TY - JOUR
T1 - Attack Detection for Finger and Palm Vein Biometrics by Fusion of Multiple Recognition Algorithms
AU - Schuiki, Johannes
AU - Linortner, Michael
AU - Wimmer, Georg
AU - Uhl, Andreas
N1 - Publisher Copyright:
Author
PY - 2022/10/10
Y1 - 2022/10/10
N2 - Vascular patterns in the hand region are not visible to the naked eye or consumer cameras, therefore finger and hand vein biometrics is often considered invulnerable to presentation attacks. However, one can never rule out the possibility that a malicious attacker manages to create functional attack samples. Various approaches on how to detect such attacks have been proposed, along with publicly available attack databases and varying ideas to create artificial attack samples. In a first step it is important to verify that created presentation attack artifacts hold the potential to deceive a real system. In order to provide a meaningful and comparable threat potential evaluation, this article evaluates 15 existing vein recognition schemes using attack samples derived from three finger vein attack databases and one palm vein attack database. As a second step, in this work we investigate an approach to combine these employed vein recognition schemes and utilizing them to perform presentation attack detection, which to the authors’ best knowledge has not been described in literature so far. Experimental results show that this approach can effectively be used to detect vein attack samples.
AB - Vascular patterns in the hand region are not visible to the naked eye or consumer cameras, therefore finger and hand vein biometrics is often considered invulnerable to presentation attacks. However, one can never rule out the possibility that a malicious attacker manages to create functional attack samples. Various approaches on how to detect such attacks have been proposed, along with publicly available attack databases and varying ideas to create artificial attack samples. In a first step it is important to verify that created presentation attack artifacts hold the potential to deceive a real system. In order to provide a meaningful and comparable threat potential evaluation, this article evaluates 15 existing vein recognition schemes using attack samples derived from three finger vein attack databases and one palm vein attack database. As a second step, in this work we investigate an approach to combine these employed vein recognition schemes and utilizing them to perform presentation attack detection, which to the authors’ best knowledge has not been described in literature so far. Experimental results show that this approach can effectively be used to detect vein attack samples.
KW - finger vein
KW - palm vein
KW - vein recognition
KW - presentation attacks
KW - vulnerability analysis
KW - vulnerability assessment
KW - threat evaluation
KW - Biometrics (access control)
KW - Light emitting diodes
KW - Behavioral sciences
KW - Databases
KW - Veins
KW - Fingers
KW - Feature extraction
KW - Finger vein
UR - http://www.scopus.com/inward/record.url?scp=85139819034&partnerID=8YFLogxK
UR - https://ieeexplore.ieee.org/document/9914644
U2 - 10.1109/TBIOM.2022.3212836
DO - 10.1109/TBIOM.2022.3212836
M3 - Article
SN - 2637-6407
VL - 4
SP - 544
EP - 555
JO - IEEE Transactions on Biometrics, Behavior, and Identity Science
JF - IEEE Transactions on Biometrics, Behavior, and Identity Science
IS - 4
ER -