pith. sign in

arxiv: 2605.03830 · v1 · submitted 2026-05-05 · 💻 cs.CV

Identity-Consistent Multi-Pose Generation of Contactless Fingerprints

Pith reviewed 2026-05-07 17:42 UTC · model grok-4.3

classification 💻 cs.CV
keywords contactless fingerprintssynthetic data generationmulti-pose simulationcross-modal matchingfingerprint recognitionidentity preservation3D physics simulationlatent diffusion
0
0 comments X

The pith

IMPOSE synthesizes identity-preserving multi-pose contactless fingerprints from rolled prints to close the cross-modal domain gap.

A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.

The paper proposes IMPOSE as a three-stage framework that starts with latent diffusion to generate rolled fingerprints, then translates them to the contactless modality using local binarization to anchor identity, and finally applies physics-based 3D finger model mapping and projection to create varied poses. This produces synthetic samples that keep the same ridge patterns and align to standard fingerprint coordinates, allowing recognition models to be fine-tuned for better performance on real cross-modal tasks. A sympathetic reader would care because contactless capture avoids hygiene issues and offers flexible acquisition, yet severe pose-induced distortions have limited its practical use in matching against conventional contact-based prints.

Core claim

The IMPOSE framework generates identity-consistent multi-pose contactless fingerprints through rolled-print synthesis via latent diffusion with discrete codebooks, cross-modal translation guided by Sauvola local adaptive binarization as an identity anchor, and physics-based simulation via 3D finger model texture mapping and projection. These samples maintain strict identity consistency at the ridge topology level and spatial alignment with standard fingerprint coordinate space. Fine-tuning fixed-length dense descriptors on the resulting data achieves state-of-the-art cross-modal matching, with equal error rates reduced to 8.74 percent on UWA and 2.26 percent on PolyU CL2CB, while also giving

What carries the argument

IMPOSE three-stage synthesis pipeline that uses Sauvola-based local adaptive binarization as an identity anchor during cross-modal translation and applies 3D finger model texture mapping and projection to produce realistic nonlinear distortions.

If this is right

  • Fine-tuning fixed-length dense descriptors with IMPOSE-synthesized data achieves state-of-the-art cross-modal matching performance.
  • Synthetic data produces consistent gains when applied to other mainstream representations including DeepPrint and AFRNet.
  • The hybrid strategy of combining synthetic and real data for training yields the best overall matching results.
  • The generated samples maintain strict identity consistency at the ridge topology level and spatial alignment with standard fingerprint coordinate space.

Where Pith is reading between the lines

These are editorial extensions of the paper, not claims the author makes directly.

  • The synthesis approach could be extended to generate training data for other biometric tasks that suffer from pose or deformation variations.
  • Unlimited synthetic samples may reduce dependence on large-scale collection of real contactless fingerprint datasets.
  • Incorporating higher-fidelity 3D models or additional physical parameters could further narrow any remaining domain differences.

Load-bearing premise

The physics-based 3D finger model texture mapping and projection must accurately reproduce the nonlinear geometric distortions of real contactless captures while the generated samples preserve exact ridge topology identity and coordinate alignment.

What would settle it

Evaluating models fine-tuned solely on IMPOSE synthetic data against models trained only on real contactless data and finding equal or higher equal error rates on the UWA and PolyU CL2CB test sets would show that the synthesized samples fail to bridge the domain gap.

Figures

Figures reproduced from arXiv: 2605.03830 by Jianjiang Feng, Jie Zhou, Xiongjun Guan, Zhiyu Pan.

Figure 1
Figure 1. Figure 1: Comparison of strategies for improving contactless fin view at source ↗
Figure 2
Figure 2. Figure 2: Overview of the IMPOSE framework for multi-pose contactless fingerprint generation. view at source ↗
Figure 3
Figure 3. Figure 3: Process of rolled fingerprint synthesis with correspond view at source ↗
Figure 4
Figure 4. Figure 4: Comparison of Sauvola binarization against VeriFinger view at source ↗
Figure 6
Figure 6. Figure 6: Illustration of the multi-pose contactless fingerprint simulation pipeline: from 3D model unfolding, pose estimation, and view at source ↗
Figure 7
Figure 7. Figure 7: Illustration of the finger roll projection mechanism view at source ↗
Figure 9
Figure 9. Figure 9: Representative fingerprint samples from the IMPOSE generation framework, spanning rolled fingerprints, contactless view at source ↗
Figure 10
Figure 10. Figure 10: Representative fingerprint samples from the datasets used in IMPOSE experiments. view at source ↗
Figure 11
Figure 11. Figure 11: NFIQ 2.0 quality distribution comparison between view at source ↗
Figure 12
Figure 12. Figure 12: Match score distributions evaluating identity consis view at source ↗
Figure 13
Figure 13. Figure 13: Qualitative comparison of identity consistency under different data alignment strategies for cross-modal fingerprint view at source ↗
Figure 15
Figure 15. Figure 15: Visualization of pose estimation results before and view at source ↗
Figure 14
Figure 14. Figure 14: Generation results of IMPOSE under different con view at source ↗
Figure 18
Figure 18. Figure 18: CMC curves of AFRNet under different fine-tuning view at source ↗
Figure 17
Figure 17. Figure 17: CMC curves of DeepPrint under different fine-tuning view at source ↗
read the original abstract

Contactless fingerprint recognition has gained increasing attention due to its advantages in hygiene and acquisition flexibility. However, the absence of physical contact constraints introduces severe nonlinear geometric distortions caused by free finger poses in 3D space, resulting in a substantial cross-modal domain gap between contactless and conventional contact-based fingerprints. Existing solutions largely rely on explicit geometric correction or image enhancement, which are fragile under extreme pose variations. In this paper, we propose Identity-Consistent Multi-Pose Generation of Contactless Fingerprints (IMPOSE), a physics-inspired framework that synthesizes identity-preserving, multi-pose contactless fingerprint samples to empower recognition models. IMPOSE consists of three stages: (1) rolled fingerprint identity generation via latent diffusion with discrete codebook representations, (2) cross-modal translation from rolled to contactless modality guided by Sauvola-based local adaptive binarization as an identity anchor, and (3) physics-based multi-pose simulation through 3D finger model texture mapping and projection. The generated samples maintain strict identity consistency at the ridge topology level and spatial alignment with standard fingerprint coordinate space. Extensive experiments on the UWA and PolyU CL2CB databases demonstrate that fine-tuning fixed-length dense descriptors (FDD) with IMPOSE-synthesized data achieves state-of-the-art cross-modal matching, reducing EER to 8.74% on UWA and 2.26% on PolyU CL2CB. Synthetic data also yields consistent gains across mainstream representations including DeepPrint and AFRNet, and the hybrid strategy combining synthetic and real data achieves the best overall results. The code and generated samples are available at https://github.com/Yu-Yy/IMPOSE.

Editorial analysis

A structured set of objections, weighed in public.

Desk editor's note, referee report, simulated authors' rebuttal, and a circularity audit. Tearing a paper down is the easy half of reading it; the pith above is the substance, this is the friction.

Referee Report

2 major / 1 minor

Summary. The manuscript proposes IMPOSE, a three-stage physics-inspired framework for synthesizing identity-preserving multi-pose contactless fingerprints: (1) rolled fingerprint generation via latent diffusion with discrete codebook representations, (2) cross-modal translation from rolled to contactless modality using Sauvola-based local adaptive binarization as an identity anchor, and (3) physics-based multi-pose simulation via 3D finger model texture mapping and projection. The generated samples are claimed to maintain strict identity consistency at the ridge topology level and spatial alignment with standard fingerprint coordinate space. Experiments on the UWA and PolyU CL2CB databases show that fine-tuning fixed-length dense descriptors (FDD) with the synthetic data achieves state-of-the-art cross-modal matching (EER 8.74% on UWA, 2.26% on PolyU CL2CB), with consistent gains for DeepPrint and AFRNet representations; the hybrid real-plus-synthetic strategy performs best overall. Code and generated samples are released publicly.

Significance. If the synthetic samples faithfully reproduce the nonlinear geometric distortions of real free-pose contactless captures while preserving identity, the framework would provide a scalable augmentation strategy that narrows the contact-contactless domain gap without requiring large-scale real contactless data collection. The public release of code and generated samples is a clear strength supporting reproducibility.

major comments (2)
  1. [Experimental evaluation] The central performance claims (EER reductions to 8.74% on UWA and 2.26% on PolyU CL2CB) rest on the assertion that the physics-based 3D finger model in stage 3 accurately reproduces real nonlinear distortions (curvature, foreshortening, ridge compression). However, the experimental evaluation provides no quantitative validation metrics—such as pose-angle histograms, local affine distortion statistics, or minutiae displacement errors—comparing the synthetic multi-pose samples against real contactless captures from the same identities. Without these, it is unclear whether the observed gains arise from faithful cross-modal bridging or from generic data augmentation effects.
  2. [Method (stage 2)] The method description states that the generated samples 'maintain strict identity consistency at the ridge topology level,' yet the cross-modal translation stage relies on Sauvola binarization as an anchor without reporting an explicit identity-preservation metric (e.g., minutiae matching score or ridge pattern similarity) between input rolled prints and output synthetic contactless images across the generated pose variations.
minor comments (1)
  1. [Abstract and §3] The abstract and method sections would benefit from a brief table summarizing the key hyperparameters of the latent diffusion model and the 3D projection (e.g., camera angles, finger curvature parameters) to improve reproducibility.

Simulated Author's Rebuttal

2 responses · 0 unresolved

We thank the referee for the constructive and detailed feedback on our manuscript. We have carefully reviewed the major comments and provide point-by-point responses below, including clarifications and commitments to revisions where appropriate.

read point-by-point responses
  1. Referee: [Experimental evaluation] The central performance claims (EER reductions to 8.74% on UWA and 2.26% on PolyU CL2CB) rest on the assertion that the physics-based 3D finger model in stage 3 accurately reproduces real nonlinear distortions (curvature, foreshortening, ridge compression). However, the experimental evaluation provides no quantitative validation metrics—such as pose-angle histograms, local affine distortion statistics, or minutiae displacement errors—comparing the synthetic multi-pose samples against real contactless captures from the same identities. Without these, it is unclear whether the observed gains arise from faithful cross-modal bridging or from generic data augmentation effects.

    Authors: We acknowledge the value of direct quantitative validation for the fidelity of the 3D projection stage. Our primary evidence for the utility of the generated samples remains the consistent EER reductions and gains across multiple representations (FDD, DeepPrint, AFRNet) when fine-tuning with synthetic data, which exceed those from generic augmentation baselines in our experiments. The physics-based 3D finger model follows established anatomical parameters for curvature and projection to simulate realistic distortions. To strengthen the manuscript, we will add in the revision pose-angle histograms derived from the synthetic samples and compare their distribution to real contactless images from the UWA and PolyU CL2CB datasets (via available pose estimation techniques). We will also include local affine distortion statistics computed on ridge patterns. Note that minutiae displacement errors cannot be directly computed without paired ground-truth correspondences, which are unavailable in the datasets. revision: partial

  2. Referee: [Method (stage 2)] The method description states that the generated samples 'maintain strict identity consistency at the ridge topology level,' yet the cross-modal translation stage relies on Sauvola binarization as an anchor without reporting an explicit identity-preservation metric (e.g., minutiae matching score or ridge pattern similarity) between input rolled prints and output synthetic contactless images across the generated pose variations.

    Authors: The Sauvola-based local adaptive binarization in stage 2 is explicitly designed to anchor and preserve the ridge topology and minutiae structure from the input rolled fingerprint during the latent diffusion translation, ensuring identity consistency before the pose simulation stage. While we did not include an explicit numerical metric (such as average minutiae matching scores) in the original submission, the downstream cross-modal matching results provide supporting evidence of preserved identity. In the revised version, we will add a dedicated analysis section reporting minutiae matching scores and ridge pattern similarity metrics between the input rolled prints and the generated contactless images (both pre- and post-pose simulation) to make the identity preservation explicit and quantifiable. revision: yes

Circularity Check

0 steps flagged

No circularity in derivation chain; claims rest on external empirical evaluation

full rationale

The paper describes a three-stage generative pipeline (latent diffusion for rolled prints, Sauvola-guided cross-modal translation, and 3D physics-based pose simulation) whose outputs are then used to fine-tune external recognition models. All reported performance numbers (EER reductions on UWA and PolyU CL2CB) are obtained by training and testing on independent public datasets, with no equations, fitted parameters, or self-citations that reduce the claimed gains to the method's own inputs by construction. The identity-consistency and distortion-modeling assertions are presented as design goals rather than derived predictions, and the evaluation protocol does not invoke any self-referential loop.

Axiom & Free-Parameter Ledger

0 free parameters · 0 axioms · 0 invented entities

Only the abstract is available; the central claim rests on standard assumptions of diffusion models, 3D graphics projection, and identity preservation via ridge topology. No explicit free parameters, new axioms, or invented entities are detailed beyond the high-level method description.

pith-pipeline@v0.9.0 · 5604 in / 1348 out tokens · 86845 ms · 2026-05-07T17:42:46.454114+00:00 · methodology

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Reference graph

Works this paper leans on

40 extracted references · 3 canonical work pages · 1 internal anchor

  1. [1]

    C2CL: Contact to contactless fingerprint matching,

    S. A. Grosz, J. J. Engelsma, E. Liu, and A. K. Jain, “C2CL: Contact to contactless fingerprint matching,”IEEE Transactions on Information F orensics and Security, vol. 17, pp. 196–210, 2021

  2. [2]

    Maltoni, D

    D. Maltoni, D. Maio, A. K. Jain, and J. Feng,Handbook of Fingerprint Recognition. Springer Nature, 2022

  3. [3]

    Synthesis of multi-view 3d fingerprints to advance contactless fingerprint identification,

    C. Dong and A. Kumar, “Synthesis of multi-view 3d fingerprints to advance contactless fingerprint identification,”IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 45, no. 11, pp. 13 134– 13 151, 2023

  4. [4]

    Bridging dimensions in fingerprints to advance distinctiveness: Recovering 3d minutiae from a single contactless 2d fingerprint image,

    ——, “Bridging dimensions in fingerprints to advance distinctiveness: Recovering 3d minutiae from a single contactless 2d fingerprint image,” IEEE Transactions on Pattern Analysis and Machine Intelligence, 2025

  5. [5]

    Monocular 3d fingerprint reconstruction and unwarping,

    Z. Cui, J. Feng, and J. Zhou, “Monocular 3d fingerprint reconstruction and unwarping,”IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 45, no. 7, pp. 8679–8695, 2023

  6. [6]

    Fixed-length dense descriptor for efficient fingerprint matching,

    Z. Pan, Y . Duan, J. Feng, and J. Zhou, “Fixed-length dense descriptor for efficient fingerprint matching,” in2024 IEEE International Workshop on Information F orensics and Security (WIFS). IEEE, 2024, pp. 1–6

  7. [7]

    Fixed-length dense fingerprint representation with alignment and robust enhancement,

    Z. Pan, X. Guan, Y . Duan, J. Feng, and J. Zhou, “Fixed-length dense fingerprint representation with alignment and robust enhancement,”IEEE Transactions on Information F orensics and Security, vol. 21, pp. 1751– 1765, 2026

  8. [8]

    3D fingerprint reconstruction system using feature correspondences and prior estimated finger model,

    F. Liu and D. Zhang, “3D fingerprint reconstruction system using feature correspondences and prior estimated finger model,”Pattern Recognition, vol. 47, no. 1, pp. 178–193, 2014

  9. [9]

    SFinGe: An approach to synthetic fingerprint generation,

    R. Cappelli, D. Maio, and D. Maltoni, “SFinGe: An approach to synthetic fingerprint generation,” inProceedings of the International Workshop on Biometric Technologies (BT), Vigevano, Italy, 2004, pp. 147–154

  10. [10]

    Printsgan: Synthetic finger- print generator,

    J. J. Engelsma, S. Grosz, and A. K. Jain, “Printsgan: Synthetic finger- print generator,”IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 45, no. 5, pp. 6111–6124, 2022

  11. [11]

    Universal fingerprint generation: Controllable diffusion model with multimodal conditions,

    S. A. Grosz and A. K. Jain, “Universal fingerprint generation: Controllable diffusion model with multimodal conditions,”IEEE Transactions on Pattern Analysis and Machine Intelligence, 2024

  12. [12]

    Fpgan-control: A controllable fingerprint generator for training with synthetic data,

    A. Shoshan, N. Bhonker, E. Ben Baruch, O. Nizan, I. Kviatkovsky, J. En- gelsma, M. Aggarwal, and G. Medioni, “Fpgan-control: A controllable fingerprint generator for training with synthetic data,” inProceedings of the IEEE/CVF winter conference on applications of computer vision, 2024, pp. 6067–6076

  13. [13]

    Denoising diffusion probabilistic models,

    J. Ho, A. Jain, and P. Abbeel, “Denoising diffusion probabilistic models,” Advances in neural information processing systems, vol. 33, pp. 6840– 6851, 2020

  14. [14]

    SynCoLFinGer: Synthetic contactless fingerprint generator,

    J. Priesnitz, C. Rathgeb, N. Buchmann, and C. Busch, “SynCoLFinGer: Synthetic contactless fingerprint generator,”Pattern Recognition Letters, vol. 157, pp. 127–134, 2022

  15. [15]

    Adaptive document image binarization,

    J. Sauvola and M. Pietik ¨ainen, “Adaptive document image binarization,” Pattern recognition, vol. 33, no. 2, pp. 225–236, 2000

  16. [16]

    A benchmark 3d fingerprint database,

    W. Zhou, J. Hu, I. Petersen, S. Wang, and M. Bennamoun, “A benchmark 3d fingerprint database,” in2014 11th international conference on fuzzy systems and knowledge discovery (fskd). IEEE, 2014, pp. 935–940

  17. [17]

    Fingerprint image synthesis based on statistical feature models,

    Q. Zhao, A. K. Jain, N. G. Paulter, and M. Taylor, “Fingerprint image synthesis based on statistical feature models,” in2012 IEEE Fifth International Conference on Biometrics: Theory, Applications and Systems (BTAS). IEEE, 2012, pp. 23–30

  18. [18]

    Texture modeling for synthetic fingerprint generation,

    P. Johnson, F. Hua, and S. Schuckers, “Texture modeling for synthetic fingerprint generation,” inProceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2013, pp. 154–159

  19. [19]

    Generative adversarial networks,

    I. Goodfellow, J. Pouget-Abadie, M. Mirza, B. Xu, D. Warde-Farley, S. Ozair, A. Courville, and Y . Bengio, “Generative adversarial networks,” Communications of the ACM, vol. 63, no. 11, pp. 139–144, 2020

  20. [20]

    Fingerprint synthesis: Search with 100 million prints,

    V . Mistry, J. J. Engelsma, and A. K. Jain, “Fingerprint synthesis: Search with 100 million prints,” in2020 IEEE international joint conference on biometrics (IJCB). IEEE, 2020, pp. 1–10

  21. [21]

    Finger-gan: Generating realistic fingerprint images using connectivity imposed gan,

    S. Minaee and A. Abdolrashidi, “Finger-gan: Generating realistic fingerprint images using connectivity imposed gan,”arXiv preprint arXiv:1812.10482, 2018

  22. [22]

    Synfi: Automatic synthetic fingerprint generation,

    M. S. Riazi, S. M. Chavoshian, and F. Koushanfar, “Synfi: Automatic synthetic fingerprint generation,”arXiv preprint arXiv:2002.08900, 2020

  23. [23]

    High fidelity fingerprint generation: Quality, uniqueness, and privacy,

    K. Bahmani, R. Plesh, P. Johnson, S. Schuckers, and T. Swyka, “High fidelity fingerprint generation: Quality, uniqueness, and privacy,” in2021 IEEE International Conference on Image Processing (ICIP). IEEE, 2021, pp. 3018–3022

  24. [24]

    Fingerprint synthesis: Evaluating fingerprint search at scale,

    K. Cao and A. Jain, “Fingerprint synthesis: Evaluating fingerprint search at scale,” in2018 International Conference on Biometrics (ICB). IEEE, 2018, pp. 31–38

  25. [25]

    Towards contactless, low-cost and accurate 3d fingerprint identification,

    A. Kumar and C. Kwong, “Towards contactless, low-cost and accurate 3d fingerprint identification,” inProceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2013, pp. 3438–3443. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 13

  26. [26]

    Towards more accurate contactless fingerprint minutiae extraction and pose-invariant matching,

    H. Tan and A. Kumar, “Towards more accurate contactless fingerprint minutiae extraction and pose-invariant matching,”IEEE Transactions on Information F orensics and Security, vol. 15, pp. 3924–3937, 2020

  27. [27]

    Towards more accurate matching of contactless fingerprints with a deep geometric graph convolutional network,

    Y . Shi, Z. Zhang, S. Liu, and M. Liu, “Towards more accurate matching of contactless fingerprints with a deep geometric graph convolutional network,”IEEE Transactions on Biometrics, Behavior , and Identity Science, vol. 5, no. 1, pp. 29–38, 2022

  28. [28]

    Improving contactless fingerprint recognition with robust 3d feature extraction and graph embedding,

    Y . Jia, S. Zheng, F. Feng, Z. Cui, and F. Su, “Improving contactless fingerprint recognition with robust 3d feature extraction and graph embedding,”arXiv e-prints, pp. arXiv–2409, 2024

  29. [29]

    High- resolution image synthesis with latent diffusion models,

    R. Rombach, A. Blattmann, D. Lorenz, P. Esser, and B. Ommer, “High- resolution image synthesis with latent diffusion models,” inProceedings of the IEEE/CVF conference on computer vision and pattern recognition, 2022, pp. 10 684–10 695

  30. [30]

    Denoising Diffusion Implicit Models

    J. Song, C. Meng, and S. Ermon, “Denoising diffusion implicit models,” arXiv preprint arXiv:2010.02502, 2020

  31. [31]

    Neural discrete representation learning,

    A. Van Den Oord, O. Vinyals, and K. Kavukcuoglu, “Neural discrete representation learning,” inProceedings of the 31st International Conference on Neural Information Processing Systems, ser. NIPS’17. Red Hook, NY , USA: Curran Associates Inc., 2017, p. 6309–6318

  32. [32]

    National institute of standards and technology special database 302: Nail to nail fingerprint challenge,

    G. Fiumara, P. Flanagan, J. Grantham, K. Ko, K. Marshall, M. Schwarz, E. Tabassi, B. Woodgate, and C. Boehnen, “National institute of standards and technology special database 302: Nail to nail fingerprint challenge,” Technical Note 2007, National Institute of Standards and Technology, 2018

  33. [33]

    Estimating fingerprint pose via dense voting,

    Y . Duan, J. Feng, J. Lu, and J. Zhou, “Estimating fingerprint pose via dense voting,”IEEE Transactions on Information F orensics and Security, vol. 18, pp. 2493–2507, 2023

  34. [34]

    VeriFinger SDK

    Neurotechnology. VeriFinger SDK. Accessed: Apr. 18, 2025. [Online]. Available: https://www.neurotechnology.com/verifinger.html

  35. [35]

    Adding conditional control to text-to-image diffusion models,

    L. Zhang, A. Rao, and M. Agrawala, “Adding conditional control to text-to-image diffusion models,” inProceedings of the IEEE/CVF international conference on computer vision, 2023, pp. 3836–3847

  36. [36]

    Pose-specific 3d fingerprint unfolding,

    X. Guan, J. Feng, and J. Zhou, “Pose-specific 3d fingerprint unfolding,” inChinese Conference on Biometric Recognition. Springer, 2021, pp. 185–194

  37. [37]

    NIST finger- print image quality 2 (NFIQ 2),

    E. Tabassi, M. Olsen, O. Bausinger, C. Busch, A. Figlarz, G. Fiumara, O. Henniger, J. Merkle, T. Ruhland, C. Schielet al., “NIST finger- print image quality 2 (NFIQ 2),” National Institute of Standards and Technology, Gaithersburg, MD, Tech. Rep. NISTIR 8034, 2021

  38. [38]

    Finger pose estimation for under- screen fingerprint sensor,

    X. Guan, Z. Pan, J. Feng, and J. Zhou, “Finger pose estimation for under- screen fingerprint sensor,”IEEE Transactions on Information F orensics and Security, vol. 20, pp. 12 739–12 753, 2025

  39. [39]

    Learning a fixed-length fingerprint representation,

    J. J. Engelsma, K. Cao, and A. K. Jain, “Learning a fixed-length fingerprint representation,”IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 43, no. 6, pp. 1981–1997, 2021

  40. [40]

    AFR-Net: Attention-driven fingerprint recognition network,

    S. A. Grosz and A. K. Jain, “AFR-Net: Attention-driven fingerprint recognition network,”IEEE Transactions on Biometrics, Behavior , and Identity Science, pp. 1–1, 2023