On the vulnerability of finger vein recognition to spoofing
dc.contributor.author | Tome, Pedro | |
dc.contributor.author | Vanoni, Matthias | |
dc.contributor.author | Marcel, Sébastien | |
dc.contributor.editor | Brömme, Arslan | |
dc.contributor.editor | Busch, Christoph | |
dc.date.accessioned | 2017-07-26T10:54:19Z | |
dc.date.available | 2017-07-26T10:54:19Z | |
dc.date.issued | 2014 | |
dc.description.abstract | The vulnerability of finger vein recognition to spoofing is studied in this paper. A collection of spoofing finger vein images has been created from real finger vein samples. Finger vein images are printed using a commercial printer and then, presented at an open source finger vein sensor. Experiments are carried out using an extensible framework, which allows fair and reproducible benchmarks. Experimental results lead to a spoofing false accept rate of 86\%, thus showing that finger vein biometrics is vulnerable to spoofing attacks, pointing out the importance to investigate countermeasures against this type of fraudulent actions. | en |
dc.identifier.isbn | 978-3-88579-624-4 | |
dc.identifier.pissn | 1617-5468 | |
dc.language.iso | en | |
dc.publisher | Gesellschaft für Informatik e.V. | |
dc.relation.ispartof | BIOSIG 2014 | |
dc.relation.ispartofseries | Lecture Notes in Informatics (LNI) - Proceedings, Volume P-230 | |
dc.title | On the vulnerability of finger vein recognition to spoofing | en |
dc.type | Text/Conference Paper | |
gi.citation.endPage | 120 | |
gi.citation.publisherPlace | Bonn | |
gi.citation.startPage | 111 | |
gi.conference.date | 10.-12. September 2014 | |
gi.conference.location | Darmstadt |
Dateien
Originalbündel
1 - 1 von 1