Abstract
Vascular patterns in the hand region are not visible to the naked eye or consumer cameras, therefore finger and hand vein biometrics is often considered invulnerable to presentation attacks. However, one can never rule out the possibility that a malicious attacker manages to create functional attack samples. Various approaches on how to detect such attacks have been proposed, along with publicly available attack databases and varying ideas to create artificial attack samples. In a first step it is important to verify that created presentation attack artifacts hold the potential to deceive a real system. In order to provide a meaningful and comparable threat potential evaluation, this article evaluates 15 existing vein recognition schemes using attack samples derived from three finger vein attack databases and one palm vein attack database. As a second step, in this work we investigate an approach to combine these employed vein recognition schemes and utilizing them to perform presentation attack detection, which to the authors’ best knowledge has not been described in literature so far. Experimental results show that this approach can effectively be used to detect vein attack samples.
Original language | English |
---|---|
Pages (from-to) | 544 - 555 |
Number of pages | 12 |
Journal | IEEE Transactions on Biometrics, Behavior, and Identity Science |
Volume | 4 |
Issue number | 4 |
DOIs | |
Publication status | Published - 10 Oct 2022 |
Bibliographical note
Publisher Copyright:Author
Keywords
- finger vein
- palm vein
- vein recognition
- presentation attacks
- vulnerability analysis
- vulnerability assessment
- threat evaluation
- Biometrics (access control)
- Light emitting diodes
- Behavioral sciences
- Databases
- Veins
- Fingers
- Feature extraction
- Finger vein
Fields of Science and Technology Classification 2012
- 102 Computer Sciences