Skip to main content

2024 | OriginalPaper | Buchkapitel

Finger Vein Spoof GANs: Can We Supersede the Production of Presentation Attack Artefacts?

verfasst von : Andreas Vorderleitner, Jutta Hämmerle-Uhl, Andreas Uhl

Erschienen in: Digital Forensics and Watermarking

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

GAN-based I2I translation techniques for unpaired data are employed for the synthesis of biometric finger vein presentation attack instrument samples corresponding to three public presentation attack datasets. For the assessment of these synthetic samples, we analyse their behaviour when attacking finger vein recognition systems, comparing these results to such obtained from actually crafted presentation attack samples. We observe that although visual appearance and sample set correspondence are surprisingly good for some networks, respectively, the assessment of the behaviour of the data in a conducted attack is more difficult. Even if for some recognition schemes out of 11 considered we find a good accordance in terms of IAPMR (for many we don’t), the attack score distributions turn out to be highly dissimilar when comparing crafted and synthetic presentation attack instrument samples. More work is needed to be able to correctly interpret corresponding diverging results with respect to the relevance in attack simulation. From the seven network architectures considered, CycleGAN provides the most useful results, but the artificially created samples do not fully mimic the behaviour of crafted ones.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
3.
Zurück zum Zitat Schuiki, J., Linortner, M., Wimmer, G., Uhl, A.: Attack detection for finger and palm vein biometrics by fusion of multiple recognition algorithms. IEEE Trans. Biom. Behav. Identity Sci. 4(4), 544–555 (2022)CrossRef Schuiki, J., Linortner, M., Wimmer, G., Uhl, A.: Attack detection for finger and palm vein biometrics by fusion of multiple recognition algorithms. IEEE Trans. Biom. Behav. Identity Sci. 4(4), 544–555 (2022)CrossRef
4.
Zurück zum Zitat Schuiki, J., Linortner, M., Wimmer, G., Uhl, A.: Extensive threat analysis of vein attack databases and attack detection by fusion of comparison scores. In: Marcel, S., Fierrez, J., Evans, N. (eds.) Handbook of Biometric Anti-Spoofing: Presentation Attack Detection and Vulnerability Assessment, pp. 467–487. Springer, Singapore (2023). https://doi.org/10.1007/978-981-19-5288-3_17CrossRef Schuiki, J., Linortner, M., Wimmer, G., Uhl, A.: Extensive threat analysis of vein attack databases and attack detection by fusion of comparison scores. In: Marcel, S., Fierrez, J., Evans, N. (eds.) Handbook of Biometric Anti-Spoofing: Presentation Attack Detection and Vulnerability Assessment, pp. 467–487. Springer, Singapore (2023). https://​doi.​org/​10.​1007/​978-981-19-5288-3_​17CrossRef
5.
Zurück zum Zitat Raghavendra, R., Busch, C.: Presentation attack detection algorithms for finger vein biometrics: a comprehensive study. In: 11th International Conference on Signal-Image Technology Internet-Based Systems (SITIS 2015), pp. 628–632 (2015) Raghavendra, R., Busch, C.: Presentation attack detection algorithms for finger vein biometrics: a comprehensive study. In: 11th International Conference on Signal-Image Technology Internet-Based Systems (SITIS 2015), pp. 628–632 (2015)
6.
Zurück zum Zitat Debiasi, L., Kauba, C., Hofbauer, H., Prommegger, B., Uhl, A.: Presentation attacks and detection in finger- and hand-vein recognition. In: Proceedings of the Joint Austrian Computer Vision and Robotics Workshop (ACVRW 2020), Graz, Austria, pp. 65–70 (2020) Debiasi, L., Kauba, C., Hofbauer, H., Prommegger, B., Uhl, A.: Presentation attacks and detection in finger- and hand-vein recognition. In: Proceedings of the Joint Austrian Computer Vision and Robotics Workshop (ACVRW 2020), Graz, Austria, pp. 65–70 (2020)
7.
Zurück zum Zitat Schuiki, J., Prommegger, B., Uhl, A.: Confronting a variety of finger vein recognition algorithms with wax presentation attack artefacts. In: Proceedings of the 9th IEEE International Workshop on Biometrics and Forensics (IWBF 2021), Rome, Italy (moved to virtual), pp. 1–6 (2021) Schuiki, J., Prommegger, B., Uhl, A.: Confronting a variety of finger vein recognition algorithms with wax presentation attack artefacts. In: Proceedings of the 9th IEEE International Workshop on Biometrics and Forensics (IWBF 2021), Rome, Italy (moved to virtual), pp. 1–6 (2021)
8.
Zurück zum Zitat Otsuka, A., Ohki, T., Morita, R., Inuma, M., Imai, H.: Security evaluation of a finger vein authentication algorithm against wolf attack. In: 37th IEEE Symposium on Security and Privacy, San Jose, CA (2016) Otsuka, A., Ohki, T., Morita, R., Inuma, M., Imai, H.: Security evaluation of a finger vein authentication algorithm against wolf attack. In: 37th IEEE Symposium on Security and Privacy, San Jose, CA (2016)
10.
Zurück zum Zitat Hoyez, H., Schockaert, C., Rambach, J., Mirbach, B., Stricker, D.: Unsupervised image-to-image translation: a review. Sensors 22(21), 8540 (2022)CrossRef Hoyez, H., Schockaert, C., Rambach, J., Mirbach, B., Stricker, D.: Unsupervised image-to-image translation: a review. Sensors 22(21), 8540 (2022)CrossRef
11.
Zurück zum Zitat Makrushin, A., Uhl, A., Dittmann, J.: A survey on synthetic biometrics: fingerprint, face, iris and vascular patterns. IEEE Access 11, 33887–33899 (2023)CrossRef Makrushin, A., Uhl, A., Dittmann, J.: A survey on synthetic biometrics: fingerprint, face, iris and vascular patterns. IEEE Access 11, 33887–33899 (2023)CrossRef
12.
Zurück zum Zitat Kauba, C., Kirchgasser, S., Mirjalili, V., Uhl, A., Ross, A.: Inverse biometrics: generating vascular images from binary templates. IEEE Trans. Biom. Behav. Identity Sci. 3(4), 464–478 (2021)CrossRef Kauba, C., Kirchgasser, S., Mirjalili, V., Uhl, A., Ross, A.: Inverse biometrics: generating vascular images from binary templates. IEEE Trans. Biom. Behav. Identity Sci. 3(4), 464–478 (2021)CrossRef
13.
Zurück zum Zitat Hillerström, F., Kumar, A., Veldhuis, R.: Generating and analyzing synthetic finger vein images. In: Proceedings of the International Conference of the Biometrics Special Interest Group (BIOSIG 2014), pp. 121–132 (2014) Hillerström, F., Kumar, A., Veldhuis, R.: Generating and analyzing synthetic finger vein images. In: Proceedings of the International Conference of the Biometrics Special Interest Group (BIOSIG 2014), pp. 121–132 (2014)
14.
Zurück zum Zitat Yang, H., Fang, P., Hao, Z.: A GAN-based method for generating finger vein dataset. In: Proceedings of the 2020 3rd International Conference on Algorithms, Computing and Artificial Intelligence, ACAI 2020. Association for Computing Machinery, New York (2021) Yang, H., Fang, P., Hao, Z.: A GAN-based method for generating finger vein dataset. In: Proceedings of the 2020 3rd International Conference on Algorithms, Computing and Artificial Intelligence, ACAI 2020. Association for Computing Machinery, New York (2021)
15.
Zurück zum Zitat Zhang, J., Lu, Z., Li, M., Wu, H.: Gan-based image augmentation for finger-vein biometric recognition. IEEE Access 7, 183118–183132 (2019)CrossRef Zhang, J., Lu, Z., Li, M., Wu, H.: Gan-based image augmentation for finger-vein biometric recognition. IEEE Access 7, 183118–183132 (2019)CrossRef
16.
Zurück zum Zitat Yang, W., Hui, C., Chen, Z., Xue, J.H., Liao, Q.: FV-GAN: finger vein representation using generative adversarial networks. IEEE Trans. Inf. Forensics Secur. 14(9), 2512–2524 (2019)CrossRef Yang, W., Hui, C., Chen, Z., Xue, J.H., Liao, Q.: FV-GAN: finger vein representation using generative adversarial networks. IEEE Trans. Inf. Forensics Secur. 14(9), 2512–2524 (2019)CrossRef
17.
Zurück zum Zitat Grosz, S.A., Jain, A.K.: SpoofGAN: synthetic fingerprint spoof images. IEEE Trans. Inf. Forensics Secur. 18, 730–743 (2023)CrossRef Grosz, S.A., Jain, A.K.: SpoofGAN: synthetic fingerprint spoof images. IEEE Trans. Inf. Forensics Secur. 18, 730–743 (2023)CrossRef
18.
Zurück zum Zitat Purnapatra, S., et al.: Presentation attack detection with advanced CNN models for noncontact-based fingerprint systems. In: Proceedings of the 11th International Workshop on Biometrics and Forensics (IWBF 2023), Barcelona, Spain, pp. 1–6 (2023) Purnapatra, S., et al.: Presentation attack detection with advanced CNN models for noncontact-based fingerprint systems. In: Proceedings of the 11th International Workshop on Biometrics and Forensics (IWBF 2023), Barcelona, Spain, pp. 1–6 (2023)
19.
Zurück zum Zitat Vorderleitner, A., Hämmerle-Uhl, J., Uhl, A.: Hand vein spoof GANs: Pitfalls in the assessment of synthetic presentation attack artefacts. In: Proceedings of the 2023 ACM Workshop on Information Hiding and Multimedia Security, IH &MMSec 2023, pp. 133–138. Association for Computing Machinery, New York (2023) Vorderleitner, A., Hämmerle-Uhl, J., Uhl, A.: Hand vein spoof GANs: Pitfalls in the assessment of synthetic presentation attack artefacts. In: Proceedings of the 2023 ACM Workshop on Information Hiding and Multimedia Security, IH &MMSec 2023, pp. 133–138. Association for Computing Machinery, New York (2023)
21.
Zurück zum Zitat Choi, Y., Uh, Y., Yoo, J., Ha, J.W.: StarGAN v2: Diverse image synthesis for multiple domains. In: Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, CVPR 2020, pp. 8188–8197 (2020) Choi, Y., Uh, Y., Yoo, J., Ha, J.W.: StarGAN v2: Diverse image synthesis for multiple domains. In: Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, CVPR 2020, pp. 8188–8197 (2020)
25.
Zurück zum Zitat Benaim, S., Wolf, L.: One-sided unsupervised domain mapping. In: Proceedings of the 31st International Conference on Neural Information Processing Systems (NIPS 2017), Red Hook, NY, USA, pp. 752–762. Curran Associates Inc. (2017) Benaim, S., Wolf, L.: One-sided unsupervised domain mapping. In: Proceedings of the 31st International Conference on Neural Information Processing Systems (NIPS 2017), Red Hook, NY, USA, pp. 752–762. Curran Associates Inc. (2017)
26.
Zurück zum Zitat Zhu, J.Y., Park, T., Isola, P., Efros, A.A.: Unpaired image-to-image translation using cycle-consistent adversarial networks. In: 2017 IEEE International Conference on Computer Vision (ICCV), pp. 2242–2251 (2017). ISSN: 2380-7504 Zhu, J.Y., Park, T., Isola, P., Efros, A.A.: Unpaired image-to-image translation using cycle-consistent adversarial networks. In: 2017 IEEE International Conference on Computer Vision (ICCV), pp. 2242–2251 (2017). ISSN: 2380-7504
27.
Zurück zum Zitat Yi, Z., Zhang, H., Tan, P., Gong, M.: DualGAN: Unsupervised dual learning for image-to-image translation. In: Proceedings of the IEEE International Conference on Computer Vision (ICCV 2017), pp. 2849–2857 (2017) Yi, Z., Zhang, H., Tan, P., Gong, M.: DualGAN: Unsupervised dual learning for image-to-image translation. In: Proceedings of the IEEE International Conference on Computer Vision (ICCV 2017), pp. 2849–2857 (2017)
28.
Zurück zum Zitat Tome, P., et al.: The 1st competition on counter measures to finger vein spoofing attacks. In: International Conference on Biometrics (ICB 2015), pp. 513–518 (2015) Tome, P., et al.: The 1st competition on counter measures to finger vein spoofing attacks. In: International Conference on Biometrics (ICB 2015), pp. 513–518 (2015)
29.
Zurück zum Zitat Qiu, X., Kang, W., Tian, S., Jia, W., Huang, Z.: Finger vein presentation attack detection using total variation decomposition. IEEE Trans. Inf. Forensics Secur. 13(2), 465–477 (2018)CrossRef Qiu, X., Kang, W., Tian, S., Jia, W., Huang, Z.: Finger vein presentation attack detection using total variation decomposition. IEEE Trans. Inf. Forensics Secur. 13(2), 465–477 (2018)CrossRef
30.
Zurück zum Zitat Heusel, M., Ramsauer, H., Unterthiner, T., Nessler, B., Hochreiter, S.: GANs trained by a two time-scale update rule converge to a local Nash equilibrium. In: Proceedings of the 31st International Conference on Neural Information Processing Systems (NIPS 2017), Red Hook, NY, USA, pp. 6629–6640. Curran Associates Inc. (2017) Heusel, M., Ramsauer, H., Unterthiner, T., Nessler, B., Hochreiter, S.: GANs trained by a two time-scale update rule converge to a local Nash equilibrium. In: Proceedings of the 31st International Conference on Neural Information Processing Systems (NIPS 2017), Red Hook, NY, USA, pp. 6629–6640. Curran Associates Inc. (2017)
31.
Zurück zum Zitat Lucic, M., Kurach, K., Michalski, M., Bousquet, O., Gelly, S.: Are GANs created equal? A large-scale study. In: Proceedings of the 32nd International Conference on Neural Information Processing Systems (NIPS 2018), Red Hook, NY, USA, pp. 698–707. Curran Associates Inc. (2018) Lucic, M., Kurach, K., Michalski, M., Bousquet, O., Gelly, S.: Are GANs created equal? A large-scale study. In: Proceedings of the 32nd International Conference on Neural Information Processing Systems (NIPS 2018), Red Hook, NY, USA, pp. 698–707. Curran Associates Inc. (2018)
Metadaten
Titel
Finger Vein Spoof GANs: Can We Supersede the Production of Presentation Attack Artefacts?
verfasst von
Andreas Vorderleitner
Jutta Hämmerle-Uhl
Andreas Uhl
Copyright-Jahr
2024
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-97-2585-4_8

Premium Partner