparative network, two images of the same kind were taken out of the training set, and the output was calibrated to 1. An image of a different kind was taken out and the output was calibrated to 0, together with the images in the first two chapters. Another image of a different kind was taken out, the previous step was continued, and the dataset was calibrated. After training in this way, when two fingerprint images of the same finger were input, the network output was biased to 1. Otherwise, when two fingerprint images of different fingers were input, the network output was biased to 0.

An RTX2060 graphic processing unit (GPU) was selected for training and test, and the training parameters and results are used as follows:

  1. Batch size = 32;

  2. Learning rate = 0.001;

  3. Epoch = 1,000;

  4. Total loss = 0.1149;

  5. Training time: 3 days;

  6. Test time per match: 600 ms.

5 Results and analysis

5.1 Compatibility test

The conventional Galton algorithm was applied to the preprocessing image database proposed in this research. Results showed that the proposed database was compatible with the conventional system and the targeted system featured database was successfully generated.

5.2 Accuracy test

A total of 3,826 fingerprint images of 66 different fingerprints were used to train the network, and the network was trained five times in a row. The accuracy would be greatly improved if more data were included in the database (Figure 10).

Figure 10 
                  Fingerprint matching experiment, the two images at the top were from the same fingerprint, and the two images at the bottom were from different fingerprints.
Figure 10

Fingerprint matching experiment, the two images at the top were from the same fingerprint, and the two images at the bottom were from different fingerprints.

Figure 11 
                  The accuracy of the method proposed in this study under different thresholds.
Figure 11

The accuracy of the method proposed in this study under different thresholds.

The fingerprint images used in the detection program were not in the training database. A total of 82 fingerprint images of 10 different fingerprints were used for fingerprint detection. The images had been preprocessed and binarized as described above in order to improve the testing efficiency. Fingerprint images of the same kind in the database were placed in the same folder. The implementation of the detection program consisted of three steps:

  1. Read all fingerprint images and mark fingerprints by fingerprint category.

  2. Calculate the accuracy rate (as shown in Figure 11) and recall rate of the marked fingerprint images after pairwise matching with different thresholds.

  3. Calculate the harmonic mean of the accuracy rate and recall rate to obtain the F1 score (also known as balanced F score).

Figure 12 
                  The detailed minutiae are successfully extracted after inputting data image into the conventional fingerprint algorithm.
Figure 12

The detailed minutiae are successfully extracted after inputting data image into the conventional fingerprint algorithm.

Figure 13 
                  The accuracy rate and recall rate curves of different threshold values.
Figure 13

The accuracy rate and recall rate curves of different threshold values.

Figure 14 
                  
                     F1 score with different threshold values.
Figure 14

F1 score with different threshold values.

Figure 15 
                  FRR and FAR depending on the decision threshold.
Figure 15

FRR and FAR depending on the decision threshold.

Table 2

Comparison of experimental results

Galton-based method Multiple reference points Probabilist method Vector triangle matching Proposed method
FRR (en %) 7.7 7.85 4.7 2.72 1.11
FAR (en %) 0.5 0.06 0.7 0.05 1.41
CR (en %) 91.8 92.09 94.6 97.23 97.48

6 Results

  1. Directly input images into the Galton-based minutiae extraction algorithm, and successfully find out the detail points (as shown in Figure 12), indicating that the fingerprint storage database proposed by this method is usable for other algorithms, and highly compatible.

  1. A total of 82 test fingerprint images after marking are selected for the matching test to obtain a total of 3321 different combinations, and finally, the accuracy rate and recall rate curves are calculated (Figure 13), the accuracy rate and recall rate are synthesized, the F1 score is calculated (Figure 14). It can be concluded that the F1 score of 0.874 is the highest when the similarity threshold reaches 91%.

  1. Many researchers have utilized FRR (false rejection rate) and FAR (false acceptance rate) to measure the performance of fingerprint recognition algorithms as follows:

precision(i) = simNum(i).TP/(simNum(i).TP + simNum(i).FP);%precision rate

recall(i) = simNum(i).TP/(simNum(i).TP + simNum(i).FN);recall rate

F1(i) = (2*precision(i)*recall(i))/(precision(i) + recall(i));

FRR(i) = simNum(i).FP/num;

FAR(i) = simNum(i).FN/num;

CR(i) = 1-FRR(i)-FAR(i).

Figure 15 gives the curve of FRR and FAR of this method with a threshold. It can be seen from the figure that when the threshold is 91%, there is little difference between the FRR value and the FAR value. At this time, FRR = 1.11%, FAR = 1.41%, and CR (correctly recognized) = 100% – FRR – FAR = 97.48%. Table 2 shows the comparison between this method and other fingerprint identification algorithms as a performance reference.

The proposed method returned a slightly higher result in CR but a significantly higher result in FAR and a significantly smaller score in FAR than the method of vector triangle matching; while compared to other classic methods, such as multiple reference points, the probabilist method, and Galton-based method, the proposed method received a remarkable advantage in FRR, FAR, and CR.

7 Conclusions and future work

7.1 Conclusions

In this research, a novel image matching method based on the embedded Siamese neural network is proposed and applied to fingerprint matching, which can perform the recognition of fingerprints from any sources (databases, photographs, and pictures) with an embedded image processing algorithm, so that the steps of fingerprint image database construction can be omitted. Therefore, online recognition is realized. In addition, compared with other neural network methods, after training, the proposed method received an F1 score of 0.874 with a similarity threshold of 91%, indicating its excellent precision and recall rate; in addition, the significant large value in CR (97.48%) and FAR (1.41%), and a significant small value in FRR (1.11%) of the proposed method jointly indicates its accuracy in identifying the desired fingerprints.

The research work is summarized as follows:

  1. Compared with the conventional fingerprint recognition method, which requires extracting minutiae and corresponding matching, our study innovates by directly using the method of comparing the fingerprint images with the Siamese neural network and then outputting similarity value.

  2. This study takes into account that different fingerprint recognition systems have different data storage methods, and the data are not interoperable. Compared with the conventional fingerprint recognition methods, it is simpler, easier to understand, compatible, and convenient.

7.2 Future work

Although the design and research on the innovative fingerprint matching system was performed and realized, some prosperous research trends are left to be developed further, which include the following:

  1. Due to the limitation of hardware in the part of the fingerprint recognition system, not many training sets are used in machine learning. If more datasets were used in future research, then the accuracy would be further improved.

  2. Our study lays more emphasis on the accuracy of the fingerprint matching algorithm. There is still much room for improvement in the running time. So in further studies, we need to fully consider the requirements of real-time and rapidity.

  3. Although this study proposes a fingerprint recognition method, for the newly proposed matching algorithm, the functions implemented are still limited, and there is still a big gap in the practical applications. The database, networking, other biometric methods, single-chip microcomputer and other modules and development methods can be applied to the proposed matching method. In that case, apart from the dataset we retrieved in this research was open source, data security, attack methods, etc., should be further considered in the future applications.

  4. Despite the improvement of compatibility, in practical applications, the way of storing images as a database will increase the burden of the storage space of the database and require hardware support.

  5. In this research, the vgg16 network is used for fingerprint identification. If a new network more suitable for fingerprint processing is used, the effect will be better.

Acknowledgments

This work is partially supported by the National Natural Science Foundation of China (No. 61803188), the Fujian Key Laboratory of Functional Marine Sensing Materials, Minjiang University (Grant No. MJUKF-FMSM202103), the University-Industry Collaboration Education Foundation of Ministry of Education (No. 202102053008), the High Level Talent Foundation of Jinling Institute of Technology (No. jit-b-201713, No. jit-b-201816, and No. jit-b-202029).

  1. Funding information: This work is partially supported by the National Natural Science Foundation of China (No. 61803188), the Fujian Key Laboratory of Functional Marine Sensing Materials, Minjiang University (Grant No. MJUKF-FMSM202103), the University-Industry Collaboration Education Foundation of Ministry of Education (No. 202102053008), the High Level Talent Foundation of Jinling Institute of Technology (No. jit-b-201713, No. jit-b-201816, and No. jit-b-202029).

  2. Conflict of interest: The authors state no conflict of interest.

References

[1] Khademi AF, Zulkernine M, Weldemariam K. An empirical evaluation of web-based fingerprinting. IEEE Softw. 2015;32:46–52.10.1109/MS.2015.77Suche in Google Scholar

[2] Takano A. The history of practical application of fingerprinting: networks of the British Empire and the “problem” of controlling human mobilities. JAMA Intern Med. 2015;175:257–60.Suche in Google Scholar

[3] Li X. The past and present of fingerprint identification technology. China: Chinese Government General Services; 2021. p. 64–6 [Chinese].Suche in Google Scholar

[4] Luo Y, Guo W., Footprinting Tutorial, People’s Public Security, University of China Press, China; 2010.Suche in Google Scholar

[5] Krish RP, Fierrez J, Ramos D, Ortega-Garcia J, Bigun J. Pre-registration for improved latent fingerprint identification. Proceedings of International Conference on Pattern Recognition; 2014 Aug 1–3. p. 696–701.10.1109/ICPR.2014.130Suche in Google Scholar

[6] Satheesh KP. Svm-bdt based intelligent fingerprint authentication system using geometry approach. Int J Comput Netw Inf Secur. 2021;4:1.Suche in Google Scholar

[7] Fang B, Wen H, Liu RZ, Tang YY. A new fingerprint thinning algorithm. Chinese Conference on Pattern Recognition (CCPR); 2010. p. 1–4.10.1109/CCPR.2010.5659273Suche in Google Scholar

[8] Wang S. Overview of fingerprint identification technology. J Inf Secur Res. 2016;2(7):343–55 [Chinese].Suche in Google Scholar

[9] Wang Z, Li N, Wu T, Zhang H, Feng T. Simulation of human ear recognition sound direction based on convolutional neural network. J Intell Syst. 2021;30(1):209–23.10.1515/jisys-2019-0250Suche in Google Scholar

[10] Zhu L, Zhang H, Ali S, Yang B, Li C. Crowd counting via multi-scale adversarial convolutional neural networks. J Intell Syst. 2021;30(1):180–91.10.1515/jisys-2019-0157Suche in Google Scholar

[11] Bromle J, Guyon I, LeCun Y, Sackinger E, Shah R. Signature verification using a “Siamese” time delay neural network. Int J Pattern Recognit Artif Intell. 1993;11:737–44.10.1142/9789812797926_0003Suche in Google Scholar

[12] Kamijo M. Classifying fingerprint images using neural network: deriving the classification state. IEEE International Conference on Neural Networks. Vol. 3, 2002 Aug 6. p. 1932–7.10.1109/ICNN.1993.298852Suche in Google Scholar

[13] Mazumdar A, Bora PK. Siamese convolutional neural network-based approach towards universal image forensics. IET Image Process. 2020;14(13):3105–16.10.1049/iet-ipr.2019.1114Suche in Google Scholar

[14] Wang L, Lin ZQ, Wong A. COVID-Net: a tailored deep convolutional neural network design for detection of COVID-19 cases from chest X-ray images. Sci Rep. 2020;10(1):19549.10.1038/s41598-020-76550-zSuche in Google Scholar PubMed PubMed Central

[15] Wu B, Li X, Yuan F, Li H, Zhang M. Transfer learning and siamese neural network based identification of geochemical anomalies for mineral exploration: a case study from the Cu Au deposit in the NW Junggar area of northern Xinjiang Province, China. J Geochem Explor. 2022;232:106904.10.1016/j.gexplo.2021.106904Suche in Google Scholar

[16] Li H. Feature extraction, recognition, and matching of damaged fingerprint: application of deep learning network. Concurr Comput Pract Exp. 2020;33(6):1–9.10.1002/cpe.6057Suche in Google Scholar

[17] Sun H. Fingerprint recognition based on BP neural network. Chin Comput Commun. 2011;5:32–3 [Chinese].Suche in Google Scholar

[18] Yuan Y, Li L, Yang Y. Fingerprint image recognition algorithm based on FPN-SE-Capsule network. Ind Control Comput. 2021;34:45–47 + 50 [Chinese].Suche in Google Scholar

[19] Deshpande UU, Malemath VS, Patil SM, Chaugule SV. CNNAI: a convolution neural network-based latent fingerprint matching using the combination of nearest neighbor arrangement indexing. Front Robot AI. 2020;7:113.10.3389/frobt.2020.00113Suche in Google Scholar PubMed PubMed Central

[20] Ma ZQ, Sun XX, Cheng MJ, Wang SH. Research on the application of convolutional-deep neural networks in parallel fingerprint minutiae matching. Int J Biometrics. 2021;13:96.10.1504/IJBM.2021.112220Suche in Google Scholar

[21] Technicolor T, Related S. ImageNet classification with deep convolutional neural networks. https://web.cs.ucdavis.edu/∼yjlee/teaching/ecs289g-winter2018/alexnet.pdf (last retrieved 18/03/2022).Suche in Google Scholar

[22] Arora S, Bhaskara A, Ge R, Ma T. Provable bounds for learning some deep representations. U.S.A: Cornell Univerisity; 2013. https://arxiv.org/pdf/1310.6343v1.pdf (last retrieved 18/03/2022).Suche in Google Scholar

[23] He K, Zhang X, Ren S, Sun J. Deep residual learning for image recognition. Conference on Computer Vision and Pattern Recogonition (CVPR); 2016 June 27–30. p. 770–8.10.1109/CVPR.2016.90Suche in Google Scholar

[24] Simonyan K, Zisserman A. Very deep convolutional networks for large-scale image recognition. International Conference on Learning Representations (ICLR); 2015 May 7–9. p. 1–14.Suche in Google Scholar

[25] Hong L, Wan Y, Jain A. Fingerprint image enhancement: algorithm and performance evaluation. IEEE Trans Pattern Anal Mach Intell. 1998;20(8):777–89.10.1109/34.709565Suche in Google Scholar

[26] He K, Fan H, Wu Y, et al. Momentum contrast for unsupervised visual representation learning. CVF Conference on Computer Vision and Pattern Recognition (CVPR); 2020 June 13–19. p. 9726–35.10.1109/CVPR42600.2020.00975Suche in Google Scholar

Received: 2021-12-16
Revised: 2022-03-21
Accepted: 2022-03-24
Published Online: 2022-06-13

© 2022 Zihao Li et al., published by De Gruyter

This work is licensed under the Creative Commons Attribution 4.0 International License.

Artikel in diesem Heft

  1. Research Articles
  2. Construction of 3D model of knee joint motion based on MRI image registration
  3. Evaluation of several initialization methods on arithmetic optimization algorithm performance
  4. Application of visual elements in product paper packaging design: An example of the “squirrel” pattern
  5. Deep learning approach to text analysis for human emotion detection from big data
  6. Cognitive prediction of obstacle's movement for reinforcement learning pedestrian interacting model
  7. The application of neural network algorithm and embedded system in computer distance teach system
  8. Machine translation of English speech: Comparison of multiple algorithms
  9. Automatic control of computer application data processing system based on artificial intelligence
  10. A secure framework for IoT-based smart climate agriculture system: Toward blockchain and edge computing
  11. Application of mining algorithm in personalized Internet marketing strategy in massive data environment
  12. On the correction of errors in English grammar by deep learning
  13. Research on intelligent interactive music information based on visualization technology
  14. Extractive summarization of Malayalam documents using latent Dirichlet allocation: An experience
  15. Conception and realization of an IoT-enabled deep CNN decision support system for automated arrhythmia classification
  16. Masking and noise reduction processing of music signals in reverberant music
  17. Cat swarm optimization algorithm based on the information interaction of subgroup and the top-N learning strategy
  18. State feedback based on grey wolf optimizer controller for two-wheeled self-balancing robot
  19. Research on an English translation method based on an improved transformer model
  20. Short-term prediction of parking availability in an open parking lot
  21. PUC: parallel mining of high-utility itemsets with load balancing on spark
  22. Image retrieval based on weighted nearest neighbor tag prediction
  23. A comparative study of different neural networks in predicting gross domestic product
  24. A study of an intelligent algorithm combining semantic environments for the translation of complex English sentences
  25. IoT-enabled edge computing model for smart irrigation system
  26. A study on automatic correction of English grammar errors based on deep learning
  27. A novel fingerprint recognition method based on a Siamese neural network
  28. A hidden Markov optimization model for processing and recognition of English speech feature signals
  29. Crime reporting and police controlling: Mobile and web-based approach for information-sharing in Iraq
  30. Convex optimization for additive noise reduction in quantitative complex object wave retrieval using compressive off-axis digital holographic imaging
  31. CRNet: Context feature and refined network for multi-person pose estimation
  32. Improving the efficiency of intrusion detection in information systems
  33. Research on reform and breakthrough of news, film, and television media based on artificial intelligence
  34. An optimized solution to the course scheduling problem in universities under an improved genetic algorithm
  35. An adaptive RNN algorithm to detect shilling attacks for online products in hybrid recommender system
  36. Computing the inverse of cardinal direction relations between regions
  37. Human-centered artificial intelligence-based ice hockey sports classification system with web 4.0
  38. Construction of an IoT customer operation analysis system based on big data analysis and human-centered artificial intelligence for web 4.0
  39. An improved Jaya optimization algorithm with ring topology and population size reduction
  40. Review Articles
  41. A review on voice pathology: Taxonomy, diagnosis, medical procedures and detection techniques, open challenges, limitations, and recommendations for future directions
  42. An extensive review of state-of-the-art transfer learning techniques used in medical imaging: Open issues and challenges
  43. Special Issue: Explainable Artificial Intelligence and Intelligent Systems in Analysis For Complex Problems and Systems
  44. Tree-based machine learning algorithms in the Internet of Things environment for multivariate flood status prediction
  45. Evaluating OADM network simulation and an overview based metropolitan application
  46. Radiography image analysis using cat swarm optimized deep belief networks
  47. Comparative analysis of blockchain technology to support digital transformation in ports and shipping
  48. IoT network security using autoencoder deep neural network and channel access algorithm
  49. Large-scale timetabling problems with adaptive tabu search
  50. Eurasian oystercatcher optimiser: New meta-heuristic algorithm
  51. Trip generation modeling for a selected sector in Baghdad city using the artificial neural network
  52. Trainable watershed-based model for cornea endothelial cell segmentation
  53. Hessenberg factorization and firework algorithms for optimized data hiding in digital images
  54. The application of an artificial neural network for 2D coordinate transformation
  55. A novel method to find the best path in SDN using firefly algorithm
  56. Systematic review for lung cancer detection and lung nodule classification: Taxonomy, challenges, and recommendation future works
  57. Special Issue on International Conference on Computing Communication & Informatics
  58. Edge detail enhancement algorithm for high-dynamic range images
  59. Suitability evaluation method of urban and rural spatial planning based on artificial intelligence
  60. Writing assistant scoring system for English second language learners based on machine learning
  61. Dynamic evaluation of college English writing ability based on AI technology
  62. Image denoising algorithm of social network based on multifeature fusion
  63. Automatic recognition method of installation errors of metallurgical machinery parts based on neural network
  64. An FCM clustering algorithm based on the identification of accounting statement whitewashing behavior in universities
  65. Emotional information transmission of color in image oil painting
  66. College music teaching and ideological and political education integration mode based on deep learning
  67. Behavior feature extraction method of college students’ social network in sports field based on clustering algorithm
  68. Evaluation model of multimedia-aided teaching effect of physical education course based on random forest algorithm
  69. Venture financing risk assessment and risk control algorithm for small and medium-sized enterprises in the era of big data
  70. Interactive 3D reconstruction method of fuzzy static images in social media
  71. The impact of public health emergency governance based on artificial intelligence
  72. Optimal loading method of multi type railway flatcars based on improved genetic algorithm
  73. Special Issue: Evolution of Smart Cities and Societies using Emerging Technologies
  74. Data mining applications in university information management system development
  75. Implementation of network information security monitoring system based on adaptive deep detection
  76. Face recognition algorithm based on stack denoising and self-encoding LBP
  77. Research on data mining method of network security situation awareness based on cloud computing
  78. Topology optimization of computer communication network based on improved genetic algorithm
  79. Implementation of the Spark technique in a matrix distributed computing algorithm
  80. Construction of a financial default risk prediction model based on the LightGBM algorithm
  81. Application of embedded Linux in the design of Internet of Things gateway
  82. Research on computer static software defect detection system based on big data technology
  83. Study on data mining method of network security situation perception based on cloud computing
  84. Modeling and PID control of quadrotor UAV based on machine learning
  85. Simulation design of automobile automatic clutch based on mechatronics
  86. Research on the application of search algorithm in computer communication network
  87. Special Issue: Artificial Intelligence based Techniques and Applications for Intelligent IoT Systems
  88. Personalized recommendation system based on social tags in the era of Internet of Things
  89. Supervision method of indoor construction engineering quality acceptance based on cloud computing
  90. Intelligent terminal security technology of power grid sensing layer based upon information entropy data mining
  91. Deep learning technology of Internet of Things Blockchain in distribution network faults
  92. Optimization of shared bike paths considering faulty vehicle recovery during dispatch
  93. The application of graphic language in animation visual guidance system under intelligent environment
  94. Iot-based power detection equipment management and control system
  95. Estimation and application of matrix eigenvalues based on deep neural network
  96. Brand image innovation design based on the era of 5G internet of things
  97. Special Issue: Cognitive Cyber-Physical System with Artificial Intelligence for Healthcare 4.0.
  98. Auxiliary diagnosis study of integrated electronic medical record text and CT images
  99. A hybrid particle swarm optimization with multi-objective clustering for dermatologic diseases diagnosis
  100. An efficient recurrent neural network with ensemble classifier-based weighted model for disease prediction
  101. Design of metaheuristic rough set-based feature selection and rule-based medical data classification model on MapReduce framework
Heruntergeladen am 17.11.2025 von https://www.degruyterbrill.com/document/doi/10.1515/jisys-2022-0055/html
Button zum nach oben scrollen