2438 - AI Detection
2438 - AI Detection
2438 - AI Detection
Library Malang
2438 - Sidharta
Quick Submit
Quick Submit
LKC
Document Details
Submission ID
trn:oid:::1:2903219264 10 Pages
Download Date
File Name
ICOBAR_A_Systematic_Literature_Review_Fingerp_Sidharta.pdf
File Size
292.6 KB
*3%
Caution: Percentage may not indicate academic misconduct. Review required.
Our testing has found that there is a higher incidence of false positives when the percentage is less than 20. In order to reduce the
likelihood of misinterpretation, the AI indicator will display an asterisk for percentages less than 20 to call attention to the fact that
the score is less reliable.
However, the final decision on whether any misconduct has occurred rests with the reviewer/instructor. They should use the
percentage as a means to start a formative conversation with their student and/or use it to examine the submitted assignment in
greater detail according to their school's policies.
Non-qualifying text, such as bullet points, annotated bibliographies, etc., will not be processed and can create disparity between the submission highlights and the
percentage shown.
In a longer document with a mix of authentic writing and AI generated text, it can be difficult to exactly determine where the AI writing begins and original writing
ends, but our model should give you a reliable guide to start conversations with the submitting student.
Disclaimer
Our AI writing assessment is designed to help educators identify text that might be prepared by a generative AI tool. Our AI writing assessment may not always be accurate (it may misidentify
both human and AI-generated text) so it should not be used as the sole basis for adverse actions against a student. It takes further scrutiny and human judgment in conjunction with an
organization's application of its specific academic policies to determine whether any academic misconduct has occurred.
Abstract. The illustrated study delves further into the topic of deep learning
in fingerprint recognition, focusing on writing dated between 2019 and
2024. Key examples and disclosures were discovered through rigorous steps
of inspection, approval, examination, extraction, and blending, revealing
insights into the feasibility and advancements in this sector. With 22 studies
demonstrating its proficiency in tackling the complexities of fingerprint
authentication tasks, Convolutional Neural Networks (CNN) emerged as a
significant focal point. Particularly, CNNs' capacity to process and analyze
image data with exceptional accuracy, ensuring robust performance even in
challenging conditions, demonstrated their adaptability and effectiveness.
LSTM-RNN and Support Vector Machines (SVM) also showed a lot of
utility, highlighting different ways to deal with authentication issues.
Notwithstanding periodic assessment challenges, the chose articles
exhibited importance by laying out clear goals, utilizing sound exploration
philosophies, and yielding exhaustive discoveries. Information blend
uncovered obvious proof of the viability of profound learning approaches in
unique mark confirmation, especially CNN-based models, with great
execution measurements including critical AUC values going from 83% to
86.6%. Extraordinarily, CNN outflanked elective strategies as far as
exactness and mistake rates while managing complex models like
electromyogram (EMG) signals. Since they vow to improve precision,
proficiency, and security across a great many applications and spaces, these
discoveries by and large require the far reaching execution of cutting edge
learning methods in biometric validation frameworks not long from now. By
encouraging innovation in biometric authentication technologies, this
research contributes to the achievement of Sustainable Development Goal 9
(SDG 9) objectives for resilient infrastructure and inclusive societies.
1. INTRODUCTION
Our regular routines has expanded the requirement for solid and secure individual
verification components. Fingerprints, with their uniqueness and perpetual quality, have
arisen as a trailblazer in biometric confirmation. Biometric acknowledgment is the
methodology that involves the greater part of the recognizable proof elements [1]. Biometrics
can be either a physiological quality, for example, iris [2, 3], face [4], palm [5, 6], ear [7],
finger surface, impression and unique finger impression, or a social characteristic such as
signature, penmanship, step and voice. Profound learning calculations have the remarkable
capacity to extricate complex examples from a lot of informasi. These qualities make them
especially fit to the errand of unique mark acknowledgment, where little things-the trademark
edges and forks in fingerprints-hold the way to ID. By utilizing profound learning
engineering, finger impression acknowledgment frameworks can accomplish better
execution thought about than customary strategies. This paper digs into the entrancing
universe of unique finger impression acknowledgment utilizing profound learning. We start
with a fundamental outline of unique mark acknowledgment innovation, framing the
essential standards and constraints of traditional methodologies. Then, we leave on an
excursion into the brilliant universe of profound picking, making sense of its central ideas
and explicit applications in unique mark acknowledgment.. A significant part of this paper is
a top to bottom assessment of the benefits acquired by applying profound learning in finger
impression acknowledgment. We will cautiously take apart the enhancements in exactness,
commotion heartiness, and capacity to deal with complex unique finger impression varieties.
This conversation will be supplemented by a basic examination of the intrinsic difficulties
and potential impediments related with profound learning-based unique finger impression
acknowledgment frameworks. To give an all encompassing point of view, we will cautiously
survey existing examinations in this zone. We will feature the imaginative advances made
lately, featuring the state of the art profound learning procedures that are driving the field
forward. Moreover, we will investigate the future, investigating promising examination
bearings that can possibly additionally reform unique mark acknowledgment utilizing
profound learning.
2. METHODOLOGY
This study aims to conduct a systematic literature review (SLR). Finding, assessing, and
synthesizing literature reviews that are appropriate for study questions or themes is done
Page 4 of 12 - AI Writing Submission Submission ID trn:oid:::1:2903219264
Page 5 of 12 - AI Writing Submission Submission ID trn:oid:::1:2903219264
using the systematic literature review (SLR) research approach. This SLR method's primary
goal is to locate analytical evidence in the body of current literature for use in future research,
policy creation, and decision-making. Steps that are related to the Kitchenham and Cochrane
narrative synthesis techniques are employed by our group[8]. The procedures are shown in
Figure 1.
1) RQ1: What are the predominant deep learning algorithms commonly utilized across
the compiled articles for fingerprint recognition?
2) RQ2: To what extent do deep learning methodologies exhibit efficacy in the realm
of fingerprint recognition relative to conventional approaches, as indicated by the
literature?
3) RQ3: How do variations in dataset characteristics impact the performance of deep
learning models for fingerprint recognition?
The papers we have retrieved are eliminated throughout the Study Selection process.
Articles that are identical or duplicates are removed, as well as inappropriate articles. The
inclusion criteria will include publications that correspond to the title of our systematic
literature review, while the exclusion criteria will include papers that do not correspond to
the title of our systematic literature review.
1. The Inclusion Criteria
- The article is composed in the English language.
- The article is available for open access
- The article appears in conference proceedings or a scientific journal
- The article is a whole paper
- The article was released between 2019 and 2024.
2. The Exclusion Criteria
- The article does not satisfy the search criteria.
- The paper neglects to explain the deep learning architecture utilized.
- Articles in the systematic literature review (SLR)
- Retraction of the article
The chosen articles will be inspected during the Quality Examination stage preceding
being summarized to isolate the significant data. This quality evaluation will probably survey
and find the article's level of significant worth. The quality assessment's actions were changed
from Zuiderwijk et al. [8] and laid out on thoughts made by Kitchenham and Agreements.
Among these requirements are:
- The entire research method is explained.
- A specified dataset and architecture are included in the study methodology.
- Well-defined goals for the research.
- The results of the investigation were clear.
- The findings of the research are stated in detail.
The genuine summed-up information will be utilized to address the appraisal demands in
the Information Extraction Stage. Various pieces of data are expeditiously cleared out,
uniting the going with the methodology, feature extraction, dataset, year of stream, creator
name, and title. High precision is all around ordinary for extra information to take out the
huge data, like the strategy's deficiency, the assessment's next execution, and the openings of
the driven study. The separated data is then used for information blend.
The collected data will be used in the Data Mixture Stage to wrap up the survey procedure.
We use story blend, which is changed from the Cochrane technique [9], for data mix. We
eliminated critical data that was presented as a summary. To work with our response to the
investigation questions, we have composed the summary outcomes into a Succeed table.
Likewise, the aftereffects of the pursuit procedure, focus on assurance, quality appraisal, and
data extraction will be utilized to address the assessment questions.
Because of time imperatives, we led our hunt exclusively inside one information base,
choosing Scopus for its thorough pursuit functionalities. Our pursuit interaction involved the
usage of explicit watchwords connected with our examination subject, trailed by refinement
to meet foreordained rules. These measures incorporated the necessity for articles to be open-
access, distributed somewhere in the range of 2019 and 2024, and obtained from scientific
journal or conference proceedings. The results of this search try have been arranged and are
introduced in Table 1 for reference.
We select given the consideration and rejection rules illustrated in segment 2.3 (Study
Selection) for the review choice discoveries. Segment 3.1 (Search Process Results) has
applied incorporation and rejection standards. While utilizing the Scopus search devices, the
accompanying measures were applied: incorporation rules no. 2, 3, and 5 (The article is
available for open access, appears in conference proceedings or a scientific journal, was
released between 2019 and 2024.). Thus, the list items in Table 1 straightforwardly satisfied
the consideration rules no. 2, 3, and 5.
We will confine our discussion to the thought and dismissal models that were not used in
Section 3.1. Several of these essentials are the thought principles numbered 1 and 4 (the
article is written in English and is a completed paper) and every preclusion condition kept in
Section 2.3. 48 articles can be used considering the way that 58 articles failed to meet the
models for dismissal principles no. 1 (The article does not satisfy the search criteria), no. 2
(The paper neglects to explain the deep learning architecture utilized), and no. 3 (Articles in
the systematic literature review (SLR)). Besides, we found a couple of articles that failed to
meet the requirements of dismissal guideline no. 4 (Article is Retracted), with an amount of
11 articles, really proposing that there are 37 articles that we can use. Table 2 shows the
revelations from the survey assurance process.
After applying the specified inclusion and exclusion criteria stated in Section 2.4 (Quality
Assessments), we thoroughly analysed each selected article for relevance and
appropriateness in our thorough Systematic Writing Review. Our review sought to ensure
that severe standards were followed, notably in terms of methodological rigour, dataset
clarity, and presentation of study findings. Interestingly, none of the examined articles had
evident quality flaws. However, we meticulously found methodological errors in several
research and conducted in-depth examinations of the deep learning frameworks employed.
Despite occasional obstacles, each evaluated article demonstrated exceptional quality
standards, necessitating a more in-depth analysis within the scope of our assessment. This
careful quality control technique strengthens the credibility of our Systematic Writing
Review and emphasises our dedication to maintaining scholarly integrity when synthesising
data from the contemporary literature on deep learning in fingerprint recognition.
The "Data Extraction Results" detail an data extraction technique, using Segment 2.5
measures. Table 3 arranges data from appropriations for overview assessment. The
examination is straightforward, thorough, and expects to give an unmistakable
comprehension of finger impression ID.
1) RQ1: What are the predominant deep learning algorithms commonly utilized across
the compiled articles for fingerprint recognition?
separated. The convolutional layers inside CNN structures prevail at feature extraction from
complex finger impression pictures, enabling precise affirmation even inside seeing upheaval
or assortments. Additionally, CNN's adaptability to a variety of extreme scratching
verification scenarios refreshes its appeal and contributes to the favored choice throughout
evaluations. With nine publications arranging this approach, LSTM-RNN (or just RNN)
emerges as the second most popular assessment after CNN. Because LSTM-RNN is overly
long, it is accommodating in locating brief situations among spectacular carving information,
which contributes to its sufficiency in clear authentication efforts. Moreover, five studies
make use of this evaluation to trace down the epic use of Support Vector Machines (SVM).
SVM is a reasonable option for staggering cutting because of its ability to manipulate highly-
layered information and create a ruckus. No matter what the presence of various
computations, for instance, VGG, K-Nearest Neighbors (KNN), and ResNet, clearly CNN's
solidarity stays unmatched in the area of extraordinary finger impression affirmation
research. From Table 4, clearly couple of articles unequivocally take on or use CNN plans,
or adjusted frames thereof, featuring its adaptability and ampleness in watching out for the
uncommon troubles introduced by finger impression affirmation endeavors. One of the
articles that uses the CNN plan (BİLGİN et al., " Biometric Personal Classification with Deep
Learning Using EMG Signals " 2023) [11]. In this paper, it is represented that the significant
learning-based individual affirmation model using Electromyogram (EMG) signals achieved
basic precision levels. The Convolutional Neural Networks (CNN) system yielded a
precision of 95.57%, while the Long Short-Term Memory (LSTM) strategy achieved an
accuracy of 93.88%. In the presented table, it might be seen that CNN outmaneuvers LSTM
in describing EMG data. Besides, it is seen that the use of the Rectified Linear Unit (ReLU)
authorization capacity in the CNN configuration added to the show improvement of the
model. CNN + ReLU yielded a precision of 95.57% and an endorsement accuracy of 72.07%,
while for goofs in the CNN designing, CNN made an error of 49.22% and an endorsement
slip-up of 85.09%. On the other hand, MLP + ReLU achieved an accuracy of 26.32% and an
endorsement precision of 26.88%, while for bumbles in the MLP designing, MLP made a
mix-up of 252.73% and an endorsement error of 247.43%. For LSTM-RNN + ReLU, the
precision came to 75.13%, with an endorsement accuracy of 63.53%, while for botches in
the LSTM-RNN plan, LSTM-RNN made a screw-up of 78.68%, and the endorsement botch
was 107.49%. These data show that CNN is all the more impressive in portraying EMG
signals diverged from LSTM. This asserts that the CNN design is more proper for managing
complex models in EMG signals, and the results frame the capacity of the CNN configuration
in overhauling the security and resolute nature of physiological-based individual affirmation
systems like EMG.
Here is an illustration of the CNN architecture that (Naseer et al., 2022) used [12].
2) RQ2: What amount do significant realizing strategies show suitability in the area of
finger impression affirmation near ordinary techniques, as shown by the
composition?
Page 9 of 12 - AI Writing Submission Submission ID trn:oid:::1:2903219264
Page 10 of 12 - AI Writing Submission Submission ID trn:oid:::1:2903219264
Size of Datasets Medium (Consist of 10,000 samples) limited generalizability and moderate accuracy
Size of Datasets Large (Consist of 100,000 samples) High precision, great generalizability
Dataset Low (samples taken from one Poor generalizability and population bias of the
Diversity population only) model
Dataset Medium (samples taken from a few Less one-sided model, moderate generalizability
Diversity populaces)
Dataset High (samples taken from worldwide Model with no bias and high generalizability
Diversity populace)
Dataset Quality Low (a lot of noise and distortion) Low exactness, shaky model
Dataset Quality Medium (some clamor and antiquities) Moderate exactness, semi-stable model
The size, diversity, and quality of a dataset all significantly impact the performance of
deep learning models for fingerprint recognition. Larger datasets typically lead to higher
accuracy as the model has more information to learn from. However, this can come at the
cost of generalizability if the data lacks diversity. Diverse datasets, encompassing a wider
range of fingerprints, improve the model's ability to perform well on unseen data. On the
other hand, high levels of noise and artifacts in the dataset can hinder both accuracy and
generalizability. To address these quality issues, data preprocessing techniques like noise
removal and standardization can be applied before training the model.
4. CONCLUSION
This study provides a comprehensive overview of significant learning in unique
fingerprint authentication by focusing on articles published between 2019 and 2024. Through
careful chase, assessment, and combination, key models and disclosures are highlighted,
highlighting the sufficiency of Convolutional Neural Networks (CNNs), LSTM-RNN, and
Support Vector Machines (SVMs) in watching out for affirmation challenges. With well-
known papers demonstrating clear goals, robust evaluation strategies, and comprehensive
discoveries, quality evaluation confirms adherence to key norms. Certainly, CNN-based
frameworks perform exceptionally well, with AUC values ranging from 83% to 86.6%,
particularly when dealing with complex examples such as EMG signals. Additionally, our
investigation demonstrates how the model's performance is affected by the characteristics of
the dataset. This proposes that bigger and more differed datasets improve generalizability
and precision. For instance, datasets with 100,000 samples exhibit excellent generalizability
and precision. However, the accuracy and soundness of datasets with noise and mutilation
decrease. These discoveries underline the meaning of integrating broad learning strategies
into impending biometric affirmation systems to improve accuracy, proficiency, and security
across different applications and settings.
REFERENCES
[1] J. Galbally, F. Alonso-Fernandez, J. Fierrez and J. Ortega-Garcia, “A High-Performance
Fingerprint Liveness Detection Method Based on Quality-Related Features,” Future
Generation Computer Systems, vol. 28, no. 1, pp. 311-321, 2012.
[3] M. R. Khalil, M. S. Majeed, and R. R. Omar, “Personal identification with iris patterns,”
AL-Rafidain Journal of Computer Sciences and Mathematics, vol. 6, no. 1, pp.13-26, 2009.
[6] R. Alimuin, E. Dadios, J. Dayao, and S. Arenas, “Deep hypersphere embedding for real-
time face recognition,” TELKOMNIKA Telecommunication Computing Electronics and
Control, vol. 18, no. 3, pp. 1671-1677, 2020.
[9] R. Ryan, “Cochrane Consumers and Communication Review Group: data synthesis and
analysis,” Cochrane Consumers and Communication Review Group, vol. 2013, no. June
2013.
[10] V. Kamble, M. Dale, and V. Bairagi, “A Hybrid Model by Combining Discrete Cosine
Transform and Deep Learning for Children Fingerprint Identification,” International Journal
of Advanced Computer Science and Applications, vol. 14, no. 1, 2023, doi:
10.14569/IJACSA.2023.0140186.