Abstract
As biometric systems become ubiquitous in the domain of personal authentication, it is of utmost importance that these systems are secured against attacks. Among various types of attacks on biometric systems, the presentation attack, which involves presenting a fake copy (artefact) of the real biometric to the biometric sensor to gain illegitimate access, is the most common one. Despite the serious threat posed by these attacks, not much work has been done to address this vulnerability in palmprint-based biometric systems. This paper demonstrates the vulnerability of a palmprint verification system to presentation attacks and proposes a novel presentation attack detection (PAD) approach to discriminating between real biometric samples and artefacts. The proposed PAD approach is inspired by a work that established relationship between the surface reflectance and a set of statistical features extracted from the image. Specifically, statistical features computed from the distributions of pixel intensities, sub-band wavelet coefficients and the grey-level co-occurrence matrix form the original feature set, and CFS-based feature selection approach selects the most discriminating feature subset. A trained binary classifier utilizes the selected feature subset to determine whether the acquired image is of real hand or an artefact. For performance evaluation, an antispoofing database—PALMspoof has been developed. This database comprises left- and right-hand images of 104 subjects, and three kinds of artefacts generated from these images. In addition to PALMspoof database, the biometric system’s vulnerability has been assessed on display and print artefacts generated from two publicly available palmprint datasets. Our experimental results show that 1) the palmprint verification system is highly vulnerable with spoof acceptance of 84.56%; 2) the proposed PAD approach is effective against both print and display attacks, in both same-device and cross-device scenarios; and 3) the proposed approach for PAD provides an average improvement of 12.73 percentage points in classification error rate over local binary pattern (LBP)-based PAD approach.






Similar content being viewed by others
References
Ratha NK, Connell JH, Bolle RM (2001) An analysis of minutiae matching strength. In: Bigun J, Smeraldi F (eds) Audio-and video-based biometric person authentication: Third International Conference, AVBPA 2001 Halmstad, Sweden, June 6--8, 2001 Proceedings. Springer, Heidelberg, pp 223–228. doi:10.1007/3-540-45344-X_32
Kong A, Zhang D, Kamel M (2009) A survey of palmprint recognition. Pattern Recogn 42(7):1408–1418
Zhang D, Kanhangad V, Luo N, Kumar A (2010) Robust palmprint verification using 2D and 3D features. Pattern Recogn 43(1):358–368
Chen H, Valizadegan H, Jackson C, Soltysiak S, Jain AK (2005) Fake hands: spoofing hand geometry systems. Biom Consort
Kanhangad V, Bhilare S, Garg P, Singh P, Chaudhari N (2015) Anti-spoofing for display and print attacks on palmprint verification systems. Proc. SPIE 9457:94570E-94570E-8. doi:10.1117/12.2180333
Reddy PV, Kumar A, Rahman SMK, Mundra TS (2007) A new method for fingerprint antispoofing using pulse oxiometry. In: First IEEE international conference on biometrics: theory, applications, and systems. pp 1–6
Parthasaradhi S, Derakhshani R, Hornak L, Schuckers S (2005) Time-series detection of perspiration as a liveness test in fingerprint devices. IEEE Trans Syst Man Cybern Part C Appl Rev 35(3):335–343
Erdogmus N, Marcel S (2014) Spoofing face recognition with 3D masks. IEEE Trans Inf Forens Secur 9(7):1084–1097
Hadid A (2014) Face biometrics under spoofing attacks: vulnerabilities, countermeasures, open issues, and research directions. In: IEEE Conference on Computer Vision and Pattern Recognition Workshops. pp 113–118
Zhang H, Sun Z, Tan T, Wang J (2011) Learning hierarchical visual codebook for iris liveness detection. In: International joint conference on biometrics (IJCB)
Raghavendra R, Busch C (2014) Presentation attack detection algorithm for face and iris biometrics. In: 22nd European signal processing conference (EUSIPCO). pp 1387–1391
Sanchez J, Saratxaga I, Hernaez I, Navas E, Erro D, Raitio T (2015) Towards a universal synthetic speech spoofing detection using phase information. IEEE Trans Inf Forens Secur 10(4):810–820
Galbally J, Marcel S, Fierrez J, Navas E, Erro D, Raitio T (2014) Biometric anti-spoofing methods: a survey in face recognition. IEEE Access 2:1530–1552
Reddy PV, Kumar A, Rahman S, Mundra T (2008) A new antispoofing approach for biometric devices. IEEE Trans Biomed Circuits Syst 2(4):328–337
Zhang D, Guo Z, Lu G, Zhang D, Zuo W (2010) An online system of multispectral palmprint verification. IEEE Trans Instrum Meas 59(2):480–490
Li W, Zhang D, Lu G, Yan J (2010) Efficient joint 2D and 3D palmprint matching with alignment refinement. In: IEEE computer vision and pattern recognition (CVPR) pp 795–801
Kose N and Dugelay J-L (2013) Countermeasure for the protection of face recognition systems against mask attacks. In: 10th IEEE International conference and workshops on automatic face and gesture recognition pp 1–6
Pan G, Sun L, Wu Z and Lao S (2007) Eyeblink-based anti-spoofing in face recognition from a generic webcamera. In: IEEE 11th International conference on computer vision pp 1-8
Faraj M-I, Bigun J (2007) Audiovisual person authentication using lip-motion from orientation maps. Pattern Recogn Lett 28(11):1368–1382
Chingovska I, Anjos A, Marcel S (2012) On the effectiveness of local binary patterns in face anti-spoofing. In: 11th International conference biometrics special interest group pp 1–7
Gragnaniello D, Sansone C, Verdoliva L (2015) Iris liveness detection for mobile devices based on local descriptors. Pattern Recogn Lett 57:81–87
Kanhangad V, Kumar A (2013) Securing palmprint authentication systems using spoof detection approach. In: 6th International conference on machine vision (ICMV) pp 90671M–90671M
Kanhangad V, Kumar A, Zhang D (2011) A unified framework for contactless hand verification. IEEE Trans Inf Forens Secur 6:1014–1027
Galbally J and Marcel S (2014) Face anti-spoofing based on general image quality assessment. In: 22nd International conference on pattern recognition (ICPR) pp 1173–1178
Dror RO, Adelson EH, Willsky AS (2001) Estimating surface reflectance properties from images under unknown illumination. In: Photonics West 2001-electronic imaging pp 231–242
Moorthy AK, Bovik AC (2011) Blind image quality assessment: from natural scene statistics to perceptual quality. ieee trans image process 20:3350–3364
Saad MA, Bovik AC, Charrier C (2012) Blind image quality assessment: a natural scene statistics approach in the DCT domain. ieee trans image process 21:3339–3352
Walck C (2007) Handbook on statistical distributions for experimentalists. University of Stockholm Internal Report SUF-PFY96-01
Haralick RM, Shanmugam K, Dinstein I (1973) Textural features for image classification. IEEE Trans Syst Man Cybern 6:610–621
Hall MA (1999) Correlation-based feature selection for machine learning. Dissertation, University of Waikato
Kecman V (2001) Learning and soft computing: support vector machines, neural networks, and fuzzy logic models. MIT press, Massachusetts
Kumar A (2008) Incorporating cohort information for reliable palmprint authentication. In: 6th Indian Conference on Computer Vision, Graphics & Image Processing pp 583–590
Casia palmprint database. http://biometrics.idealtest.org/. Accessed January (2015)
Kong, AK, and Zhang D (2004) Competitive coding scheme for palmprint verification. In: 17th International conference on pattern recognition pp 520–523
Chingovska I, Anjos A, Marcel S (2013) Anti-spoofing in action: joint operation with a verification system. In: IEEE conference on computer vision and pattern recognition workshops pp 98–104
Information Technology—Presentation Attack Detection (2014) Part 3: Testing, reporting and classification of attacks, ISO/IEC JTC1 SC37 Biometrics, ISO/IEC Standard WD 30107-3
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Bhilare, S., Kanhangad, V. & Chaudhari, N. A study on vulnerability and presentation attack detection in palmprint verification system. Pattern Anal Applic 21, 769–782 (2018). https://doi.org/10.1007/s10044-017-0606-y
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10044-017-0606-y