Skip to main content
Log in

A study on vulnerability and presentation attack detection in palmprint verification system

  • Theoretical Advances
  • Published:
Pattern Analysis and Applications Aims and scope Submit manuscript

Abstract

As biometric systems become ubiquitous in the domain of personal authentication, it is of utmost importance that these systems are secured against attacks. Among various types of attacks on biometric systems, the presentation attack, which involves presenting a fake copy (artefact) of the real biometric to the biometric sensor to gain illegitimate access, is the most common one. Despite the serious threat posed by these attacks, not much work has been done to address this vulnerability in palmprint-based biometric systems. This paper demonstrates the vulnerability of a palmprint verification system to presentation attacks and proposes a novel presentation attack detection (PAD) approach to discriminating between real biometric samples and artefacts. The proposed PAD approach is inspired by a work that established relationship between the surface reflectance and a set of statistical features extracted from the image. Specifically, statistical features computed from the distributions of pixel intensities, sub-band wavelet coefficients and the grey-level co-occurrence matrix form the original feature set, and CFS-based feature selection approach selects the most discriminating feature subset. A trained binary classifier utilizes the selected feature subset to determine whether the acquired image is of real hand or an artefact. For performance evaluation, an antispoofing database—PALMspoof has been developed. This database comprises left- and right-hand images of 104 subjects, and three kinds of artefacts generated from these images. In addition to PALMspoof database, the biometric system’s vulnerability has been assessed on display and print artefacts generated from two publicly available palmprint datasets. Our experimental results show that 1) the palmprint verification system is highly vulnerable with spoof acceptance of 84.56%; 2) the proposed PAD approach is effective against both print and display attacks, in both same-device and cross-device scenarios; and 3) the proposed approach for PAD provides an average improvement of 12.73 percentage points in classification error rate over local binary pattern (LBP)-based PAD approach.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Ratha NK, Connell JH, Bolle RM (2001) An analysis of minutiae matching strength. In: Bigun J, Smeraldi F (eds) Audio-and video-based biometric person authentication: Third International Conference, AVBPA 2001 Halmstad, Sweden, June 6--8, 2001 Proceedings. Springer, Heidelberg, pp 223–228. doi:10.1007/3-540-45344-X_32

  2. Kong A, Zhang D, Kamel M (2009) A survey of palmprint recognition. Pattern Recogn 42(7):1408–1418

    Article  Google Scholar 

  3. Zhang D, Kanhangad V, Luo N, Kumar A (2010) Robust palmprint verification using 2D and 3D features. Pattern Recogn 43(1):358–368

    Article  MATH  Google Scholar 

  4. Chen H, Valizadegan H, Jackson C, Soltysiak S, Jain AK (2005) Fake hands: spoofing hand geometry systems. Biom Consort

  5. Kanhangad V, Bhilare S, Garg P, Singh P, Chaudhari N (2015) Anti-spoofing for display and print attacks on palmprint verification systems. Proc. SPIE 9457:94570E-94570E-8. doi:10.1117/12.2180333

  6. Reddy PV, Kumar A, Rahman SMK, Mundra TS (2007) A new method for fingerprint antispoofing using pulse oxiometry. In: First IEEE international conference on biometrics: theory, applications, and systems. pp 1–6

  7. Parthasaradhi S, Derakhshani R, Hornak L, Schuckers S (2005) Time-series detection of perspiration as a liveness test in fingerprint devices. IEEE Trans Syst Man Cybern Part C Appl Rev 35(3):335–343

    Article  Google Scholar 

  8. Erdogmus N, Marcel S (2014) Spoofing face recognition with 3D masks. IEEE Trans Inf Forens Secur 9(7):1084–1097

    Article  Google Scholar 

  9. Hadid A (2014) Face biometrics under spoofing attacks: vulnerabilities, countermeasures, open issues, and research directions. In: IEEE Conference on Computer Vision and Pattern Recognition Workshops. pp 113–118

  10. Zhang H, Sun Z, Tan T, Wang J (2011) Learning hierarchical visual codebook for iris liveness detection. In: International joint conference on biometrics (IJCB)

  11. Raghavendra R, Busch C (2014) Presentation attack detection algorithm for face and iris biometrics. In: 22nd European signal processing conference (EUSIPCO). pp 1387–1391

  12. Sanchez J, Saratxaga I, Hernaez I, Navas E, Erro D, Raitio T (2015) Towards a universal synthetic speech spoofing detection using phase information. IEEE Trans Inf Forens Secur 10(4):810–820

    Article  Google Scholar 

  13. Galbally J, Marcel S, Fierrez J, Navas E, Erro D, Raitio T (2014) Biometric anti-spoofing methods: a survey in face recognition. IEEE Access 2:1530–1552

    Article  Google Scholar 

  14. Reddy PV, Kumar A, Rahman S, Mundra T (2008) A new antispoofing approach for biometric devices. IEEE Trans Biomed Circuits Syst 2(4):328–337

    Article  Google Scholar 

  15. Zhang D, Guo Z, Lu G, Zhang D, Zuo W (2010) An online system of multispectral palmprint verification. IEEE Trans Instrum Meas 59(2):480–490

    Article  Google Scholar 

  16. Li W, Zhang D, Lu G, Yan J (2010) Efficient joint 2D and 3D palmprint matching with alignment refinement. In: IEEE computer vision and pattern recognition (CVPR) pp 795–801

  17. Kose N and Dugelay J-L (2013) Countermeasure for the protection of face recognition systems against mask attacks. In: 10th IEEE International conference and workshops on automatic face and gesture recognition pp 1–6

  18. Pan G, Sun L, Wu Z and Lao S (2007) Eyeblink-based anti-spoofing in face recognition from a generic webcamera. In: IEEE 11th International conference on computer vision pp 1-8

  19. Faraj M-I, Bigun J (2007) Audiovisual person authentication using lip-motion from orientation maps. Pattern Recogn Lett 28(11):1368–1382

    Article  Google Scholar 

  20. Chingovska I, Anjos A, Marcel S (2012) On the effectiveness of local binary patterns in face anti-spoofing. In: 11th International conference biometrics special interest group pp 1–7

  21. Gragnaniello D, Sansone C, Verdoliva L (2015) Iris liveness detection for mobile devices based on local descriptors. Pattern Recogn Lett 57:81–87

    Article  Google Scholar 

  22. Kanhangad V, Kumar A (2013) Securing palmprint authentication systems using spoof detection approach. In: 6th International conference on machine vision (ICMV) pp 90671M–90671M

  23. Kanhangad V, Kumar A, Zhang D (2011) A unified framework for contactless hand verification. IEEE Trans Inf Forens Secur 6:1014–1027

    Article  Google Scholar 

  24. Galbally J and Marcel S (2014) Face anti-spoofing based on general image quality assessment. In: 22nd International conference on pattern recognition (ICPR) pp 1173–1178

  25. Dror RO, Adelson EH, Willsky AS (2001) Estimating surface reflectance properties from images under unknown illumination. In: Photonics West 2001-electronic imaging pp 231–242

  26. Moorthy AK, Bovik AC (2011) Blind image quality assessment: from natural scene statistics to perceptual quality. ieee trans image process 20:3350–3364

    Article  MathSciNet  MATH  Google Scholar 

  27. Saad MA, Bovik AC, Charrier C (2012) Blind image quality assessment: a natural scene statistics approach in the DCT domain. ieee trans image process 21:3339–3352

    Article  MathSciNet  MATH  Google Scholar 

  28. Walck C (2007) Handbook on statistical distributions for experimentalists. University of Stockholm Internal Report SUF-PFY96-01

  29. Haralick RM, Shanmugam K, Dinstein I (1973) Textural features for image classification. IEEE Trans Syst Man Cybern 6:610–621

    Article  Google Scholar 

  30. Hall MA (1999) Correlation-based feature selection for machine learning. Dissertation, University of Waikato

  31. Kecman V (2001) Learning and soft computing: support vector machines, neural networks, and fuzzy logic models. MIT press, Massachusetts

    MATH  Google Scholar 

  32. Kumar A (2008) Incorporating cohort information for reliable palmprint authentication. In: 6th Indian Conference on Computer Vision, Graphics & Image Processing pp 583–590

  33. Casia palmprint database. http://biometrics.idealtest.org/. Accessed January (2015)

  34. Kong, AK, and Zhang D (2004) Competitive coding scheme for palmprint verification. In: 17th International conference on pattern recognition pp 520–523

  35. Chingovska I, Anjos A, Marcel S (2013) Anti-spoofing in action: joint operation with a verification system. In: IEEE conference on computer vision and pattern recognition workshops pp 98–104

  36. Information Technology—Presentation Attack Detection (2014) Part 3: Testing, reporting and classification of attacks, ISO/IEC JTC1 SC37 Biometrics, ISO/IEC Standard WD 30107-3

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vivek Kanhangad.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Bhilare, S., Kanhangad, V. & Chaudhari, N. A study on vulnerability and presentation attack detection in palmprint verification system. Pattern Anal Applic 21, 769–782 (2018). https://doi.org/10.1007/s10044-017-0606-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10044-017-0606-y

Keywords