Skip to main content

Finger Vein Presentation Attack Detection with Optimized LBP Variants

  • Conference paper
  • First Online:

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1347))

Abstract

Finger vein-based authentication systems have been proven to be promisingly accurate in identifying a person. However, the system is still highly vulnerable from presentation attack. Presentation attack is one of the most commonly found attacks in typical biometrics systems. A printed finger vein image could be used to bypass the system with ease. Various presentation attack detection methods based on texture and liveness analysis have been presented to encounter such issue. In this paper, our aim is to apply hyper-parameters tuning on Local Binary Pattern to gain the best features set for presentation attack detection in finger vein recognition. Using an automated hyper-parameter tuning approach, we find a set of optimized parameters which are able to extract the best features for presentation attack detection. Experiment results demonstrate that the proposed method is able to yield a significant high accuracy in distinguishing genuine images from fake images.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Costa, V., Sousa A., Reis, A.: Image-based object spoofing detection. In: Barneva, R., Brimkov, V., Tavares, J. (eds.) Combinatorial Image Analysis. IWCIA 2018. Lecture Notes in Computer Science, vol. 11255, pp. 189–201. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-05288-1_15

  2. Boulkenafet, Z., Komulainen, J., Hadid, A.: Face anti-spoofing based on color texture analysis. In: Proceedings - International Conference on Image Processing, ICIP, vol. 2015, no. Decem, pp. 2636–2640 (2015). https://doi.org/10.1109/ICIP.2015.7351280

  3. Qiu, X., Kang, W., Tian, S., Jia, W., Huang, Z.: Finger vein presentation attack detection using total variation decomposition. IEEE Trans. Inf. Forensics Secur.13(2), 465–477 (2018). https://doi.org/10.1109/TIFS.2017.2756598

  4. Tome, P., Marcel, S.: On the vulnerability of palm vein recognition to spoofing attacks. In: Proceedings of 2015 International Conference on Biometrics, ICB 2015, pp. 319–325 (2015). https://doi.org/10.1109/ICB.2015.7139056

  5. BIP-LAB, GitHub - BIP-Lab/SCUT-SFVD: SCUT-SFVD: A Finger Vein Spoofing/Presen-tation Attack Database. https://github.com/BIP-Lab/SCUT-SFVD, Accessed 17 July 2020

  6. Raghavendra, R., Venkatesh, S., Raja, K.B., Busch, C.: Transferable deep convolutional neural network features for fingervein presentation attack detection. In: Proceedings - 2017 5th International Workshop on Biometrics and Forensics, IWBF 2017 (2017). https://doi.org/10.1109/IWBF.2017.7935108

  7. Kolberg, J., Gomez-Barrero, M., Venkatesh, S., Ramachandra, R., Busch, C.: Presentation attack detection for finger recognition. In: Uhl, A., Busch, C., Marcel, S., Veldhuis, R. (eds.) Handbook of Vascular Biometrics. Advances in Computer Vision and Pattern Recognition, pp. 435–463. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-27731-4_14

  8. Bergstra, J., Bardenet, R., Bengio, Y., Kégl, B.: Algorithms for hyper-parameter optimization. In: 5th Annual Conference on Advances in Neural Information Processing Systems, NIPS 2011, vol. 24, pp. 1–9 (2011)

    Google Scholar 

  9. Ojala,T., Pietikainen, M., Maenpaa, T.: Multiresolution gray-scale and rotation invariant texture classification with local binary patterns. IEEE Trans. Pattern Anal. Mach. Intell. (PAMI) 24(7), 971–-987 (2002)

    Google Scholar 

  10. Heikkilä, M., Pietikäinen, M., Schmid, C.: Description of interest regions with local binary patterns. Pattern Recogn. 42(3), 425–436 (2009). https://doi.org/10.1016/j.patcog.2008.08.014

  11. SC37-Biometrics-Presentation Attack Detection. ISO/IEC Standard FDIS 30107-3. https://christoph-busch.de/files/Busch-PAD-standards-170329.pdf, Accessed 31 July 2020

  12. Tome, P., et al.: The 1st competition on counter measures to finger vein spoofing attacks. In: Proceedings of International Conference Biometrics (ICB), May 2015, pp. 513–518 (2015)

    Google Scholar 

  13. Nguyen,D.T., Park, Y.H., Shin, K.Y., Kwon, S.Y., Lee, H.C., Park, K.R.: Fake finger-vein image detection based on fourier and wavelet transforms. Digit. Signal Process. 23(5), 1401–1413 (2013)

    Google Scholar 

Download references

Acknowledgements

Our thanks to BIP Lab South China University of Technology for allowing us to use the SCUT-FVD Finger Vein Database they had collected. This work is supported by Fundamental Research Grant Scheme (FRGS) of Ministry of Higher Education Malaysia (FRGS Grant No: MMUE/190047).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to W. Q. Janie Lee .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Lee, W.Q.J., Ong, T.S., Connie, T., Jackson, H.T. (2021). Finger Vein Presentation Attack Detection with Optimized LBP Variants. In: Anbar, M., Abdullah, N., Manickam, S. (eds) Advances in Cyber Security. ACeS 2020. Communications in Computer and Information Science, vol 1347. Springer, Singapore. https://doi.org/10.1007/978-981-33-6835-4_31

Download citation

  • DOI: https://doi.org/10.1007/978-981-33-6835-4_31

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-33-6834-7

  • Online ISBN: 978-981-33-6835-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics