Skip to main content

Morphing-Attacks Against Binary Fingervein Templates

  • Conference paper
  • First Online:
Image Analysis and Processing - ICIAP 2023 Workshops (ICIAP 2023)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14365))

Included in the following conference series:

  • 144 Accesses

Abstract

For the first time, the feasibility of creating morphed templates for attacking vascular biometrics is investigated, in particular finger vein recognition schemes generating binary vascular patterns are addressed. A conducted vulnerability analysis reveals that (i) the extent of vulnerability, (ii) the type of most vulnerable recognition scheme, and (iii) the preferred way to construct the morphed template for a given target template depends on the employed sensor. It turns out that targeted template doppelgaenger selection is important for an attack success. The identified threat level in terms of IAPMR is often found to be \(> 0.8\) for several sensor/template generation scheme/morphing technique combinations. Thus, the risk as imposed by such attacks can be said to be considerable.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ferrara, M., Franco, A., Maltoni, D.: The magic passport. In: IEEE International Joint Conference on Biometrics, pp. 1–7 (Sept 2014)

    Google Scholar 

  2. Scherhag, U., Rathgeb, C., Merkle, J., Breithaupt, R., Busch, C.: Face recognition systems under morphing attacks: a survey. IEEE Access 7, 23012–23026 (2019)

    Article  Google Scholar 

  3. Venkatesh, S., Ramachandra, R., Raja, K., Busch, C.: Face morphing attack generation & detection: a comprehensive survey. IEEE Trans. Technol. Society 2(3), 128–145 (2021)

    Article  Google Scholar 

  4. Ferrara, M., Cappelli, R., Maltoni, D.: On the feasibility of creating double-identity fingerprints. IEEE Trans. Inf. Forensics Secur. 12(4), 892–900 (2017)

    Article  Google Scholar 

  5. Goel, I., Puhan, N.B., Mandal, B.: Deep convolutional neural network for double-identity fingerprint detection. IEEE Sensors Letters 4(5), 1–4 (2020)

    Article  Google Scholar 

  6. Satapathy, G., Bhattacharya, G., Puhan, N.B., Ho, A.T.S.: Generalized benford’s law for fake fingerprint detection. In: 2020 IEEE Applied Signal Processing Conference (ASPCON), pp. 242–246 (2020)

    Google Scholar 

  7. Makrushin, A., Trebeljahr, M., Seidlitz, S., Dittmann, J.: On feasibility of gan-based fingerprint morphing. In: 2021 IEEE 23rd International Workshop on Multimedia Signal Processing (MMSP), 1–6. (2021)

    Google Scholar 

  8. Rathgeb, C., Bush, C.: On the feasibility of creating morphed iris-codes. In: 2017 IEEE International Joint Conference on Biometrics (IJCB) (2017)

    Google Scholar 

  9. Sharma, R., Ross, A.: Image-level iris morph attack. In: 2021 IEEE International Conference on Image Processing (ICIP), 3013–3017 (2021)

    Google Scholar 

  10. Gomez-Barrero, M., Rathgeb, C., Scherhag, U., Busch, C.: Predicting the vulnerability of biometric systems to attacks based on morphed biometric information. IET Biometrics 7(4), 333–341 (2018)

    Article  Google Scholar 

  11. Aydemir, A.K., Hämmerle-Uhl, J., Uhl, A.: Feasibility of morphing-attacks in vascular biometrics. In: 2021 IEEE/IAPR International Joint Conference on Biometrics (IJCB’21), pp. 1–7(2021)

    Google Scholar 

  12. Miura, N., Nagasaka, A., Miyatake, T.: Extraction of finger-vein patterns using maximum curvature points in image profiles. IEICE Trans. Inf. Syst. 90(8), 1185–1194 (2007)

    Article  Google Scholar 

  13. Roettcher, A., Scherhag, U., Busch, C.: Finding the suitable doppelgaenger for a face morphing attack. In: 2020 IEEE International Joint Conference on Biometrics (IJCB) (2020)

    Google Scholar 

  14. ISO/IEC JTC1 SC37 Biometrics: Information technology - biometric presentation attack detection - part 3: Testing and reporting. ISO ISO/IEC IS 30107–3:2017, International Organization for Standardization, Geneva, Switzerland (2017)

    Google Scholar 

  15. Scherhag, U., et al.: Biometric systems under morphing attacks: assessment of morphing techniques and vulnerability reporting. In: 2017 International Conference of the Biometrics Special Interest Group (BIOSIG), pp. 149–159 (2017)

    Google Scholar 

  16. Asaari, M.S.M., S. A. Suandi, B.A.R.: Fusion of band limited phase only correlation and width centroid contour distance for finger based biometrics. Expert Syst. Appl. 41(7) (2014) 3367–3382 (2014)

    Google Scholar 

  17. Lu, Y., Xie, S.J., Yoon, S., Wang, Z., Park, D.S.: An available database for the research of finger vein recognition. In: Image and Signal Processing (CISP), 2013 6th International Congress on. Volume 1, pp. 410–415 IEEE (2013)

    Google Scholar 

  18. Ton, B., Veldhuis, R.: A high quality finger vascular pattern dataset collected using a custom designed capturing device. In: International Conference on Biometrics, ICB 2013, IEEE (2013)

    Google Scholar 

  19. Kauba, C., Prommegger, B., Uhl, A.: Focussing the beam - a new laser illumination based data set providing insights to finger-vein recognition. In: 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS), Los Angeles, California, USA , 1–9 (2018)

    Google Scholar 

  20. Kauba, C., Prommegger, B., Uhl, A.: Openvein - an open-source modular multipurpose finger vein scanner design. In: Uhl, A., Busch, C., Marcel, S., Veldhuis, R. (eds.) Handbook of Vascular Biometrics, pp. 77–111. Springer Nature Switzerland AG, Cham, Switzerland (2019)

    Google Scholar 

  21. Lu, Y., Xie, S., Yoon, S., Yang, J., Park, D.: Robust finger vein roi localization based on flexible segmentation. Sensors 13(11), 14339–14366 (2013)

    Article  Google Scholar 

  22. Kauba, C., Uhl, A.: An available open-source vein recognition framework. In: Uhl, A., Busch, C., Marcel, S., Veldhuis, R. (eds.) Handbook of Vascular Biometrics, pp. 113–142. Springer Nature Switzerland AG, Cham, Switzerland (2019)

    Google Scholar 

  23. Huang, B., Dai, Y., Li, R., Tang, D., Li, W.: Finger-vein authentication based on wide line detector and pattern normalization. In: 2010 20th International Conference on Pattern Recognition (ICPR), pp. 1269–1273, IEEE (2010)

    Google Scholar 

  24. Starck, J., Fadili, J., Murtagh, F.: The undecimated wavelet decomposition and its reconstruction. IEEE Trans. Image Process. 16(2), 297–309 (2007)

    Article  MathSciNet  Google Scholar 

  25. Kumar, A., Zhou, Y.: Human identification using finger images. IEEE Trans. Image Process. 21(4), 2228–2244 (2012)

    Article  MathSciNet  Google Scholar 

  26. Choi, J.H., Song, W., Kim, T., Lee, S.R., Kim, H.C.: Finger vein extraction using gradient normalization and principal curvature. In: Image Processing: Machine Vision Applications II. Volume 7251 of Proc.SPIE, pp. 359–367 (2009)

    Google Scholar 

Download references

Acknowledgements

This work has been partially funded by the Austrian Science Fund projects P32201 and I4232, respectively.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Andreas Uhl .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mitterreiter, T., Hämmerle-Uhl, J., Uhl, A. (2024). Morphing-Attacks Against Binary Fingervein Templates. In: Foresti, G.L., Fusiello, A., Hancock, E. (eds) Image Analysis and Processing - ICIAP 2023 Workshops. ICIAP 2023. Lecture Notes in Computer Science, vol 14365. Springer, Cham. https://doi.org/10.1007/978-3-031-51023-6_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-51023-6_26

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-51022-9

  • Online ISBN: 978-3-031-51023-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics