Abstract
GAN-based I2I translation techniques for unpaired data are employed for the synthesis of biometric finger vein presentation attack instrument samples corresponding to three public presentation attack datasets. For the assessment of these synthetic samples, we analyse their behaviour when attacking finger vein recognition systems, comparing these results to such obtained from actually crafted presentation attack samples. We observe that although visual appearance and sample set correspondence are surprisingly good for some networks, respectively, the assessment of the behaviour of the data in a conducted attack is more difficult. Even if for some recognition schemes out of 11 considered we find a good accordance in terms of IAPMR (for many we don’t), the attack score distributions turn out to be highly dissimilar when comparing crafted and synthetic presentation attack instrument samples. More work is needed to be able to correctly interpret corresponding diverging results with respect to the relevance in attack simulation. From the seven network architectures considered, CycleGAN provides the most useful results, but the artificially created samples do not fully mimic the behaviour of crafted ones.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Uhl, A., Busch, C., Marcel, S., Veldhuis, R.: Handbook of Vascular Biometrics. Advances in Computer Vision and Pattern Recognition, Springer, Cham (2019). https://doi.org/10.1007/978-3-030-27731-4
Marcel, S., Nixon, M.S., Li, S.Z. (eds.): Handbook of Biometric Anti-Spoofing. Springer, London (2014). https://doi.org/10.1007/978-1-4471-6524-8
Schuiki, J., Linortner, M., Wimmer, G., Uhl, A.: Attack detection for finger and palm vein biometrics by fusion of multiple recognition algorithms. IEEE Trans. Biom. Behav. Identity Sci. 4(4), 544–555 (2022)
Schuiki, J., Linortner, M., Wimmer, G., Uhl, A.: Extensive threat analysis of vein attack databases and attack detection by fusion of comparison scores. In: Marcel, S., Fierrez, J., Evans, N. (eds.) Handbook of Biometric Anti-Spoofing: Presentation Attack Detection and Vulnerability Assessment, pp. 467–487. Springer, Singapore (2023). https://doi.org/10.1007/978-981-19-5288-3_17
Raghavendra, R., Busch, C.: Presentation attack detection algorithms for finger vein biometrics: a comprehensive study. In: 11th International Conference on Signal-Image Technology Internet-Based Systems (SITIS 2015), pp. 628–632 (2015)
Debiasi, L., Kauba, C., Hofbauer, H., Prommegger, B., Uhl, A.: Presentation attacks and detection in finger- and hand-vein recognition. In: Proceedings of the Joint Austrian Computer Vision and Robotics Workshop (ACVRW 2020), Graz, Austria, pp. 65–70 (2020)
Schuiki, J., Prommegger, B., Uhl, A.: Confronting a variety of finger vein recognition algorithms with wax presentation attack artefacts. In: Proceedings of the 9th IEEE International Workshop on Biometrics and Forensics (IWBF 2021), Rome, Italy (moved to virtual), pp. 1–6 (2021)
Otsuka, A., Ohki, T., Morita, R., Inuma, M., Imai, H.: Security evaluation of a finger vein authentication algorithm against wolf attack. In: 37th IEEE Symposium on Security and Privacy, San Jose, CA (2016)
Krishnan, A., Thomas, T., Nayar, G.R., Sasilekha Mohan, S.: Liveness detection in finger vein imaging device using plethysmographic signals. In: Tiwary, U.S. (ed.) IHCI 2018. LNCS, vol. 11278, pp. 251–260. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-04021-5_23
Hoyez, H., Schockaert, C., Rambach, J., Mirbach, B., Stricker, D.: Unsupervised image-to-image translation: a review. Sensors 22(21), 8540 (2022)
Makrushin, A., Uhl, A., Dittmann, J.: A survey on synthetic biometrics: fingerprint, face, iris and vascular patterns. IEEE Access 11, 33887–33899 (2023)
Kauba, C., Kirchgasser, S., Mirjalili, V., Uhl, A., Ross, A.: Inverse biometrics: generating vascular images from binary templates. IEEE Trans. Biom. Behav. Identity Sci. 3(4), 464–478 (2021)
Hillerström, F., Kumar, A., Veldhuis, R.: Generating and analyzing synthetic finger vein images. In: Proceedings of the International Conference of the Biometrics Special Interest Group (BIOSIG 2014), pp. 121–132 (2014)
Yang, H., Fang, P., Hao, Z.: A GAN-based method for generating finger vein dataset. In: Proceedings of the 2020 3rd International Conference on Algorithms, Computing and Artificial Intelligence, ACAI 2020. Association for Computing Machinery, New York (2021)
Zhang, J., Lu, Z., Li, M., Wu, H.: Gan-based image augmentation for finger-vein biometric recognition. IEEE Access 7, 183118–183132 (2019)
Yang, W., Hui, C., Chen, Z., Xue, J.H., Liao, Q.: FV-GAN: finger vein representation using generative adversarial networks. IEEE Trans. Inf. Forensics Secur. 14(9), 2512–2524 (2019)
Grosz, S.A., Jain, A.K.: SpoofGAN: synthetic fingerprint spoof images. IEEE Trans. Inf. Forensics Secur. 18, 730–743 (2023)
Purnapatra, S., et al.: Presentation attack detection with advanced CNN models for noncontact-based fingerprint systems. In: Proceedings of the 11th International Workshop on Biometrics and Forensics (IWBF 2023), Barcelona, Spain, pp. 1–6 (2023)
Vorderleitner, A., Hämmerle-Uhl, J., Uhl, A.: Hand vein spoof GANs: Pitfalls in the assessment of synthetic presentation attack artefacts. In: Proceedings of the 2023 ACM Workshop on Information Hiding and Multimedia Security, IH &MMSec 2023, pp. 133–138. Association for Computing Machinery, New York (2023)
Goodfellow, I., et al.: Generative adversarial networks. Commun. ACM 63(11), 139–144 (2020)
Choi, Y., Uh, Y., Yoo, J., Ha, J.W.: StarGAN v2: Diverse image synthesis for multiple domains. In: Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, CVPR 2020, pp. 8188–8197 (2020)
Lin, J., Pang, Y., Xia, Y., Chen, Z., Luo, J.: TuiGAN: Learning versatile image-to-image translation with two unpaired images. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.-M. (eds.) ECCV 2020. LNCS, vol. 12349, pp. 18–35. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-58548-8_2
Lee, H.-Y., Tseng, H.-Y., Huang, J.-B., Singh, M., Yang, M.-H.: Diverse image-to-image translation via disentangled representations. In: Ferrari, V., Hebert, M., Sminchisescu, C., Weiss, Y. (eds.) ECCV 2018. LNCS, vol. 11205, pp. 36–52. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-01246-5_3
Park, T., Efros, A.A., Zhang, R., Zhu, J.-Y.: Contrastive learning for unpaired image-to-image translation. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.-M. (eds.) ECCV 2020. LNCS, vol. 12354, pp. 319–345. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-58545-7_19
Benaim, S., Wolf, L.: One-sided unsupervised domain mapping. In: Proceedings of the 31st International Conference on Neural Information Processing Systems (NIPS 2017), Red Hook, NY, USA, pp. 752–762. Curran Associates Inc. (2017)
Zhu, J.Y., Park, T., Isola, P., Efros, A.A.: Unpaired image-to-image translation using cycle-consistent adversarial networks. In: 2017 IEEE International Conference on Computer Vision (ICCV), pp. 2242–2251 (2017). ISSN: 2380-7504
Yi, Z., Zhang, H., Tan, P., Gong, M.: DualGAN: Unsupervised dual learning for image-to-image translation. In: Proceedings of the IEEE International Conference on Computer Vision (ICCV 2017), pp. 2849–2857 (2017)
Tome, P., et al.: The 1st competition on counter measures to finger vein spoofing attacks. In: International Conference on Biometrics (ICB 2015), pp. 513–518 (2015)
Qiu, X., Kang, W., Tian, S., Jia, W., Huang, Z.: Finger vein presentation attack detection using total variation decomposition. IEEE Trans. Inf. Forensics Secur. 13(2), 465–477 (2018)
Heusel, M., Ramsauer, H., Unterthiner, T., Nessler, B., Hochreiter, S.: GANs trained by a two time-scale update rule converge to a local Nash equilibrium. In: Proceedings of the 31st International Conference on Neural Information Processing Systems (NIPS 2017), Red Hook, NY, USA, pp. 6629–6640. Curran Associates Inc. (2017)
Lucic, M., Kurach, K., Michalski, M., Bousquet, O., Gelly, S.: Are GANs created equal? A large-scale study. In: Proceedings of the 32nd International Conference on Neural Information Processing Systems (NIPS 2018), Red Hook, NY, USA, pp. 698–707. Curran Associates Inc. (2018)
Kauba, C., Uhl, A.: An available open-source vein recognition framework. In: Uhl, A., Busch, C., Marcel, S., Veldhuis, R. (eds.) Handbook of Vascular Biometrics. ACVPR, pp. 113–142. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-27731-4_4
Acknowledgements
This work has been partially supported by the Austrian Science Fund, project no. I4272.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Vorderleitner, A., Hämmerle-Uhl, J., Uhl, A. (2024). Finger Vein Spoof GANs: Can We Supersede the Production of Presentation Attack Artefacts?. In: Ma, B., Li, J., Li, Q. (eds) Digital Forensics and Watermarking. IWDW 2023. Lecture Notes in Computer Science, vol 14511. Springer, Singapore. https://doi.org/10.1007/978-981-97-2585-4_8
Download citation
DOI: https://doi.org/10.1007/978-981-97-2585-4_8
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-97-2584-7
Online ISBN: 978-981-97-2585-4
eBook Packages: Computer ScienceComputer Science (R0)