<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Fingerprint Liveness Detection via Learning Multi-Modal Deep Features</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Chengsheng</forename><surname>Yuan</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">School of Computer and Software</orgName>
								<orgName type="institution">Nanjing University of Information Science and Technology</orgName>
								<address>
									<postCode>210044</postCode>
									<settlement>Nanjing</settlement>
								</address>
							</affiliation>
							<affiliation key="aff1">
								<orgName type="department" key="dep1">Engineering Research Center of Digital Forensics</orgName>
								<orgName type="department" key="dep2">Ministry of Education</orgName>
								<orgName type="institution">Nanjing University of Information Science and Technology</orgName>
								<address>
									<postCode>210044</postCode>
									<settlement>Nanjing</settlement>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Mingyu</forename><surname>Chen</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">School of Computer and Software</orgName>
								<orgName type="institution">Nanjing University of Information Science and Technology</orgName>
								<address>
									<postCode>210044</postCode>
									<settlement>Nanjing</settlement>
								</address>
							</affiliation>
							<affiliation key="aff1">
								<orgName type="department" key="dep1">Engineering Research Center of Digital Forensics</orgName>
								<orgName type="department" key="dep2">Ministry of Education</orgName>
								<orgName type="institution">Nanjing University of Information Science and Technology</orgName>
								<address>
									<postCode>210044</postCode>
									<settlement>Nanjing</settlement>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Fingerprint Liveness Detection via Learning Multi-Modal Deep Features</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">FD0A8DD1EAED000895180AB247A7F5CF</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T11:13+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Fingerprint Liveness Detection</term>
					<term>CNN</term>
					<term>Genetic Algorithm</term>
					<term>Multi-Modal</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>With the widespread application of fingerprint identification systems, fraudulent attacks based on forged fingerprints have gradually increased, so it is very important to distinguish the authenticity of fingerprints. Fingerprint liveness detection technology was proposed to slove this problem. In order to effectively integrate advantages of existing algorithms, this paper proposes an adaptive feature optimization module filtering distinctive multi-modal features. Firstly, we extract the ROI of fingerprint images and unify them to the same size as subsequent input. Secondly, three convolutional neural networks(CNN)-AlexNet, VGG16 and ResNet, are trained through processed images, whose the last fully connected layer as fingerprint feature. Then genetic algorithm is used to assign different weights to extracted features through these networks, which retain distinctive parts and eliminate invalid parts. Finally, considering that the features are extracted from CNN, optimized features are input to the fully connected layer, and then fake fingerprints are identified by softmax function. Experiments show that when feature dimensions of three networks output are 512, feature optimization module proposed can improve the detection accuracy by an average of 1.0% in the 2011 Livdet database, which finds out the more different parts of features extracted by the multi-modal network, enhancing fingerprint liveness detection performance.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>In a highly information-based modern society, people often need to use passwords for identity authentication to obtain access to various accounts. Therefore, the password has become direct target of numerous hackers <ref type="bibr" target="#b0">[1]</ref>. News about economic losses of users caused by theft of various passwords is endless, which means this traditional identity authentication scheme has serious security risks. In order to solve this problem, many new methods have been proposed and adopted, such as USB KEY, SMS password, dynamic password, etc. Among them, the authentication method based on biometrics has been favored by people. Compared with other identity authentication methods, this method is simple, fast and reliable, so it has been used widely in all aspects of people's social life. For instance, lots of business units check attendance of employees through fingerprint, customs in many countries will utilize fingerprints to authenticate immigrants, and smartphones use fingerprints to authenticate their identity or achieve quick payment <ref type="bibr" target="#b1">[2,</ref><ref type="bibr" target="#b2">3,</ref><ref type="bibr" target="#b3">4,</ref><ref type="bibr" target="#b4">5]</ref>.</p><p>However, fingerprint authentication also has certain security risks <ref type="bibr" target="#b5">[6]</ref>. For the one hand, human fingerprints are easily stolen and counterfeiters can imitate user fingerprints to achieve illegal authentication; For the other hand, people also can copy fake fingerprints for themselves to deceive the attendance system, as shown in Fig. <ref type="figure" target="#fig_0">1</ref>. These fake fingerprints can be made of silica gel, gelatin, EcoFlex, Modasil and other materials. In addition, with the development of deep learning technology, generative adversarial network can also generate sufficiently realistic fingerprint images. Forged fingerprint attacks are one of the biggest threats to fingerprint identification systems, which greatly reduce the reliability of the system and put users' private information at risk. Hence, as an important auxiliary algorithm of finger-print identification system to identify authentic fingerprints, fingerprint liveness detection has become an academic research hotspot now.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Related Work</head><p>Nowadays, fingerprint liveness detection(FLD) algorithms are mainly divided into two categories: hardware-based FLD and software-based FLD <ref type="bibr" target="#b6">[7]</ref>. The former uses additional professional equipment to identify the authenticity of fingerprint images by measuring skin temperature, conductivity, blood pressure, blood oxygen and other vital signs. Although this method can achieve great detection accuracy, expensive equipment is easy for illegal users to find loopholes because of single identification method. With image processing technology, the latter analyze the difference between real and fake fingerprint images for identification. Compared with the former, the latter is more flexible, save costs, simplify operations and minimize additional equipment <ref type="bibr" target="#b7">[8,</ref><ref type="bibr" target="#b8">9,</ref><ref type="bibr" target="#b9">10]</ref>. Therefore, this method is also the current research focus of fingerprint liveness detection. Existing software-based algorithms can be divided into three categories: traditional FLD, FLD based on texture features and FLD based on deep learning.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1.">Traditional FLD</head><p>The traditional fingerprint liveness detection algorithm designs an descriptor to extract distinctive features between real and fake fingerprint images through the heuristic algorithm. FLD based on sweat hole is the earliest proposed fingerprint liveness detection algorithm. While recognizing high-resolution fingerprint images, the quality of artificial fingerprint images is often worse than that of the real. On account of rougher surface, detail of fake fingerprints is much weaker than the real. In consequence, Moon <ref type="bibr" target="#b10">[11]</ref> et al proposed an idea of FLD based on image quality, which denoises and reconstructs fingerprint images by wavelet. The noise residuals between reconstructed and original images are calculated to authenticate fingerprints. When the finger presses and rotates on the sensor, real fingerprints can produce better elastic deformation than the fake. In consequence, Antonelli <ref type="bibr" target="#b11">[12]</ref> et al proposed FLD based on fingerprint skin elastic deformation for the first time. In the process of imitating fingerprints, sweat holes on the ridge of the finger's epidermis are difficult to replicate. Accordingly, FLD based on sweat holes is proposed. Manivanan <ref type="bibr" target="#b12">[13]</ref> et al used a high-pass filter to extract effective sweat hole features and a correlation filter to locate sweat holes.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2.">FLD based on texture features</head><p>Although fingerprint texture cannot be distinguished by human eyes, it is a common feature in fingerprint images and represented by the gray distribution of center pixels and neighboring pixels. Common texture feature descriptors include Local Binary Pattern(LBP) <ref type="bibr" target="#b13">[14]</ref>, Binary Statistical Image Feature(BSIF) <ref type="bibr" target="#b14">[15]</ref>, Local Phase Quantization(LPQ) <ref type="bibr" target="#b15">[16]</ref>, Histogram of Gradient Direction(HOG) <ref type="bibr" target="#b16">[17]</ref>, etc. Jhat <ref type="bibr" target="#b17">[18]</ref> et al proposed FLD based on gray-level independence to verify and distinguish the liveness of fingerprints. Yuan <ref type="bibr" target="#b18">[19]</ref> et al calculated parameters of the co-occurrence matrix as features of the fingerprint image to authenticate fingerprints.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.3.">FLD based on deep learning</head><p>According to different classification tasks, deep neural networks can complete complex mapping and feature extraction through self-learning, which is simpler. Nogueira <ref type="bibr" target="#b19">[20]</ref> et al introduced Convolutional Neural Network (CNN) technology to fingerprint liveness detection. They designed a random model based on CNN as the feature extractor, took the preprocessed images as the input and obtained the best detection results at the time. While achieving better accuracy, CNN models also have some shortcomings. For example, a fixedscale input image must be used in the input layer. Although cropping or scaling can solve the scale problem well, they can easily lead to the loss of some key texture information and reduction of image resolution, thereby weakening the generalization performance. To solve this problem, Yuan <ref type="bibr" target="#b20">[21]</ref> et al proposed a scale-equalized deep convolutional neural network (DCNNISE) model utilizing the retained subtle texture information to further improve the detection performance of forged fingerprints. Moreover, the confusion matrix was applied to FLD as performance indicator in the performance evaluation for the first time. Zhang <ref type="bibr" target="#b21">[22]</ref> et al further found that CNN model used for multi-classification of natural images cannot obtain good accuracy in fingerprint liveness detection, because it ignored the difference between natural and fingerprint images and the shallower network structure cannot mine deep features of fingerprints. Therefore, they proposed a lightweight but powerful network structure Slim-ResCNN.At present, Agarwal S <ref type="bibr" target="#b22">[23]</ref> et al found that existing FLD algorithms performed well when test dataset and train dataset sample distribution are the same, but result of cross-sensor fingerprint liveness detection is bad. In order to enhance the generalization, robustness and operability of FLD algorithm, they believed that the learning model need be adaptive to the data and proposed a general EaZy model. This adaptability in the context of cross-sensor datasets embodies significant advantages.</p><p>In this paper, the main contributions are summarized as follows:</p><p>(1) Multimodal fingerprint feature extraction According to different classification tasks, CNNs can complete complex mapping through self-learning and extract high-level features of image. However, due to various depth and architecture of CNNs, the characteristics of real and fake fingerprints extracted by different network models are quite different, making the classifier have stronger performance. In order to integrate the excellent characteristics of multiple CNNs, this paper attempts to use multimodal neural network models to extract various fingerprint features to make the difference between real and fake fingerprints more obvious.</p><p>(2) Genetic optimization module Full concatenation of multi-dimensional features has big defects. In addition, the feature extraction method based on CNN is similar to the black box operation, which means extracted fingerprint features are not known, making it impossible to determine the optimization direction of features. In consequence, genetic algorithm is innovatively utilized to optimize extracted fingerprint feature, which automatically select the obvious distinguishing part, so as to solve the problem of unknown features. By imitating the genetic processes of life, such as crossover, mutation, and selection, the optimal real and fake fingerprint features are found in the fused feature space. Based on the trained CNN feature extractors, initialized feature populations are put into the fully connected layer to calculate the fitness. Through mutation and crossover operators, excellent performance genetic information from parents is inherited and new genes are generated, promoting feature evolution.</p><p>(3) Broad adaptability This paper carried out model training and testing on 8 Livedet Datasets (2011, 2013) <ref type="bibr" target="#b23">[24,</ref><ref type="bibr" target="#b24">25]</ref>. In order to improve the stability and generalization of the trained model, some operations were used to expand the training set, including rotation, brightening and flipping. The experimental results show that the accuracy of fingerprint liveness detection on multiple data sets is significantly improved in the highest accuracy of the modal network, which proves the effectiveness and wide adaptability of our model.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Methodology</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1.">Multimodal Deep Feature Learning</head><p>Without expert knowledge, deep neural networks have ability to automatically learn pixel distribution of image. By narrowing the gap between model output and label, model parameters are updated until they converge to a certain limit, thereby completing the complex mapping from two-dimensional images to one-dimensional features. The high-level features extracted by the deep neural network are excellent discriminativeness, showing amazing performance in image recognition and classification. In the field of fingerprint liveness detection, CNN models can also achieve good identification results and become a research hotspot in this area, such as AlexNet, VGG16, ResNet, etc. These networks have many differences in the depth level of the model or the width level of the convolutional layer, and the learned fingerprint features will also be multifarious. In order to make full use of the merits of various networks, this paper concatenates features of multiple convolutional networks as general features of model reducing difficulty of forged fingerprint detection.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Population Initiaztion</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Calculate</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Fitness Selection Crossover Mutation</head><p>Get Best Feature</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Figure 3: Genetic optimization module in our method</head><p>In the field of FLD, some scholars believe that to alleviate the shortage of target samples, transfer learning needs to be applied to the model. <ref type="bibr" target="#b25">[26]</ref> They use 1.2 million ImageNet images (source task) to pre-train the convolutional network, and stochastic gradient descent is used to optimize error losses. After training, all trained parameters of the convolutional layer in the source task are transferred to FLD. However, we think that this approach still loses part of the characteristics of the fingerprint image, so the pre-training step should be abandoned. We select three classic CNNs--AlexNet, VGG16 and ResNet, as feature extractors, hoping to get features with different concerns. After training the CNN, freeze network parameters and take out the penultimate fully connected layer as extracted features. Since the different dimensions of this layer will affect the output, fewer features are difficult to support the classification of true and false fingerprints. In addition, more features can also make model training difficult and key features cannot be extracted. Therefore, we selected multiple dimensions for experimentation, such as 256, 512 and 1024.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2.">Genetic Algorithm</head><p>Because excessive features will cause dimensional disasters, it is obviously not advisable to perform fully connected operations for multiple features <ref type="bibr" target="#b26">[27]</ref>. If only some of the features are selected to construct the model, the difficulty of the learning task can be reduced and the interpretability of the model can also be increased. However, how to filter and process these characteristics is a big problem. Traditional feature selection algorithms are proposed by researchers based on the analysis of feature defects. For neural networks, unascertainty of feature extraction process masks the source of the feature. Genetic algorithms can adaptively find better solutions from the feature space, without other selection algorithms. Better features are highlighted after a series of biologically inspired operations, such as crossover, mutation, and selection.</p><p>The genetic algorithm mainly includes five steps, as shown in fig. <ref type="figure">3</ref>. Firstly, with value of 0or 1, 𝑁 chromosomes are randomly generated as the initial population, which is the same as feature length. 0 means discarding the corresponding location feature value, and 1 means selecting. Secondly, the single-layer fully connected layer as a classifier, the characteristics of the fingerprint image at the corresponding position of the chromosome are separated for train and evaluation. Record the classification accuracy of the test set as fitness. Thirdly, every chromosome in the existing population is selected as the parent chromosome with evolutionary probability to produce offspring. The evolution probability calculation formula is as follows:</p><formula xml:id="formula_0">𝑃 𝑖 = 𝐹 𝑖 − 𝑀 ∑ 𝑁 𝑖=0 (𝐹 𝑖 − 𝑀) ,<label>(1)</label></formula><p>where 𝐹 𝑖 is the fitness of the 𝑖 𝑡ℎ chromosome, 𝑁 is the number of chromosomes, 𝑃 𝑖 is the probability that the 𝑖 𝑡ℎ chromosome is selected, and M is the fitness penalty value.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Algorithm 1 Multimodal feature weight learning</head><p>Input: The dataset of fingerprint 𝐷; The size of initial population 𝑁 ; The fitness penalty value 𝑀; The maximum number of iterations 𝑇 ; Output: In 𝑇 generation, the feature chromosome with the greatest fitness; 1: Population Initizlization: Initialize 𝑁 chromosomes with a length of 𝑆, the value of which is randomly generated 0 or 1; 2: for 𝑖 = 1, ⋯ , 𝑇 do -ome is reinitializedor reversed randomly.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>6:</head><p>Crossover: Two parents are selected from 7:</p><p>the population for single-point crossover 8:</p><p>to produce new offspring. -lty value 𝑀 is used as the new fitness. The -ability of individual, which means poorly <ref type="bibr">17:</ref> adapted are more likely to be eliminated.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>18: end for</head><p>The way where the proportion of the fitness of individual chromosomes in the population is as the evolution probability is called the roulette wheel algorithm. Due to the high accuracy of the sub-network in the model, the chromosomes with higher fitness cannot obtain an advantage under the roulette wheel algorithm. So we take the lowest precision in the sub-network as a penalty value, and highlight the gap between chromosomes by introducing a fitness penalty value. Through roulette wheel selection, chromosomes with high fitness are more likely to be retained as parental chromosomes, whose structural information is passed on to the offspring. Fourthly, on the basis of inheriting parental chromosomes, offspring chromosomes will have mutations in a certain length of gene encoding. Some randomly generated or inverted gene codes replace the original part with a certain probability, which means that certain features are reselected. The mutation of gene coding provides the possibility of population evolution. Finally, the roulette wheel selection method is utilized to select parents with greater fitness for crossover from population. Cut off the two parental chromosomes (divided into upper and lower parts) at the same position, and exchange the upper parts to form two brand-new chromosomes. Each chromosome inherits powerful genes from both parents. After the gene mutation and crossover of the 𝑡 𝑡ℎ generation, many offspring will be produced and combined with the parental chromosomes to form a new population. The 𝑘 chromosomes with the highest fitness are selected as the (𝑡 + 1 𝑡ℎ ) generation population and continue to evolve until the set generation threshold is reached. Choose the best-performing individual as the optimal solution. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Experiments</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2.">Performance evaluation ctiteria</head><p>In the field of fingerprint liveness detection, the average classification error (ACE) is a widely accepted evaluation standard. The ACE is defined as the average value of false reject rate (FRR) and false accept rate (FAR), calculated as Eq.( <ref type="formula" target="#formula_1">2</ref>).</p><formula xml:id="formula_1">𝐴𝐶𝐸 = 𝐹 𝑅𝑅 + 𝐹 𝐴𝑅 2 ,<label>(2)</label></formula><p>Based on the original VGG16, AlexNet and ResNet18 models, the final fully connected layer are set to 512 dimensions.Through four different operations (small angle rotation, flip, zoom, and brightness), dataset is enhanced to train each sub-network (15 training epochs with learning rate 0.0002). Then, freeze the network parameters as the feature extractor of our model. Next, the genetic algorithm is implemented in the fingerprint features extracted by the above-mentioned subnetwork to find the parts with significant differences. We set the initial population size N to 10, the maximum evolutionary generation T to 20, and the mutation probability of each chromosome to 0.05. According to the roulette algorithm to determine the probability of each chromosome being selected as a parent, all parents have a 50% probability of crossover operations with other parents. In the selection operation, the roulette algorithm is still used to eliminate individuals with lower fitness and maintain the population size N. The experimental results show that the accuracy of FLD is about 1% higher than the highest in the sub-network after screening by genetic algorithm. The three sub-networks selected in this paper have the same structure as in the original paper, except that the dimensions of the final fully connected layer are changed. Table <ref type="table" target="#tab_2">2</ref> shows that the accuracy of the method proposed on the LivDet2011 dataset far exceeds that of other algorithms. Although not every dataset achieves the best accuracy on the LivDet2013 data set, our method is not far from it and the average accuracy also has competitiveness.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Conclusion</head><p>Due to the difference in the depth and architecture of CNN, the fingerprint features extracted by each network are not the same. In order to combine their advantages, this paper concatenated the fingerprint features extracted by multiple CNNs. In addition, the unknown feature of neural network extraction makes it impossible to find the optimization direction of the connection feature. Regarding the issue above, we introduce a FLD algorithm based on multi-modal features, and uses genetic algorithm to optimize these features. Through genetic algorithm, concatenated features are optimized adaptively and the difference features between real and fake fingerprints are deeply mined. The experimental results show that after the optimization of the genetic algorithm, the accuracy of FLD is improved by about 1% on the basis of the highest accuracy of the sub-network. Compared with other FLD algorithms, our method also has better accuracy and stability. </p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: The process of making fake fingerprints. The left picture is collaborative, requiring the cooperation of the user; the right picture is non-cooperative, where fingerprints are forged by stealing fingerprint traces left by the user. Generally, collaborative methods can obtain higher-quality forged fingerprints.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: A flow diagram of FLD via learning multi-modal deep features</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head></head><label></label><figDesc>The original fitness minus pena 14:</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>4.1. Dataset In</head><label></label><figDesc>this paper, LivDet 2011 and 2013 datasets are used to conduct experiments. The entire data set includes 16470 images as the training set and 16439 images as the test set. Six different sensors (Biometrika, CrossMatch, Identix, etc.) are used for image acquisition. The fake fingerprint data set includes 9 different materials (Body-Double, EcoFlex, gelatin, latex, Silgum, WoodGlue, etc.) to make fake fingerprint images. But the scale of the image is different, so it is very necessary to unify the size of the image. This paper solves the traditional operations that require cropping and zooming through ROI operations.The specific information of LivDet Datasets is shown in the following table:</figDesc><table /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>Table 1</head><label>1</label><figDesc>Details of the LivDet datasets.</figDesc><table><row><cell>Dataset</cell><cell>Sensor</cell><cell>train/test</cell><cell>Image size</cell></row><row><cell></cell><cell cols="3">Biometrika(Bio) 2000/2000 312×372</cell></row><row><cell>LivDet2011</cell><cell cols="3">DigitalPersona(Dig) 2004/2000 355×391 Italdata(Ita) 2000/2000 640×480</cell></row><row><cell></cell><cell>Sagem(Sag)</cell><cell cols="2">2016/2036 352×384</cell></row><row><cell></cell><cell cols="3">Biometrika(Bio) 2000/2000 312×372</cell></row><row><cell>LivDet2013</cell><cell cols="3">Italdata(Ita) Crossmatch(Cro) 2250/2250 800×750 640×480</cell></row><row><cell></cell><cell>Swipe(Swi)</cell><cell cols="2">2200/2153 208×1500</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_2"><head>Table 2</head><label>2</label><figDesc>The Average Classification Error of different models when datasets are LivDet2011 and LivDet 2013 repectively. Natural Science Foundation under grant BK20200807; by the Research Startup Foundation of NUIST 2020r015; by the Canada Research Chair Program and the NSERC Discovery Grant; by the Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD) fund; by the Collaborative Innovation Center of Atmospheric Environment and Equipment Technology (CICAEET) fund, China.</figDesc><table><row><cell>Dataset</cell><cell>Model</cell><cell cols="4">The Average Classification Error ACE in (%)</cell><cell></cell></row><row><cell></cell><cell></cell><cell>Bio</cell><cell>Dig</cell><cell>Ita</cell><cell>Sag</cell><cell>Average</cell></row><row><cell></cell><cell>Ours</cell><cell>1.1</cell><cell>1.8</cell><cell>7.4</cell><cell>3.2</cell><cell>3.3</cell></row><row><cell></cell><cell>VGG16 [31]</cell><cell>2.1</cell><cell>2.6</cell><cell>8.4</cell><cell>4.4</cell><cell>4.3</cell></row><row><cell></cell><cell>AlexNet [31]</cell><cell>3</cell><cell>5.9</cell><cell>18.7</cell><cell>5.9</cell><cell>8.3</cell></row><row><cell>LivDet2011</cell><cell>ResNet18 [33] CNN [28]</cell><cell>3.5 9.2</cell><cell>4.2 1.35</cell><cell>13.3 12.35</cell><cell>6 6.1</cell><cell>6.7 7.2</cell></row><row><cell></cell><cell>DRN [29]</cell><cell>9.6</cell><cell>1.9</cell><cell>13.5</cell><cell>6.4</cell><cell>7.8</cell></row><row><cell></cell><cell>MBLTP [32]</cell><cell>9.7</cell><cell>7.0</cell><cell>16.0</cell><cell>10.9</cell><cell>10.9</cell></row><row><cell></cell><cell>RWG [34]</cell><cell>5.7</cell><cell>6.2</cell><cell>9.4</cell><cell>3.14</cell><cell>6.11</cell></row><row><cell></cell><cell>LQF [35]</cell><cell>7.4</cell><cell>5.6</cell><cell>11.4</cell><cell>6.7</cell><cell>7.8</cell></row><row><cell></cell><cell></cell><cell>Bio</cell><cell>Cro</cell><cell>Ita</cell><cell>Swi</cell><cell>Ave</cell></row><row><cell></cell><cell>Ours</cell><cell>2.8</cell><cell>12.6</cell><cell>0.7</cell><cell>4.8</cell><cell>5.2</cell></row><row><cell></cell><cell>VGG16 [31]</cell><cell>3.1</cell><cell>37.4</cell><cell>1.1</cell><cell>6</cell><cell>11.9</cell></row><row><cell></cell><cell>AlexNet [31]</cell><cell>5.6</cell><cell>15</cell><cell>1.3</cell><cell>5.9</cell><cell>6.9</cell></row><row><cell>LivDet2013</cell><cell>ResNet18 [33] CNN [28]</cell><cell>5.1 4.35</cell><cell>10.8 7</cell><cell>4.5 1.4</cell><cell>6.9 5.1</cell><cell>6.8 4.4</cell></row><row><cell></cell><cell>DBN [30]</cell><cell>1.15</cell><cell>7.91</cell><cell>1.35</cell><cell>6.5</cell><cell>4.2</cell></row><row><cell></cell><cell>RWG [34]</cell><cell>0.6</cell><cell>-</cell><cell>0.85</cell><cell>3.2</cell><cell>1.55</cell></row><row><cell></cell><cell>LQF [35]</cell><cell>5.8</cell><cell>5.2</cell><cell>4.3</cell><cell>14.2</cell><cell>7.4</cell></row><row><cell></cell><cell>DCMBP [36]</cell><cell>0</cell><cell>10.62</cell><cell>0.85</cell><cell>15.65</cell><cell>6.78</cell></row><row><cell cols="3">grant 2018YFB1003205; by the Jiangsu Basic Research</cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>Programs-</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row></table></figure>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Acknowledgement</head><p>In this paper, the two authors have equally important contributions. This work is supported by the National Key R&amp; D Program of China under</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">-Fingerprint liveness detection competition</title>
		<author>
			<persName><forename type="first">D</forename><surname>Yambay</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Ghiani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Denti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">L</forename><surname>Marcislis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Roli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Schuckers</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Liv</forename><surname>Det</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Iapr International Conference on Biometrics</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2011-04">2011. 2011. April 2012</date>
			<biblScope unit="page" from="208" to="215" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Multi-scale local binary pattern with filters for spoof fingerprint detection</title>
		<author>
			<persName><forename type="first">X</forename><surname>Jia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Yang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Cao</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information Sciences: an International Journal</title>
		<imprint>
			<biblScope unit="volume">268</biblScope>
			<biblScope unit="page" from="91" to="102" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<monogr>
		<title level="m" type="main">Handbook of fingerprint recognition</title>
		<author>
			<persName><forename type="first">D</forename><surname>Maltoni</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Maio</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A K</forename><surname>Jain</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2009">2009</date>
			<publisher>springer</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Presentation attack detection methods for fingerprint recognition systems: a survey</title>
		<author>
			<persName><forename type="first">C</forename><surname>Sousedik</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Busch</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Biometrics Iet</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="219" to="233" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<monogr>
		<title level="m" type="main">Handbook of fingerprint recognition</title>
		<author>
			<persName><forename type="first">D</forename><surname>Maltoni</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Maio</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A K</forename><surname>Jain</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2009">2009</date>
			<publisher>Springer Science &amp; Business Media</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Spoofing and anti-spoofing measures</title>
		<author>
			<persName><forename type="first">S</forename><surname>Schuckers</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information Security Technical Report</title>
		<imprint>
			<biblScope unit="volume">7</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="56" to="62" />
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Texture and wavelet-based spoof fingerprint detection for fingerprint biometric systems Emerging Trends in Engineering and Technology</title>
		<author>
			<persName><forename type="first">B</forename><surname>Nikam</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Agarwal</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">First International Conference on. IEEE</title>
				<imprint>
			<date type="published" when="2008">2008. 2008</date>
			<biblScope unit="page" from="675" to="680" />
		</imprint>
	</monogr>
	<note>ICETET&apos;08</note>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">A wavelet-based approach to detecting liveness in fingerprint scanners Defense and Security</title>
		<author>
			<persName><forename type="first">S</forename><surname>Abhyankar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Schuckers</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Society for Optics and Photonics</title>
		<imprint>
			<biblScope unit="page" from="278" to="286" />
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<monogr>
		<title level="m" type="main">Detecting liveness in fingerprint scanners using wavelets: Results of the test dataset Biometric Authentication</title>
		<author>
			<persName><forename type="first">S</forename><surname>Schuckers</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Abhyankar</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2004">2004</date>
			<publisher>Springer</publisher>
			<biblScope unit="page" from="100" to="110" />
			<pubPlace>Berlin Heidelberg</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<monogr>
		<title level="m" type="main">Fake finger detection based on thin-plate spline distortion model Advances in Biometrics</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Tian</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Chen</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2007">2007</date>
			<publisher>Springer</publisher>
			<biblScope unit="page" from="742" to="749" />
			<pubPlace>Berlin Heidelberg</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Wavelet based fingerprint liveness detection</title>
		<author>
			<persName><forename type="first">Y S</forename><surname>Moon</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J S</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K C</forename><surname>Chan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Electronics Letters</title>
		<imprint>
			<biblScope unit="volume">41</biblScope>
			<biblScope unit="issue">20</biblScope>
			<biblScope unit="page" from="1112" to="1113" />
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">A New Approach to Fake Finger Detection Based on Skin Distortion</title>
		<author>
			<persName><forename type="first">A</forename><surname>Antonelli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Cappelli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Maio</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Advances in Biometrics, International Conference</title>
				<imprint>
			<publisher>ICB</publisher>
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Automatic detection of active sweat pores of fingerprint using highpass and correlation filtering</title>
		<author>
			<persName><forename type="first">N</forename><surname>Manivanan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Memon</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Balachandran</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Electronics letters</title>
		<imprint>
			<biblScope unit="volume">46</biblScope>
			<biblScope unit="issue">18</biblScope>
			<biblScope unit="page" from="1268" to="1269" />
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Local binary pattern and wavelet-based spoof fingerprint detection</title>
		<author>
			<persName><forename type="first">Agarwal</forename><surname>Nikam</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Biometrics</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="page" from="141" to="159" />
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<monogr>
		<title level="m" type="main">Bsif: Binarized statistical image features Proceedings of the 21st international conference on pattern recognition</title>
		<author>
			<persName><forename type="first">Rahtu</forename><surname>Kannala</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2012">ICPR2012. 2012</date>
			<publisher>IEEE</publisher>
			<biblScope unit="page" from="1363" to="1366" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Fingerprint liveness detection by local phase quantization</title>
		<author>
			<persName><forename type="first">Marcialis</forename><surname>Ghiani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Roli</forename></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 21st International Conference on Pattern Recognition (ICPR2012)</title>
				<meeting>the 21st International Conference on Pattern Recognition (ICPR2012)</meeting>
		<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2012">2012</date>
			<biblScope unit="page" from="537" to="540" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Fingerprint Spoofing Detection using HOG and Local Binary Pattern International</title>
		<author>
			<persName><forename type="first">James</forename><surname>Mohan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Advanced Research in Computer and Communication Engineering</title>
		<imprint>
			<biblScope unit="volume">6</biblScope>
			<biblScope unit="page" from="586" to="593" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Texture and wavelet-based spoof fingerprint detection for fingerprint biometric systems</title>
		<author>
			<persName><forename type="first">Agarwal</forename><surname>Nikam</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">First International Conference on. IEEE</title>
				<imprint>
			<date type="published" when="2008">2008. 2008</date>
			<biblScope unit="page" from="675" to="680" />
		</imprint>
	</monogr>
	<note>ICETET&apos;08</note>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Fingerprint liveness detection using multiscale difference co-occurrence matrix</title>
		<author>
			<persName><forename type="first">Xia</forename><surname>Yuan</surname></persName>
		</author>
		<author>
			<persName><surname>Sun</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Optical Engineering</title>
		<imprint>
			<biblScope unit="volume">55</biblScope>
			<biblScope unit="issue">6</biblScope>
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Fingerprint Liveness Detection Using Convolutional Neural Networks</title>
		<author>
			<persName><surname>Nogueira R F</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">D A</forename><surname>Lotufo</surname></persName>
		</author>
		<author>
			<persName><surname>Machado R C</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Information Forensics &amp; Security</title>
		<imprint>
			<biblScope unit="volume">11</biblScope>
			<biblScope unit="issue">6</biblScope>
			<biblScope unit="page" from="1206" to="1213" />
			<date type="published" when="2016-06">June, 2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Deep Residual Network with Adaptive Learning Framework for Fingerprint Liveness Detection</title>
		<author>
			<persName><forename type="first">C</forename><surname>Yuan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Xia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Sun</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Cognitive and Developmental Systems</title>
		<imprint>
			<biblScope unit="issue">99</biblScope>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
	<note>J</note>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">Slim-ResCNN: A deep Residual Convolutional Neural Network for Fingerprint Liveness Detection</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Shi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Zhan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Access</title>
		<imprint>
			<biblScope unit="issue">99</biblScope>
			<biblScope unit="page" from="1" to="1" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
	<note>J</note>
</biblStruct>

<biblStruct xml:id="b22">
	<monogr>
		<title level="m" type="main">EaZy Learning: An Adaptive Variant of Ensemble Learning for Fingerprint Liveness Detection</title>
		<author>
			<persName><forename type="first">S</forename><surname>Agarwal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">R</forename><surname>Chowdary</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Sourabh</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">LivDet 2011-Fingerprint liveness detection competition 2011</title>
		<author>
			<persName><forename type="first">D</forename><surname>Yambay</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Ghiani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Denti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">L</forename><surname>Marcialis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Roli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Schuckers</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Iapr International Conference on Biometrics</title>
				<meeting><address><addrLine>New Delhi, India</addrLine></address></meeting>
		<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2012-04">April, 2012</date>
			<biblScope unit="page" from="208" to="215" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">Livdet 2013 fingerprint liveness detection competition 2013</title>
		<author>
			<persName><forename type="first">L</forename><surname>Ghiani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Yambay</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Mura</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Tocco</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">L</forename><surname>Marcialis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Roli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Schuckcrs</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Biometrics (ICB), 2013 International Conference on. IEEE</title>
				<imprint>
			<date type="published" when="2013-06">June, 2013</date>
			<biblScope unit="page" from="1" to="6" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<monogr>
		<title level="m" type="main">Transfer Learning of Pre-Trained CNN Models for Fingerprint Liveness Detection</title>
		<author>
			<persName><forename type="first">H</forename><surname>Samma</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Suandi</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<analytic>
		<title level="a" type="main">Evaluating softwarebased fingerprint liveness detection using Convolutional Networks and Local Binary Patterns</title>
		<author>
			<persName><surname>Nogueira R F</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">D</forename><surname>Lotufo</surname></persName>
		</author>
		<author>
			<persName><surname>Machado R C</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Biometric Measurements and Systems for Security and Medical Applications</title>
				<meeting><address><addrLine>Rome, Italy</addrLine></address></meeting>
		<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2015-11">November, 2015</date>
			<biblScope unit="page" from="22" to="29" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<analytic>
		<title level="a" type="main">Deep Residual Network with Adaptive Learning Framework for Fingerprint Liveness Detection</title>
		<author>
			<persName><forename type="first">C</forename><surname>Yuan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Xia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Sun</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Cognitive and Developmental Systems</title>
		<imprint>
			<biblScope unit="issue">99</biblScope>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
	<note>J</note>
</biblStruct>

<biblStruct xml:id="b28">
	<analytic>
		<title level="a" type="main">Fingerprint liveness detection using an improved CNN with image scale equalization</title>
		<author>
			<persName><forename type="first">C</forename><surname>Yuan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Xia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Jiang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Cao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Q</forename><forename type="middle">J</forename><surname>Wu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Sun</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Access</title>
		<imprint>
			<biblScope unit="volume">7</biblScope>
			<biblScope unit="page" from="26953" to="26966" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b29">
	<analytic>
		<title level="a" type="main">Deep belief network based statistical feature learning for fingerprint liveness detection</title>
		<author>
			<persName><forename type="first">S</forename><surname>Kim</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Park</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">S</forename><surname>Song</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Yang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Pattern Recognition Letters</title>
		<imprint>
			<biblScope unit="volume">77</biblScope>
			<biblScope unit="page" from="58" to="65" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b30">
	<analytic>
		<title level="a" type="main">Fingerprint liveness detection using convolutional neural networks</title>
		<author>
			<persName><forename type="first">Rodrigo</forename><surname>Nogueira</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Roberto</forename><surname>Frassetto</surname></persName>
		</author>
		<author>
			<persName><surname>De Alencar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Rubens</forename><forename type="middle">Campos</forename><surname>Lotufo</surname></persName>
		</author>
		<author>
			<persName><surname>Machado</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE transactions on information forensics and security</title>
		<imprint>
			<biblScope unit="volume">11</biblScope>
			<biblScope unit="issue">6</biblScope>
			<biblScope unit="page" from="1206" to="1213" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b31">
	<analytic>
		<title level="a" type="main">Multiscale block local ternary patterns for fingerprint vitality detection</title>
		<author>
			<persName><forename type="first">X</forename><surname>Jia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Yang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Zang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Dai</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Tian</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Zhao</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Conference: Biometrics (ICB), 2013 International Conference on</title>
				<imprint>
			<publisher>ICB</publisher>
			<date type="published" when="2013-06">June, 2013</date>
			<biblScope unit="page" from="1" to="6" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b32">
	<analytic>
		<title level="a" type="main">Inception-v4</title>
		<author>
			<persName><forename type="first">C</forename><surname>Szegedy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Ioffe</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Vanhoucke</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Inception-ResNet and the Impact of Residual Connections on Learning</title>
				<imprint>
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b33">
	<analytic>
		<title level="a" type="main">Rotation-invariant Weber pattern and Gabor feature for fingerprint liveness detection</title>
		<author>
			<persName><forename type="first">Zhihua</forename><surname>Xia</surname></persName>
		</author>
		<author>
			<persName><surname>Lv</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J</title>
		<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b34">
	<analytic>
		<title level="a" type="main">Fingerprint liveness detection using local quality features</title>
		<author>
			<persName><surname>Sharma R P</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Dey</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J]. The Visual Computer</title>
		<imprint>
			<biblScope unit="volume">35</biblScope>
			<biblScope unit="issue">3</biblScope>
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b35">
	<analytic>
		<title level="a" type="main">Difference co-occurrence matrix using BP neural network for fingerprint liveness detection</title>
		<author>
			<persName><forename type="first">C</forename><surname>Yuan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Sun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Q</forename><surname>Wu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J</title>
		<imprint/>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
