Skip to main content

Finger Vein Spoof GANs: Can We Supersede the Production of Presentation Attack Artefacts?

  • Conference paper
  • First Online:
Digital Forensics and Watermarking (IWDW 2023)

Abstract

GAN-based I2I translation techniques for unpaired data are employed for the synthesis of biometric finger vein presentation attack instrument samples corresponding to three public presentation attack datasets. For the assessment of these synthetic samples, we analyse their behaviour when attacking finger vein recognition systems, comparing these results to such obtained from actually crafted presentation attack samples. We observe that although visual appearance and sample set correspondence are surprisingly good for some networks, respectively, the assessment of the behaviour of the data in a conducted attack is more difficult. Even if for some recognition schemes out of 11 considered we find a good accordance in terms of IAPMR (for many we don’t), the attack score distributions turn out to be highly dissimilar when comparing crafted and synthetic presentation attack instrument samples. More work is needed to be able to correctly interpret corresponding diverging results with respect to the relevance in attack simulation. From the seven network architectures considered, CycleGAN provides the most useful results, but the artificially created samples do not fully mimic the behaviour of crafted ones.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 74.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Uhl, A., Busch, C., Marcel, S., Veldhuis, R.: Handbook of Vascular Biometrics. Advances in Computer Vision and Pattern Recognition, Springer, Cham (2019). https://doi.org/10.1007/978-3-030-27731-4

    Book  Google Scholar 

  2. Marcel, S., Nixon, M.S., Li, S.Z. (eds.): Handbook of Biometric Anti-Spoofing. Springer, London (2014). https://doi.org/10.1007/978-1-4471-6524-8

    Book  Google Scholar 

  3. Schuiki, J., Linortner, M., Wimmer, G., Uhl, A.: Attack detection for finger and palm vein biometrics by fusion of multiple recognition algorithms. IEEE Trans. Biom. Behav. Identity Sci. 4(4), 544–555 (2022)

    Article  Google Scholar 

  4. Schuiki, J., Linortner, M., Wimmer, G., Uhl, A.: Extensive threat analysis of vein attack databases and attack detection by fusion of comparison scores. In: Marcel, S., Fierrez, J., Evans, N. (eds.) Handbook of Biometric Anti-Spoofing: Presentation Attack Detection and Vulnerability Assessment, pp. 467–487. Springer, Singapore (2023). https://doi.org/10.1007/978-981-19-5288-3_17

    Chapter  Google Scholar 

  5. Raghavendra, R., Busch, C.: Presentation attack detection algorithms for finger vein biometrics: a comprehensive study. In: 11th International Conference on Signal-Image Technology Internet-Based Systems (SITIS 2015), pp. 628–632 (2015)

    Google Scholar 

  6. Debiasi, L., Kauba, C., Hofbauer, H., Prommegger, B., Uhl, A.: Presentation attacks and detection in finger- and hand-vein recognition. In: Proceedings of the Joint Austrian Computer Vision and Robotics Workshop (ACVRW 2020), Graz, Austria, pp. 65–70 (2020)

    Google Scholar 

  7. Schuiki, J., Prommegger, B., Uhl, A.: Confronting a variety of finger vein recognition algorithms with wax presentation attack artefacts. In: Proceedings of the 9th IEEE International Workshop on Biometrics and Forensics (IWBF 2021), Rome, Italy (moved to virtual), pp. 1–6 (2021)

    Google Scholar 

  8. Otsuka, A., Ohki, T., Morita, R., Inuma, M., Imai, H.: Security evaluation of a finger vein authentication algorithm against wolf attack. In: 37th IEEE Symposium on Security and Privacy, San Jose, CA (2016)

    Google Scholar 

  9. Krishnan, A., Thomas, T., Nayar, G.R., Sasilekha Mohan, S.: Liveness detection in finger vein imaging device using plethysmographic signals. In: Tiwary, U.S. (ed.) IHCI 2018. LNCS, vol. 11278, pp. 251–260. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-04021-5_23

    Chapter  Google Scholar 

  10. Hoyez, H., Schockaert, C., Rambach, J., Mirbach, B., Stricker, D.: Unsupervised image-to-image translation: a review. Sensors 22(21), 8540 (2022)

    Article  Google Scholar 

  11. Makrushin, A., Uhl, A., Dittmann, J.: A survey on synthetic biometrics: fingerprint, face, iris and vascular patterns. IEEE Access 11, 33887–33899 (2023)

    Article  Google Scholar 

  12. Kauba, C., Kirchgasser, S., Mirjalili, V., Uhl, A., Ross, A.: Inverse biometrics: generating vascular images from binary templates. IEEE Trans. Biom. Behav. Identity Sci. 3(4), 464–478 (2021)

    Article  Google Scholar 

  13. Hillerström, F., Kumar, A., Veldhuis, R.: Generating and analyzing synthetic finger vein images. In: Proceedings of the International Conference of the Biometrics Special Interest Group (BIOSIG 2014), pp. 121–132 (2014)

    Google Scholar 

  14. Yang, H., Fang, P., Hao, Z.: A GAN-based method for generating finger vein dataset. In: Proceedings of the 2020 3rd International Conference on Algorithms, Computing and Artificial Intelligence, ACAI 2020. Association for Computing Machinery, New York (2021)

    Google Scholar 

  15. Zhang, J., Lu, Z., Li, M., Wu, H.: Gan-based image augmentation for finger-vein biometric recognition. IEEE Access 7, 183118–183132 (2019)

    Article  Google Scholar 

  16. Yang, W., Hui, C., Chen, Z., Xue, J.H., Liao, Q.: FV-GAN: finger vein representation using generative adversarial networks. IEEE Trans. Inf. Forensics Secur. 14(9), 2512–2524 (2019)

    Article  Google Scholar 

  17. Grosz, S.A., Jain, A.K.: SpoofGAN: synthetic fingerprint spoof images. IEEE Trans. Inf. Forensics Secur. 18, 730–743 (2023)

    Article  Google Scholar 

  18. Purnapatra, S., et al.: Presentation attack detection with advanced CNN models for noncontact-based fingerprint systems. In: Proceedings of the 11th International Workshop on Biometrics and Forensics (IWBF 2023), Barcelona, Spain, pp. 1–6 (2023)

    Google Scholar 

  19. Vorderleitner, A., Hämmerle-Uhl, J., Uhl, A.: Hand vein spoof GANs: Pitfalls in the assessment of synthetic presentation attack artefacts. In: Proceedings of the 2023 ACM Workshop on Information Hiding and Multimedia Security, IH &MMSec 2023, pp. 133–138. Association for Computing Machinery, New York (2023)

    Google Scholar 

  20. Goodfellow, I., et al.: Generative adversarial networks. Commun. ACM 63(11), 139–144 (2020)

    Article  MathSciNet  Google Scholar 

  21. Choi, Y., Uh, Y., Yoo, J., Ha, J.W.: StarGAN v2: Diverse image synthesis for multiple domains. In: Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, CVPR 2020, pp. 8188–8197 (2020)

    Google Scholar 

  22. Lin, J., Pang, Y., Xia, Y., Chen, Z., Luo, J.: TuiGAN: Learning versatile image-to-image translation with two unpaired images. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.-M. (eds.) ECCV 2020. LNCS, vol. 12349, pp. 18–35. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-58548-8_2

    Chapter  Google Scholar 

  23. Lee, H.-Y., Tseng, H.-Y., Huang, J.-B., Singh, M., Yang, M.-H.: Diverse image-to-image translation via disentangled representations. In: Ferrari, V., Hebert, M., Sminchisescu, C., Weiss, Y. (eds.) ECCV 2018. LNCS, vol. 11205, pp. 36–52. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-01246-5_3

    Chapter  Google Scholar 

  24. Park, T., Efros, A.A., Zhang, R., Zhu, J.-Y.: Contrastive learning for unpaired image-to-image translation. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.-M. (eds.) ECCV 2020. LNCS, vol. 12354, pp. 319–345. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-58545-7_19

    Chapter  Google Scholar 

  25. Benaim, S., Wolf, L.: One-sided unsupervised domain mapping. In: Proceedings of the 31st International Conference on Neural Information Processing Systems (NIPS 2017), Red Hook, NY, USA, pp. 752–762. Curran Associates Inc. (2017)

    Google Scholar 

  26. Zhu, J.Y., Park, T., Isola, P., Efros, A.A.: Unpaired image-to-image translation using cycle-consistent adversarial networks. In: 2017 IEEE International Conference on Computer Vision (ICCV), pp. 2242–2251 (2017). ISSN: 2380-7504

    Google Scholar 

  27. Yi, Z., Zhang, H., Tan, P., Gong, M.: DualGAN: Unsupervised dual learning for image-to-image translation. In: Proceedings of the IEEE International Conference on Computer Vision (ICCV 2017), pp. 2849–2857 (2017)

    Google Scholar 

  28. Tome, P., et al.: The 1st competition on counter measures to finger vein spoofing attacks. In: International Conference on Biometrics (ICB 2015), pp. 513–518 (2015)

    Google Scholar 

  29. Qiu, X., Kang, W., Tian, S., Jia, W., Huang, Z.: Finger vein presentation attack detection using total variation decomposition. IEEE Trans. Inf. Forensics Secur. 13(2), 465–477 (2018)

    Article  Google Scholar 

  30. Heusel, M., Ramsauer, H., Unterthiner, T., Nessler, B., Hochreiter, S.: GANs trained by a two time-scale update rule converge to a local Nash equilibrium. In: Proceedings of the 31st International Conference on Neural Information Processing Systems (NIPS 2017), Red Hook, NY, USA, pp. 6629–6640. Curran Associates Inc. (2017)

    Google Scholar 

  31. Lucic, M., Kurach, K., Michalski, M., Bousquet, O., Gelly, S.: Are GANs created equal? A large-scale study. In: Proceedings of the 32nd International Conference on Neural Information Processing Systems (NIPS 2018), Red Hook, NY, USA, pp. 698–707. Curran Associates Inc. (2018)

    Google Scholar 

  32. Kauba, C., Uhl, A.: An available open-source vein recognition framework. In: Uhl, A., Busch, C., Marcel, S., Veldhuis, R. (eds.) Handbook of Vascular Biometrics. ACVPR, pp. 113–142. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-27731-4_4

    Chapter  Google Scholar 

Download references

Acknowledgements

This work has been partially supported by the Austrian Science Fund, project no. I4272.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Andreas Uhl .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Vorderleitner, A., Hämmerle-Uhl, J., Uhl, A. (2024). Finger Vein Spoof GANs: Can We Supersede the Production of Presentation Attack Artefacts?. In: Ma, B., Li, J., Li, Q. (eds) Digital Forensics and Watermarking. IWDW 2023. Lecture Notes in Computer Science, vol 14511. Springer, Singapore. https://doi.org/10.1007/978-981-97-2585-4_8

Download citation

  • DOI: https://doi.org/10.1007/978-981-97-2585-4_8

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-97-2584-7

  • Online ISBN: 978-981-97-2585-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics