Skip to main content

Finger Vein Presentation Attack Detection Using Convolutional Neural Networks

  • Conference paper
  • First Online:
Biometric Recognition (CCBR 2017)

Part of the book series: Lecture Notes in Computer Science ((LNIP,volume 10568))

Included in the following conference series:

Abstract

As an emerging biometric modality, finger vein recognition has received considerable attentions. However, recent studies have shown that finger vein biometrics is vulnerable to presentation attacks, i.e. printed versions of authorized individuals’ finger veins could be used to gain access to facilities or services. In this paper, we have designed a specific shallow convolutional neural network (CNN) for finger vein presentation attack detection (PAD), which is called as FPNet for short. The proposed FPNet has been evaluated on a public-database and an intra-database. Lots of h × h patches have been extracted from vein images with a stride s for dataset augmentation and then used to train our networks without any pre-trained model. For further improving models’ generalizability and robustness, training patches of two databases have been mixed together and our best model has achieved an accuracy of 100% on both test datasets, clearly outperforming state-of-the-art methods.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Tirunagari, S., Poh, N., Windridge, D., Iorliam, A., Suki, N., Ho, A.T.: Detection of face spoofing using visual dynamics. IEEE Trans. Inf. Forensics Secur. 10(4), 762–777 (2015)

    Article  Google Scholar 

  2. Sousedik, C., Busch, C.: Presentation attack detection methods for fingerprint recognition systems: a survey. IET Biom. 3(4), 219–233 (2014)

    Article  Google Scholar 

  3. Himaga, M., Kou, K.: Finger vein authentication technology and financial applications. In: Ratha, N.K., Govindaraju, V. (eds.) Advances in Biometrics, pp. 89–105. Springer, London (2008). doi:10.1007/978-1-84628-921-7_6

    Chapter  Google Scholar 

  4. Kang, W., Wu, Q.: Contactless palm vein recognition using a mutual foreground-based local binary pattern. IEEE Trans. Inf. Forensics Secur. 9(11), 1974–1985 (2014)

    Article  Google Scholar 

  5. Nguyen, D.T., Park, Y.H., Shin, K.Y., Kwon, S.Y., Lee, H.C., Park, K.R.: Fake finger-vein image detection based on fourier and wavelet transforms. In: IEEE Conference on Digital Signal Processing, pp. 1401–1413 (2013)

    Google Scholar 

  6. Tome, P., Vanoni, M., Marcel, S.: On the vulnerability of finger vein recognition to spoofing. In: Proceedings of the IEEE BIOSIG, pp. 1–10 (2014)

    Google Scholar 

  7. Raghavendra, R., Avinash, M., Marcel, S., Busch, C.: Finger vein liveness detection using motion magnification. In: IEEE Biometrics: Theory, Applications and Systems (BTAS), pp. 1–7 (2015)

    Google Scholar 

  8. Tome, P., Raghavendra, R., Busch, C., Tirunagari, S., Poh, N., Shekar, B.H., Gragnaniello, D., Sansone, C., Verdoliva, L., Marcel, S.: The 1st competition on counter measures to finger vein spoofing attacks. In: 2015 International Conference on Biometrics (ICB) (2015)

    Google Scholar 

  9. Tirunagari, S., Poh, N., Bober, M., Windridge, D.: Windowed DMD as a microtexture descriptor for finger vein counter-spoofing in biometrics. In: 2015 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 1–6. IEEE (2015)

    Google Scholar 

  10. Patel, K., Han, H., Jain, A.K.: Cross-database face antispoofing with robust feature representation. In: You, Z., Zhou, J., Wang, Y., Sun, Z., Shan, S., Zheng, W., Feng, J., Zhao, Q. (eds.) CCBR 2016. LNCS, vol. 9967, pp. 611–619. Springer, Cham (2016). doi:10.1007/978-3-319-46654-5_67

    Chapter  Google Scholar 

  11. Nogueira, R.F., de Alencar Lotufo, R., Machado, R.C.: Fingerprint liveness detection using convolutional neural networks. IEEE Trans. Inf. Forensics Secur. 11(6), 1206–1213 (2016)

    Article  Google Scholar 

  12. Qin, B., Pan, J.F., Cao, G.Z., Du, G.G.: The anti-spoofing study of vein identification system. In: 2009 International Conference on Computational Intelligence and Security (2009)

    Google Scholar 

  13. Krizhevsky, A., Sutskever, I., Hinton, G.E.: Imagenet classification with deep convolutional neural networks. In: Advances in Neural Information Processing Systems (2012)

    Google Scholar 

  14. The ISO/IEC Standards for Testing of Presentation Attack Detection. http://www.christoph-busch.de/files/Busch-PAD-standards-170329.pdf

Download references

Acknowledgments

This work was supported by the National Natural Science Foundation of China (Nos. 61573151, 61673157, 61374104, 61503141), the Guangdong Natural Science Foundation (No. 2016A030313468), Science and Technology Planning Project of Guangdong Province (No. 2017A010101026), the Science and Technology Program of Guangzhou (201510010088).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wenxiong Kang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Qiu, X., Tian, S., Kang, W., Jia, W., Wu, Q. (2017). Finger Vein Presentation Attack Detection Using Convolutional Neural Networks. In: Zhou, J., et al. Biometric Recognition. CCBR 2017. Lecture Notes in Computer Science(), vol 10568. Springer, Cham. https://doi.org/10.1007/978-3-319-69923-3_32

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-69923-3_32

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-69922-6

  • Online ISBN: 978-3-319-69923-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics