Abstract
For the first time, the feasibility of creating morphed templates for attacking vascular biometrics is investigated, in particular finger vein recognition schemes generating binary vascular patterns are addressed. A conducted vulnerability analysis reveals that (i) the extent of vulnerability, (ii) the type of most vulnerable recognition scheme, and (iii) the preferred way to construct the morphed template for a given target template depends on the employed sensor. It turns out that targeted template doppelgaenger selection is important for an attack success. The identified threat level in terms of IAPMR is often found to be \(> 0.8\) for several sensor/template generation scheme/morphing technique combinations. Thus, the risk as imposed by such attacks can be said to be considerable.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ferrara, M., Franco, A., Maltoni, D.: The magic passport. In: IEEE International Joint Conference on Biometrics, pp. 1–7 (Sept 2014)
Scherhag, U., Rathgeb, C., Merkle, J., Breithaupt, R., Busch, C.: Face recognition systems under morphing attacks: a survey. IEEE Access 7, 23012–23026 (2019)
Venkatesh, S., Ramachandra, R., Raja, K., Busch, C.: Face morphing attack generation & detection: a comprehensive survey. IEEE Trans. Technol. Society 2(3), 128–145 (2021)
Ferrara, M., Cappelli, R., Maltoni, D.: On the feasibility of creating double-identity fingerprints. IEEE Trans. Inf. Forensics Secur. 12(4), 892–900 (2017)
Goel, I., Puhan, N.B., Mandal, B.: Deep convolutional neural network for double-identity fingerprint detection. IEEE Sensors Letters 4(5), 1–4 (2020)
Satapathy, G., Bhattacharya, G., Puhan, N.B., Ho, A.T.S.: Generalized benford’s law for fake fingerprint detection. In: 2020 IEEE Applied Signal Processing Conference (ASPCON), pp. 242–246 (2020)
Makrushin, A., Trebeljahr, M., Seidlitz, S., Dittmann, J.: On feasibility of gan-based fingerprint morphing. In: 2021 IEEE 23rd International Workshop on Multimedia Signal Processing (MMSP), 1–6. (2021)
Rathgeb, C., Bush, C.: On the feasibility of creating morphed iris-codes. In: 2017 IEEE International Joint Conference on Biometrics (IJCB) (2017)
Sharma, R., Ross, A.: Image-level iris morph attack. In: 2021 IEEE International Conference on Image Processing (ICIP), 3013–3017 (2021)
Gomez-Barrero, M., Rathgeb, C., Scherhag, U., Busch, C.: Predicting the vulnerability of biometric systems to attacks based on morphed biometric information. IET Biometrics 7(4), 333–341 (2018)
Aydemir, A.K., Hämmerle-Uhl, J., Uhl, A.: Feasibility of morphing-attacks in vascular biometrics. In: 2021 IEEE/IAPR International Joint Conference on Biometrics (IJCB’21), pp. 1–7(2021)
Miura, N., Nagasaka, A., Miyatake, T.: Extraction of finger-vein patterns using maximum curvature points in image profiles. IEICE Trans. Inf. Syst. 90(8), 1185–1194 (2007)
Roettcher, A., Scherhag, U., Busch, C.: Finding the suitable doppelgaenger for a face morphing attack. In: 2020 IEEE International Joint Conference on Biometrics (IJCB) (2020)
ISO/IEC JTC1 SC37 Biometrics: Information technology - biometric presentation attack detection - part 3: Testing and reporting. ISO ISO/IEC IS 30107–3:2017, International Organization for Standardization, Geneva, Switzerland (2017)
Scherhag, U., et al.: Biometric systems under morphing attacks: assessment of morphing techniques and vulnerability reporting. In: 2017 International Conference of the Biometrics Special Interest Group (BIOSIG), pp. 149–159 (2017)
Asaari, M.S.M., S. A. Suandi, B.A.R.: Fusion of band limited phase only correlation and width centroid contour distance for finger based biometrics. Expert Syst. Appl. 41(7) (2014) 3367–3382 (2014)
Lu, Y., Xie, S.J., Yoon, S., Wang, Z., Park, D.S.: An available database for the research of finger vein recognition. In: Image and Signal Processing (CISP), 2013 6th International Congress on. Volume 1, pp. 410–415 IEEE (2013)
Ton, B., Veldhuis, R.: A high quality finger vascular pattern dataset collected using a custom designed capturing device. In: International Conference on Biometrics, ICB 2013, IEEE (2013)
Kauba, C., Prommegger, B., Uhl, A.: Focussing the beam - a new laser illumination based data set providing insights to finger-vein recognition. In: 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS), Los Angeles, California, USA , 1–9 (2018)
Kauba, C., Prommegger, B., Uhl, A.: Openvein - an open-source modular multipurpose finger vein scanner design. In: Uhl, A., Busch, C., Marcel, S., Veldhuis, R. (eds.) Handbook of Vascular Biometrics, pp. 77–111. Springer Nature Switzerland AG, Cham, Switzerland (2019)
Lu, Y., Xie, S., Yoon, S., Yang, J., Park, D.: Robust finger vein roi localization based on flexible segmentation. Sensors 13(11), 14339–14366 (2013)
Kauba, C., Uhl, A.: An available open-source vein recognition framework. In: Uhl, A., Busch, C., Marcel, S., Veldhuis, R. (eds.) Handbook of Vascular Biometrics, pp. 113–142. Springer Nature Switzerland AG, Cham, Switzerland (2019)
Huang, B., Dai, Y., Li, R., Tang, D., Li, W.: Finger-vein authentication based on wide line detector and pattern normalization. In: 2010 20th International Conference on Pattern Recognition (ICPR), pp. 1269–1273, IEEE (2010)
Starck, J., Fadili, J., Murtagh, F.: The undecimated wavelet decomposition and its reconstruction. IEEE Trans. Image Process. 16(2), 297–309 (2007)
Kumar, A., Zhou, Y.: Human identification using finger images. IEEE Trans. Image Process. 21(4), 2228–2244 (2012)
Choi, J.H., Song, W., Kim, T., Lee, S.R., Kim, H.C.: Finger vein extraction using gradient normalization and principal curvature. In: Image Processing: Machine Vision Applications II. Volume 7251 of Proc.SPIE, pp. 359–367 (2009)
Acknowledgements
This work has been partially funded by the Austrian Science Fund projects P32201 and I4232, respectively.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Mitterreiter, T., Hämmerle-Uhl, J., Uhl, A. (2024). Morphing-Attacks Against Binary Fingervein Templates. In: Foresti, G.L., Fusiello, A., Hancock, E. (eds) Image Analysis and Processing - ICIAP 2023 Workshops. ICIAP 2023. Lecture Notes in Computer Science, vol 14365. Springer, Cham. https://doi.org/10.1007/978-3-031-51023-6_26
Download citation
DOI: https://doi.org/10.1007/978-3-031-51023-6_26
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-51022-9
Online ISBN: 978-3-031-51023-6
eBook Packages: Computer ScienceComputer Science (R0)